Conferences related to ICT

Back to Top

2014 IEEE Frontiers in Education Conference (FIE)

The Frontiers in Education (FIE)Conference is the major international conference about educational innovations and research in engineering and computing. FIE 2014 continues a long tradition of disseminating results in these areas. It is an ideal forum for sharing ideas; learning about developments in computer science, engineering, and technology education; and interacting with colleagues in these fields.

  • 2013 IEEE Frontiers in Education Conference (FIE)

    The Frontiers in Education (FIE)Conference is the major international conference about educational innovations and research in engineering and computing. FIE 2013 continues a long tradition of disseminating results in these areas. It is an ideal forum for sharing ideas; learning about developments in computer science, engineering, and technology education; and interacting with colleagues in these fields.

  • 2012 IEEE Frontiers in Education Conference (FIE)

    The Frontiers in Education (FIE)Conference is the major international conference about educational innovations and research in engineering and computing. FIE 2012 continues a long tradition of disseminating results in these areas. It is an ideal forum for sharing ideas; learning about developments in computer science, engineering, and technology education; and interacting with colleagues in these fields.

  • 2011 Frontiers in Education Conference (FIE)

    The Frontiers in Education (FIE) Conference is the major international conference about educational innovations and research in engineering and computing. FIE 2011 continues a long tradition of disseminating results in these areas. It is an ideal forum for sharing ideas; learning about developments in computer science, engineering, and technology education; and interacting with colleagues in these fields.

  • 2010 IEEE Frontiers in Education Conference (FIE)

    (FIE) Conference is a major international conference devoted to improvements in computer science, engineering, and technology (CSET) education. FIE 2008 continues a long tradition of disseminating educational research results and innovative practices in CSET education. It is an ideal forum for sharing ideas, learning about developments in CSET education, and interacting with colleagues.


2013 7th IEEE International Conference on Digital Ecosystems and Technologies (DEST) - Complex Environment Engineering

The essence of digital ecosystems is the adoption of ecological system concepts, and creating value by making connections through collective intelligence and promoting collaboration instead of unbridled competition and ICT-based catalyst effects in a number of domains, to produce networked enriched communities and solutions. IEEE DEST 2013 with its special theme of - Complex Environment Engineering recognizes the key role of business process data modeling, representation and privacy-aware analysis for Digital Ecosystems, and vice versa. Further, the Innovation Adoption Forum underpins the importance of public-private partnership as the key for delivering sustainable solutions for our Complex Living and Business Environment – and thus our Digital Ecosystem Habitat. Our Keynotes, Panels and Sessions will tackle the multifaceted challenges and solutions from various stakeholders’ perspectives.

  • 2012 6th IEEE International Conference on Digital Ecosystems and Technologies (DEST) - Complex Environment Engineering

    Traditional ICT-support has often increased complexity, thus making the challenges even more severe. The Digital Ecosystem perspective aims to address the twofold challenge of Complex Environment Engineering and Digital Ecosystem Technology mapping. The complexity of both the challenges and the technological solutions has to be acknowledged.

  • 2011 5th IEEE International Conference on Digital Ecosystems and Technologies (DEST)

    The digital ecosystem is defined as an open, loosely coupled, demand-driven, domain clustered, agent-based self organized collaborative environment where species/agents form a temporary coalition (or longer term) for a specific purpose or goals, and everyone is proactive and responsive for its own benefit or profit. The essence of digital ecosystems is creating value by making connections through collective intelligence. Digital Ecosystems promote collaboration instead of unbridled competition and ICT based

  • 2010 4th IEEE International Conference on Digital Ecosystems and Technologies (DEST)

    The digital ecosystem is defined as an open, loosely coupled, demand driven, domain clustered, agent based self organized collaborative environment where species/agents form a temporary coalition (or longer term) for a specific purpose or goals, and everyone is proactive and responsive for its own benefit or profit. The essence of digital ecosystems is creating value by making connections through collective intelligence. Digital Ecosystems promote collaboration instead of unbridled competition and ICT based

  • 2009 3rd IEEE International Conference on Digital Ecosystems and Technologies (DEST)

    The digital ecosystem is defined as an open, loosely coupled, domain clustered, demand-driven, self-organising agents environment, where each species is proactive and responsive for its own benefit or profit. The underlying technology for digital ecosystems is composed of extended web services architecture, self-organising intelligent agents, ontology-based knowledge sharing and a swarm intelligence-based recommendation system.

