Conferences related to ICT

Back to Top

2014 IEEE Frontiers in Education Conference (FIE)

The Frontiers in Education (FIE)Conference is the major international conference about educational innovations and research in engineering and computing. FIE 2014 continues a long tradition of disseminating results in these areas. It is an ideal forum for sharing ideas; learning about developments in computer science, engineering, and technology education; and interacting with colleagues in these fields.

  • 2013 IEEE Frontiers in Education Conference (FIE)

    The Frontiers in Education (FIE)Conference is the major international conference about educational innovations and research in engineering and computing. FIE 2013 continues a long tradition of disseminating results in these areas. It is an ideal forum for sharing ideas; learning about developments in computer science, engineering, and technology education; and interacting with colleagues in these fields.

  • 2012 IEEE Frontiers in Education Conference (FIE)

    The Frontiers in Education (FIE)Conference is the major international conference about educational innovations and research in engineering and computing. FIE 2012 continues a long tradition of disseminating results in these areas. It is an ideal forum for sharing ideas; learning about developments in computer science, engineering, and technology education; and interacting with colleagues in these fields.

  • 2011 Frontiers in Education Conference (FIE)

    The Frontiers in Education (FIE) Conference is the major international conference about educational innovations and research in engineering and computing. FIE 2011 continues a long tradition of disseminating results in these areas. It is an ideal forum for sharing ideas; learning about developments in computer science, engineering, and technology education; and interacting with colleagues in these fields.

  • 2010 IEEE Frontiers in Education Conference (FIE)

    (FIE) Conference is a major international conference devoted to improvements in computer science, engineering, and technology (CSET) education. FIE 2008 continues a long tradition of disseminating educational research results and innovative practices in CSET education. It is an ideal forum for sharing ideas, learning about developments in CSET education, and interacting with colleagues.


2013 7th IEEE International Conference on Digital Ecosystems and Technologies (DEST) - Complex Environment Engineering

The essence of digital ecosystems is the adoption of ecological system concepts, and creating value by making connections through collective intelligence and promoting collaboration instead of unbridled competition and ICT-based catalyst effects in a number of domains, to produce networked enriched communities and solutions. IEEE DEST 2013 with its special theme of - Complex Environment Engineering recognizes the key role of business process data modeling, representation and privacy-aware analysis for Digital Ecosystems, and vice versa. Further, the Innovation Adoption Forum underpins the importance of public-private partnership as the key for delivering sustainable solutions for our Complex Living and Business Environment – and thus our Digital Ecosystem Habitat. Our Keynotes, Panels and Sessions will tackle the multifaceted challenges and solutions from various stakeholders’ perspectives.

  • 2012 6th IEEE International Conference on Digital Ecosystems and Technologies (DEST) - Complex Environment Engineering

    Traditional ICT-support has often increased complexity, thus making the challenges even more severe. The Digital Ecosystem perspective aims to address the twofold challenge of Complex Environment Engineering and Digital Ecosystem Technology mapping. The complexity of both the challenges and the technological solutions has to be acknowledged.

  • 2011 5th IEEE International Conference on Digital Ecosystems and Technologies (DEST)

    The digital ecosystem is defined as an open, loosely coupled, demand-driven, domain clustered, agent-based self organized collaborative environment where species/agents form a temporary coalition (or longer term) for a specific purpose or goals, and everyone is proactive and responsive for its own benefit or profit. The essence of digital ecosystems is creating value by making connections through collective intelligence. Digital Ecosystems promote collaboration instead of unbridled competition and ICT based

  • 2010 4th IEEE International Conference on Digital Ecosystems and Technologies (DEST)

    The digital ecosystem is defined as an open, loosely coupled, demand driven, domain clustered, agent based self organized collaborative environment where species/agents form a temporary coalition (or longer term) for a specific purpose or goals, and everyone is proactive and responsive for its own benefit or profit. The essence of digital ecosystems is creating value by making connections through collective intelligence. Digital Ecosystems promote collaboration instead of unbridled competition and ICT based

  • 2009 3rd IEEE International Conference on Digital Ecosystems and Technologies (DEST)

    The digital ecosystem is defined as an open, loosely coupled, domain clustered, demand-driven, self-organising agents environment, where each species is proactive and responsive for its own benefit or profit. The underlying technology for digital ecosystems is composed of extended web services architecture, self-organising intelligent agents, ontology-based knowledge sharing and a swarm intelligence-based recommendation system.

  • 2008 2nd IEEE International Conference on Digital Ecosystems and Technologies (DEST)

    The 2nd IEEE DEST conference will become the main international forum for researchers and practitioners to exchange information regarding advancements in the practice of advanced models for designing and deploying inter-organisational digital business processes involving networks of small and medium enterprise.


2013 9th International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM)

All areas related to wireless communications, network technologies, and mobile computing systems.


2012 IEEE International Symposium on Sustainable Systems and Technology (ISSST)

The symposium is a forum for exchange of knowledge related to systems approaches to sustainability in the context of technological change.

  • 2011 IEEE International Symposium on Sustainable Systems and Technology (ISSST)

    This conference was known between 1993 and 2008 as the IEEE International Symposium on Electronics and the Environment. The program includes sessions covering the spectrum of issues for assessing and managing products and services across their life cycle, and the design, management, and policy implications of sustainable engineered systems and technologies, including design for environment, design for sustainability, materials selection, energy management, end-of-life policy and reuse/recycling.

  • 2010 IEEE International Symposium on Sustainable Systems and Technology (ISSST)

    The program includes sessions covering the spectrum of issues for assessing and managing products and services across their life cycle, and the design, management, and policy implications of sustainable engineered systems and technologies, including design for environment, design for sustainability, materials selection, energy management, end-of-life policy and reuse/recycling, process integration, and institutional and policy implications of services and technology systems.

  • 2009 IEEE International Symposium on Sustainable Systems and Technology (ISSST) (Formerly known as ISEE)

    Conference will cover environmental and social implications of ICT technologies, including services. Areas of focus will include industrial ecology, design for environment, design for sustainability, emerging technologies, and sustainable ICT services

  • 2008 IEEE International Symposium on Electronics and the Environment (ISEE)

    Issues associated with sustainable environmental and health of engineered systems, with a focus on information and communication technology systems.

  • 2007 IEEE International Symposium on Electronics and the Environment (ISEE)

  • 2006 IEEE International Symposium on Electronics and the Environment (ISEE) in conjunction with Electronics Recycling Summit


2012 International Conference on Management and Service Science (MASS 2012)

Enterprise Management, Engineering Management, Service Science, Financial Management, Knowledge Management


More Conferences

Periodicals related to ICT

Back to Top

Engineering Management, IEEE Transactions on

Management of technical functions such as research, development, and engineering in industry, government, university, and other settings. Emphasis is on studies carried on within an organization to help in decision making or policy formation for RD&E.


Internet Computing, IEEE

IEEE Internet Computing provides journal-quality evaluation and review of emerging and maturing Internet technologies and applications. The magazine targets the technical and scientific Internet user communities as well as designers and developers of Internet-based applications and enabling technologies. IC publishes refereed articles on the latest developments and key trends in Internet technologies and applications. A crossroads between academic researchers and ...


Power Delivery, IEEE Transactions on

Research, development, design, application, construction, the installation and operation of apparatus, equipment, structures, materials, and systems for the safe, reliable, and economic delivery and control of electric energy for general industrial, commercial, public, and domestic consumption.


Professional Communication, IEEE Transactions on

The study, development, improvement, and promotion of techniques for preparing, organizing for use, processing, editing, collecting, conserving, and disseminating any form of information in the electrical and electronics fields.




Xplore Articles related to ICT

Back to Top

The Piloting Researches on Collaborative Lesson-Preparing Based on Eduwiki Platform

Chaohua Gong; Yueliang Zhou 2008 International Conference on Computer Science and Software Engineering, 2008

This paper describes a collaborative lesson-preparing platform, named Eduwiki, which supports a community of inservice teachers creating, sharing, and improving capacity of lesson-preparing. The main purpose of this study compares what method is good for lesson-preparing and explores what motivates or hinders teachers to do collaborative lesson-preparing. Findings suggest that compared with uploading lesson plans, collaborative lesson-preparing activity in Eduwiki ...


Decision Support System for Fetal Delivery Using Soft Computing Techniques

R. R. Janghel; Anupam Shukla; Ritu Tiwari 2009 Fourth International Conference on Computer Sciences and Convergence Information Technology, 2009

In the present work an attempt is made to develop a decision support system (DSS) using the pathological attributes to predict the fetal delivery to be done normal or by surgical procedure. The pathological tests like blood sugar (BR), blood pressure (BP), resistivity index (RI) and systolic/diastolic (S/P) ratio will be recorded at the time of delivery. All attributes lie ...


Robustness of secret key agreement protocol with massive MIMO under pilot contamination attack

Sanghun Im; Hyoungsuk Jeon; Jinho Choi; Jeongseok Ha 2013 International Conference on ICT Convergence (ICTC), 2013

We consider a secret key agreement (SKA) protocol over time division duplex for a massive Multiple-Input-Multiple-Output (MIMO) system. As a security threat, we assume that a pilot contamination attack (PCA) is attempted by an eavesdropper for the purpose to gain information about the secret key. The eavesdropper controls its transmit power for the PCA in a way to maximize the ...


Study of RFID Middleware for Distributed Large-scale Systems

Feng Bo; Li Jin-Tao; Zhang Ping; Guo Jun-Bo; Ding Zhen-Hua 2006 2nd International Conference on Information & Communication Technologies, 2006

The potential for RFID applications appears virtually limitless and there is a variety of applications for RFID in manufacture, supply chain, retail inventory control, transportation, agriculture, construction, etc. But the adoption of RFID in business fields faces several challenges. This paper identifies these challenges posed by the Internet-scale RFID-based systems. Then we propose a three layered middleware architecture which separates ...