  • 2008 2nd IEEE International Conference on Digital Ecosystems and Technologies (DEST)

    The 2nd IEEE DEST conference will become the main international forum for researchers and practitioners to exchange information regarding advancements in the practice of advanced models for designing and deploying inter-organisational digital business processes involving networks of small and medium enterprise.


2013 9th International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM)

All areas related to wireless communications, network technologies, and mobile computing systems.


2012 IEEE International Symposium on Sustainable Systems and Technology (ISSST)

The symposium is a forum for exchange of knowledge related to systems approaches to sustainability in the context of technological change.

  • 2011 IEEE International Symposium on Sustainable Systems and Technology (ISSST)

    This conference was known between 1993 and 2008 as the IEEE International Symposium on Electronics and the Environment. The program includes sessions covering the spectrum of issues for assessing and managing products and services across their life cycle, and the design, management, and policy implications of sustainable engineered systems and technologies, including design for environment, design for sustainability, materials selection, energy management, end-of-life policy and reuse/recycling.

  • 2010 IEEE International Symposium on Sustainable Systems and Technology (ISSST)

    The program includes sessions covering the spectrum of issues for assessing and managing products and services across their life cycle, and the design, management, and policy implications of sustainable engineered systems and technologies, including design for environment, design for sustainability, materials selection, energy management, end-of-life policy and reuse/recycling, process integration, and institutional and policy implications of services and technology systems.

  • 2009 IEEE International Symposium on Sustainable Systems and Technology (ISSST) (Formerly known as ISEE)

    Conference will cover environmental and social implications of ICT technologies, including services. Areas of focus will include industrial ecology, design for environment, design for sustainability, emerging technologies, and sustainable ICT services

  • 2008 IEEE International Symposium on Electronics and the Environment (ISEE)

    Issues associated with sustainable environmental and health of engineered systems, with a focus on information and communication technology systems.

  • 2007 IEEE International Symposium on Electronics and the Environment (ISEE)

  • 2006 IEEE International Symposium on Electronics and the Environment (ISEE) in conjunction with Electronics Recycling Summit


2012 International Conference on Management and Service Science (MASS 2012)

Enterprise Management, Engineering Management, Service Science, Financial Management, Knowledge Management


More Conferences

Periodicals related to ICT

Back to Top

Engineering Management, IEEE Transactions on

Management of technical functions such as research, development, and engineering in industry, government, university, and other settings. Emphasis is on studies carried on within an organization to help in decision making or policy formation for RD&E.


Internet Computing, IEEE

IEEE Internet Computing provides journal-quality evaluation and review of emerging and maturing Internet technologies and applications. The magazine targets the technical and scientific Internet user communities as well as designers and developers of Internet-based applications and enabling technologies. IC publishes refereed articles on the latest developments and key trends in Internet technologies and applications. A crossroads between academic researchers and ...


Power Delivery, IEEE Transactions on

Research, development, design, application, construction, the installation and operation of apparatus, equipment, structures, materials, and systems for the safe, reliable, and economic delivery and control of electric energy for general industrial, commercial, public, and domestic consumption.


Professional Communication, IEEE Transactions on

The study, development, improvement, and promotion of techniques for preparing, organizing for use, processing, editing, collecting, conserving, and disseminating any form of information in the electrical and electronics fields.




Xplore Articles related to ICT

Back to Top

International cloud infrastructure for space weather data management: The DemoGRAPE challenge

Olivier Terzo; Pietro Ruiu; Lucilla Alfonsi; Vincenzo Romano; Luca Spogli Radio Science Conference (URSI AT-RASC), 2015 1st URSI Atlantic, 2015

Data management for E-science applications need to adopt new platforms/services aiming at improving the interactions between users and data, through sharing, flexibility and resources availability. In the space weather domain, the DemoGRAPE project, under the GRAPE initiative (www.grape.scar.org), focuses on merging E-science and ICT to push forward international collaborations on Irregular Ionosphere investigation with GNSS signals in Polar Regions. DemoGRAPE ...


Safety and performance evaluation methods for implantable cardioverter defibrillator

San Kim; Yoonsu Hwang; Tae-Hee Kwon; Jaewon Lee; Il-kwon Lim; Su-Kang Park; Yong-Kyun Kim; Hyeogju Kim; Shin-Jung Kang 2013 International Conference on ICT Convergence (ICTC), 2013

An implantable cardioverter defibrillator (ICD) is an active implantable medical device that is utilized in correcting atrial or ventricular fibrillation through the delivery of an electrical shock to the heart via an implanted electrode in the human body. Since an ICD is remains in the body of a patient for a long period of time and since adverse reactions to ...


Experiences from deploying a heart rate monitoring system in a senior center

Jyh-How Huang; Tsu-Te Wang; Tzu-Yao Su; Kun-Chan Lan; Paweeya Raknim 2013 International Conference on ICT Convergence (ICTC), 2013

Wearable sensor systems are widely used for vital sign monitoring in hospitals, and at homes in recent years. However, most of them are designed for bedridden patients in hospitals. Using wireless sensors to capture physiological data from patients for long term health monitoring in a health institution has become increasingly popular these days. Some previous studies recorded complaints from the ...


A study on wireless secret key randomness in multiuser networks

Seon Yeob Baek; Jongwook Park 2013 International Conference on ICT Convergence (ICTC), 2013

Wireless communication has been confronted with security issues due to natural broadcast of signal. Therefore, wireless networks have relied on cryptographic algorithms to support data confidentiality and integrity. Recently, secret key generation schemes exploiting wireless characteristics have been proposed for the symmetric-key based cryptographic algorithms. In this paper, we propose a wireless secret key generation scheme in multiuser networks and ...


Cost comparison between code teleportation and stabilizer sequence methods for quantum code conversion

Byung-Soo Choi 2013 International Conference on ICT Convergence (ICTC), 2013

There are two methods for code conversion: stabilizer sequence and code teleportation. The stabilizer sequence method is to apply a sequence of stabilizers between two codes with repetitive error-correction by stabilizers. On the other hand the code teleportation is to apply the teleportation of encoded qubits. Since we have two methods, it is our choice to choose any of them ...


More Xplore Articles

Educational Resources on ICT

Back to Top

eLearning

International cloud infrastructure for space weather data management: The DemoGRAPE challenge

Olivier Terzo; Pietro Ruiu; Lucilla Alfonsi; Vincenzo Romano; Luca Spogli Radio Science Conference (URSI AT-RASC), 2015 1st URSI Atlantic, 2015

Data management for E-science applications need to adopt new platforms/services aiming at improving the interactions between users and data, through sharing, flexibility and resources availability. In the space weather domain, the DemoGRAPE project, under the GRAPE initiative (www.grape.scar.org), focuses on merging E-science and ICT to push forward international collaborations on Irregular Ionosphere investigation with GNSS signals in Polar Regions. DemoGRAPE ...


Safety and performance evaluation methods for implantable cardioverter defibrillator

San Kim; Yoonsu Hwang; Tae-Hee Kwon; Jaewon Lee; Il-kwon Lim; Su-Kang Park; Yong-Kyun Kim; Hyeogju Kim; Shin-Jung Kang 2013 International Conference on ICT Convergence (ICTC), 2013

An implantable cardioverter defibrillator (ICD) is an active implantable medical device that is utilized in correcting atrial or ventricular fibrillation through the delivery of an electrical shock to the heart via an implanted electrode in the human body. Since an ICD is remains in the body of a patient for a long period of time and since adverse reactions to ...


Experiences from deploying a heart rate monitoring system in a senior center

Jyh-How Huang; Tsu-Te Wang; Tzu-Yao Su; Kun-Chan Lan; Paweeya Raknim 2013 International Conference on ICT Convergence (ICTC), 2013

Wearable sensor systems are widely used for vital sign monitoring in hospitals, and at homes in recent years. However, most of them are designed for bedridden patients in hospitals. Using wireless sensors to capture physiological data from patients for long term health monitoring in a health institution has become increasingly popular these days. Some previous studies recorded complaints from the ...


A study on wireless secret key randomness in multiuser networks

Seon Yeob Baek; Jongwook Park 2013 International Conference on ICT Convergence (ICTC), 2013

Wireless communication has been confronted with security issues due to natural broadcast of signal. Therefore, wireless networks have relied on cryptographic algorithms to support data confidentiality and integrity. Recently, secret key generation schemes exploiting wireless characteristics have been proposed for the symmetric-key based cryptographic algorithms. In this paper, we propose a wireless secret key generation scheme in multiuser networks and ...


Cost comparison between code teleportation and stabilizer sequence methods for quantum code conversion

Byung-Soo Choi 2013 International Conference on ICT Convergence (ICTC), 2013

There are two methods for code conversion: stabilizer sequence and code teleportation. The stabilizer sequence method is to apply a sequence of stabilizers between two codes with repetitive error-correction by stabilizers. On the other hand the code teleportation is to apply the teleportation of encoded qubits. Since we have two methods, it is our choice to choose any of them ...


More eLearning Resources

IEEE.tv Videos

No IEEE.tv Videos are currently tagged "ICT"

IEEE-USA E-Books

  • Impersonal Sociotechnical Capital, ICTs, and Collective Action Among Strangers

    This chapter contains sections titled: Some Ict Supports for Building and Maintaining Social Capital, Areas Ripe for Transformation, Conclusion, Notes, References

  • Introduction to Biomedical Telemetry

    Exploitation of information and communication technologies (ICT) assists in a fundamental redesign of the health care processes based on the use and integration of communication technologies at all levels. Demand on radio spectrum for use in wireless biomedical telemetry systems is currently on the increase. This demand is driven by a rapid increase in the use of medical devices, advancements in wireless communication technologies, and the need to improve quality, reliability, and delivery of health care. Advances in microelectromechanical system (MEMS) and biological, chemical, electrical, and mechanical sensor technologies have led to a wide range of medical devices, such as pressure sensors, silicon microphones, accelerometers, gyroscopes, optical MEMS and image sensors, microfluidic chips, microdispensers for drug delivery, flowmeters, infrared (IR) temperature sensors, radio frequency identification (RFID) tags, and strain sensors. A number of commercial medical telemetry devices have already been reported for wearable, implantable, and ingestible applications.

  • Introduction

    This book presents the findings of ten research teams that worked between 2009 and 2012 across three continents under the auspices of the Amy Mahan Research Fellowship Program to Assess the Impact of Public Access to ICT. It seeks to fill critical gaps in the research literature regarding the impact of public shared access to computers and the Internet. In this introductory chapter, we present the background to the preparation of the book and summarize findings as we overview how the book is organized.

  • Facilitating Inclusion and Enabling the Buildup of Social Capital

    Shared public access to computers and the Internet in developing countries is often hailed as an effective, low-cost way to share the benefits of digital technology. Yet research on the economic and social effects of public access to computers is lacking. This volume offers the first systematic assessment of the impact of shared public access in the developing world, with findings from ten countries in South America, Asia, and Africa. It provides evidence that the benefits of diversified participation in digital society go beyond providing access to technology. Public access venues -- most often Internet caf??s in cities and state-run telecenters in rural areas -- are places for learning, sharing, working, empowerment and finding opportunities. The book documents the impact of public access on individuals, on society and networks, and on women. Chapters report findings and examine policy implications of research on such topics as users' perceptions of the benefits of Interne caf?? use in Jordan; ICT job training in Rwanda; understanding user motivations and risk factors for overuse and Internet addiction in China; the effect of technology use on social inclusion among low-income urban youth in Argentina; productive uses of technologies by grassroots organizations in Peru; use of technology by migrant ethnic minority Burmese women in Thailand to maintain ties with their culture and their family and friends; and women's limited access to the most ubiquitous type of venue, cybercaf??s, in practically all countries studied -- and quite severely in some places, e.g. Uttar Pradesh, India. **Contributing Editors **Erwin A. Alampay, Roxana Barrantes C??ceres, Hernan Galperin, Abiodun Jagun, George Sciadas, Ramata Molo Thioune, Kentaro Toyama **Chapter authors**Ali Farhan AbuSeileek, Carolina Aguerre, Oluwasefunmi 'Tale Arogundade, Nor Aziah Alias, Sebasti??n Ben??tez Larghi, Jorge Bossio, Juan Fernando Bossio, Marina Laura Calamari, Nikos Da anay, Jean Damasc??ne Mazimpaka, Laurent Aristide Eyinga Eyinga, Mary Luz Feranil, Ariel Fontecoba, Omar Fraihat, Martin S. Hagger, Jianbin Hao, Sulaiman Hashim, Izaham Shah Ismail, Haziah Jamaludin, Xuemei Jiang, Laura Le??n, Guoxin Li, Balwant Singh Mehta, Nidhi Mehta, Marina Moguillansky, Marhaini Mohd Noor, Avis Momeni, Th??odomir Mugiraneza, Jimena Orchuela, Patricia Pe??a Miranda, Alejandra Phillippi, Jimena Ponce de Le??n, Ghaleb Rabab'ah, Saif Addeen AlRababah, Wei Shang, Ryan V. Silverio, Sylvie Siyam Siwe, Efenita M. Taqueban, Olga Balbine Tsafack Nguekeng, Xiaoguang Yang

  • Impact on Personal Achievement and Well-Being

    Shared public access to computers and the Internet in developing countries is often hailed as an effective, low-cost way to share the benefits of digital technology. Yet research on the economic and social effects of public access to computers is lacking. This volume offers the first systematic assessment of the impact of shared public access in the developing world, with findings from ten countries in South America, Asia, and Africa. It provides evidence that the benefits of diversified participation in digital society go beyond providing access to technology. Public access venues -- most often Internet caf??s in cities and state-run telecenters in rural areas -- are places for learning, sharing, working, empowerment and finding opportunities. The book documents the impact of public access on individuals, on society and networks, and on women. Chapters report findings and examine policy implications of research on such topics as users' perceptions of the benefits of Interne caf?? use in Jordan; ICT job training in Rwanda; understanding user motivations and risk factors for overuse and Internet addiction in China; the effect of technology use on social inclusion among low-income urban youth in Argentina; productive uses of technologies by grassroots organizations in Peru; use of technology by migrant ethnic minority Burmese women in Thailand to maintain ties with their culture and their family and friends; and women's limited access to the most ubiquitous type of venue, cybercaf??s, in practically all countries studied -- and quite severely in some places, e.g. Uttar Pradesh, India. **Contributing Editors **Erwin A. Alampay, Roxana Barrantes C??ceres, Hernan Galperin, Abiodun Jagun, George Sciadas, Ramata Molo Thioune, Kentaro Toyama **Chapter authors**Ali Farhan AbuSeileek, Carolina Aguerre, Oluwasefunmi 'Tale Arogundade, Nor Aziah Alias, Sebasti??n Ben??tez Larghi, Jorge Bossio, Juan Fernando Bossio, Marina Laura Calamari, Nikos Da anay, Jean Damasc??ne Mazimpaka, Laurent Aristide Eyinga Eyinga, Mary Luz Feranil, Ariel Fontecoba, Omar Fraihat, Martin S. Hagger, Jianbin Hao, Sulaiman Hashim, Izaham Shah Ismail, Haziah Jamaludin, Xuemei Jiang, Laura Le??n, Guoxin Li, Balwant Singh Mehta, Nidhi Mehta, Marina Moguillansky, Marhaini Mohd Noor, Avis Momeni, Th??odomir Mugiraneza, Jimena Orchuela, Patricia Pe??a Miranda, Alejandra Phillippi, Jimena Ponce de Le??n, Ghaleb Rabab'ah, Saif Addeen AlRababah, Wei Shang, Ryan V. Silverio, Sylvie Siyam Siwe, Efenita M. Taqueban, Olga Balbine Tsafack Nguekeng, Xiaoguang Yang

  • The Appropriation of Computer and Internet Access by Low-Income Urban Youth in Argentina

    Our research in Buenos Aires sought to understand the ways in which youth from low-income sectors use new technologies in their daily lives and the significance they attribute to them. We focused on technology accessed at three different types of venues located in the county of La Matanza: (1) a community initiative run by a local grassroots organization, (2) an information and communication technology (ICT) training and access center run by an organization with the support of the Government of Argentina, and (3) a cybercafe . The research is centered on the practices of low-income youth in these venues and explores the modes of appropriation of ICT that contribute to changes (positive or negative) in terms of employability, education, socialization, and participation in the political realm. The research was conducted through direct observation of venues, in-depth interviews of users in public access venues, and surveys of users and nonusers. The main finding of our study is that public access venues and community centers that support public access through ICT training contribute to the social inclusion of youth in poor urban environments. Community ICT training centers (CITCs), such as the two considered in this study, satisfy training needs that are not met by market-oriented institutions or formal schooling. Cybercafe s are spaces of sociability and contact where the main activities are centered on communication and entertainment over the Internet. Given the central role of cybercafes in providing Internet access to low-income sectors, special attention should be paid to the observed decline of these facilities in marginal neighborhoods as well as nationwide. We recommend the promotion of participation by women and consider it important to disseminate information about cybercafe activities and the significance of these spaces among youth in order to strengthen links with the school environment. We suggest establishing training centers in marginalized communities, where the data reveal high rates of alienation among young people. Finally, we recommend reproducing the PC Refurbishment and Repair Workshop implemented by the La Matanza MTD center, as we have been able to appreciate how this type of initiative can help young people improve their immediate job prospects.

  • Structured Prediction Using Probabilistic Models

    Machine learning develops intelligent computer systems that are able to generalize from previously seen examples. A new domain of machine learning, in which the prediction must satisfy the additional constraints found in structured data, poses one of machine learning's greatest challenges: learning functional dependencies between arbitrary input and output domains. This volume presents and analyzes the state of the art in machine learning algorithms and theory in this novel field. The contributors discuss applications as diverse as machine translation, document markup, computational biology, and information extraction, among others, providing a timely overview of an exciting field. Contributors Yasemin Altun, Gï¿¿ï¿¿khan Bakir [no dot over i], Olivier Bousquet, Sumit Chopra, Corinna Cortes, Hal Daumï¿¿ï¿¿ III, Ofer Dekel, Zoubin Ghahramani, Raia Hadsell, Thomas Hofmann, Fu Jie Huang, Yann LeCun, Tobias Mann, Daniel Marcu, David McAllester, Mehryar Mohri, William Stafford Noble, Fernando Pï¿¿ï¿¿rez-Cruz, Massimiliano Pontil, Marc'Aurelio Ranzato, Juho Rousu, Craig Saunders, Bernhard Schï¿¿ï¿¿lkopf, Matthias W. Seeger, Shai Shalev-Shwartz, John Shawe-Taylor, Yoram Singer, Alexander J. Smola, Sandor Szedmak, Ben Taskar, Ioannis Tsochantaridis, S.V.N Vishwanathan, Jason Weston Gï¿¿ï¿¿khan Bakir [no dot over i] is Research Scientist at the Max Planck Institute for Biological Cybernetics in Tï¿¿ï¿¿bingen, Germany. Thomas Hofmann is a Director of Engineering at Google's Engineering Center in Zurich and Adjunct Associate Professor of Computer Science at Brown University. Bernhard Schï¿¿ï¿¿lkopf is Director of the Max Planck Institute for Biological Cybernetics and Professor at the Technical University Berlin. Alexander J. Smola is Senior Principal Researcher and Mac hine Learning Program Leader at National ICT Australia/Australian National University, Canberra. Ben Taskar is Assistant Professor in the Computer and Information Science Department at the University of Pennsylvania. S. V. N. Vishwanathan is Senior Researcher in the Statistical Machine Learning Program, National ICT Australia with an adjunct appointment at the Research School for Information Sciences and Engineering, Australian National University.

  • Conclusion: Governance of Global Electronic Networks: The Contrasting Views of Dominant and Nondominant Actors

    This chapter contains sections titled: , Four Guiding Questions, Some Definitions, Question Number One, World Summit on the Information Society (WSIS) as a Site of Contestation over Global ICT Governance, Question Number Two, Question Number Three, Question Number Four, Frames, Concepts, Cause and Effect, Details, Dynamics, Downstream Linkages, and Freedom of Choice, Reframing the Question: Introducing the Quad, Conclusions, Notes, References

  • User Perceptions of Impact of Internet Cafés in Amman, Jordan

    This study analyzes users' perception of the impact of Internet cafe s on three aspects of their lives: social networking, education and learning, and income and employment. The study is based on a sample of 336 Internet cafe users and twenty-four operators in Amman, Jordan. Internet cafe users strongly perceive that these venues have improved their lives by expanding their social networks and improving their education and learning. Perceived impact on income or employment was lower than for the other two impact areas but was not insignificant, especially among male users. The Jordanian government's policy of increasing the number of licenses for private cafe operators is to be commended. There is, however, an area of major concern. Although women benefit from cybercafes as much as men, comparatively few women use these venues, and those who use them do so infrequently. The disparity is most acute in low- income neighborhoods. Understanding whether the observed gender disparities are culturally determined or the result of the environment prevalent in cybercafes and designing and implementing suitable policies to increase women's use of cybercafes should be high priorities for both researchers and government officials.

  • A Place to Learn, a Place to Play, a Place to Dream, a Place to Fall from Grace

    Shared public access to computers and the Internet in developing countries is often hailed as an effective, low-cost way to share the benefits of digital technology. Yet research on the economic and social effects of public access to computers is lacking. This volume offers the first systematic assessment of the impact of shared public access in the developing world, with findings from ten countries in South America, Asia, and Africa. It provides evidence that the benefits of diversified participation in digital society go beyond providing access to technology. Public access venues -- most often Internet caf??s in cities and state-run telecenters in rural areas -- are places for learning, sharing, working, empowerment and finding opportunities. The book documents the impact of public access on individuals, on society and networks, and on women. Chapters report findings and examine policy implications of research on such topics as users' perceptions of the benefits of Interne caf?? use in Jordan; ICT job training in Rwanda; understanding user motivations and risk factors for overuse and Internet addiction in China; the effect of technology use on social inclusion among low-income urban youth in Argentina; productive uses of technologies by grassroots organizations in Peru; use of technology by migrant ethnic minority Burmese women in Thailand to maintain ties with their culture and their family and friends; and women's limited access to the most ubiquitous type of venue, cybercaf??s, in practically all countries studied -- and quite severely in some places, e.g. Uttar Pradesh, India. **Contributing Editors **Erwin A. Alampay, Roxana Barrantes C??ceres, Hernan Galperin, Abiodun Jagun, George Sciadas, Ramata Molo Thioune, Kentaro Toyama **Chapter authors**Ali Farhan AbuSeileek, Carolina Aguerre, Oluwasefunmi 'Tale Arogundade, Nor Aziah Alias, Sebasti??n Ben??tez Larghi, Jorge Bossio, Juan Fernando Bossio, Marina Laura Calamari, Nikos Da anay, Jean Damasc??ne Mazimpaka, Laurent Aristide Eyinga Eyinga, Mary Luz Feranil, Ariel Fontecoba, Omar Fraihat, Martin S. Hagger, Jianbin Hao, Sulaiman Hashim, Izaham Shah Ismail, Haziah Jamaludin, Xuemei Jiang, Laura Le??n, Guoxin Li, Balwant Singh Mehta, Nidhi Mehta, Marina Moguillansky, Marhaini Mohd Noor, Avis Momeni, Th??odomir Mugiraneza, Jimena Orchuela, Patricia Pe??a Miranda, Alejandra Phillippi, Jimena Ponce de Le??n, Ghaleb Rabab'ah, Saif Addeen AlRababah, Wei Shang, Ryan V. Silverio, Sylvie Siyam Siwe, Efenita M. Taqueban, Olga Balbine Tsafack Nguekeng, Xiaoguang Yang



Standards related to ICT

Back to Top

No standards are currently tagged "ICT"