A study on wireless secret key randomness in multiuser networks

Seon Yeob Baek; Jongwook Park 2013 International Conference on ICT Convergence (ICTC), 2013

Wireless communication has been confronted with security issues due to natural broadcast of signal. Therefore, wireless networks have relied on cryptographic algorithms to support data confidentiality and integrity. Recently, secret key generation schemes exploiting wireless characteristics have been proposed for the symmetric-key based cryptographic algorithms. In this paper, we propose a wireless secret key generation scheme in multiuser networks and ...


More Xplore Articles

Educational Resources on ICT

Back to Top

eLearning

The Piloting Researches on Collaborative Lesson-Preparing Based on Eduwiki Platform

Chaohua Gong; Yueliang Zhou 2008 International Conference on Computer Science and Software Engineering, 2008

This paper describes a collaborative lesson-preparing platform, named Eduwiki, which supports a community of inservice teachers creating, sharing, and improving capacity of lesson-preparing. The main purpose of this study compares what method is good for lesson-preparing and explores what motivates or hinders teachers to do collaborative lesson-preparing. Findings suggest that compared with uploading lesson plans, collaborative lesson-preparing activity in Eduwiki ...


Decision Support System for Fetal Delivery Using Soft Computing Techniques

R. R. Janghel; Anupam Shukla; Ritu Tiwari 2009 Fourth International Conference on Computer Sciences and Convergence Information Technology, 2009

In the present work an attempt is made to develop a decision support system (DSS) using the pathological attributes to predict the fetal delivery to be done normal or by surgical procedure. The pathological tests like blood sugar (BR), blood pressure (BP), resistivity index (RI) and systolic/diastolic (S/P) ratio will be recorded at the time of delivery. All attributes lie ...


Robustness of secret key agreement protocol with massive MIMO under pilot contamination attack

Sanghun Im; Hyoungsuk Jeon; Jinho Choi; Jeongseok Ha 2013 International Conference on ICT Convergence (ICTC), 2013

We consider a secret key agreement (SKA) protocol over time division duplex for a massive Multiple-Input-Multiple-Output (MIMO) system. As a security threat, we assume that a pilot contamination attack (PCA) is attempted by an eavesdropper for the purpose to gain information about the secret key. The eavesdropper controls its transmit power for the PCA in a way to maximize the ...


Study of RFID Middleware for Distributed Large-scale Systems

Feng Bo; Li Jin-Tao; Zhang Ping; Guo Jun-Bo; Ding Zhen-Hua 2006 2nd International Conference on Information & Communication Technologies, 2006

The potential for RFID applications appears virtually limitless and there is a variety of applications for RFID in manufacture, supply chain, retail inventory control, transportation, agriculture, construction, etc. But the adoption of RFID in business fields faces several challenges. This paper identifies these challenges posed by the Internet-scale RFID-based systems. Then we propose a three layered middleware architecture which separates ...


A study on wireless secret key randomness in multiuser networks

Seon Yeob Baek; Jongwook Park 2013 International Conference on ICT Convergence (ICTC), 2013

Wireless communication has been confronted with security issues due to natural broadcast of signal. Therefore, wireless networks have relied on cryptographic algorithms to support data confidentiality and integrity. Recently, secret key generation schemes exploiting wireless characteristics have been proposed for the symmetric-key based cryptographic algorithms. In this paper, we propose a wireless secret key generation scheme in multiuser networks and ...


More eLearning Resources

IEEE-USA E-Books

  • A Place to Learn, a Place to Play, a Place to Dream, a Place to Fall from Grace

    Shared public access to computers and the Internet in developing countries is often hailed as an effective, low-cost way to share the benefits of digital technology. Yet research on the economic and social effects of public access to computers is lacking. This volume offers the first systematic assessment of the impact of shared public access in the developing world, with findings from ten countries in South America, Asia, and Africa. It provides evidence that the benefits of diversified participation in digital society go beyond providing access to technology. Public access venues -- most often Internet caf??s in cities and state-run telecenters in rural areas -- are places for learning, sharing, working, empowerment and finding opportunities. The book documents the impact of public access on individuals, on society and networks, and on women. Chapters report findings and examine policy implications of research on such topics as users' perceptions of the benefits of Interne caf?? use in Jordan; ICT job training in Rwanda; understanding user motivations and risk factors for overuse and Internet addiction in China; the effect of technology use on social inclusion among low-income urban youth in Argentina; productive uses of technologies by grassroots organizations in Peru; use of technology by migrant ethnic minority Burmese women in Thailand to maintain ties with their culture and their family and friends; and women's limited access to the most ubiquitous type of venue, cybercaf??s, in practically all countries studied -- and quite severely in some places, e.g. Uttar Pradesh, India. **Contributing Editors **Erwin A. Alampay, Roxana Barrantes C??ceres, Hernan Galperin, Abiodun Jagun, George Sciadas, Ramata Molo Thioune, Kentaro Toyama **Chapter authors**Ali Farhan AbuSeileek, Carolina Aguerre, Oluwasefunmi 'Tale Arogundade, Nor Aziah Alias, Sebasti??n Ben??tez Larghi, Jorge Bossio, Juan Fernando Bossio, Marina Laura Calamari, Nikos Da anay, Jean Damasc??ne Mazimpaka, Laurent Aristide Eyinga Eyinga, Mary Luz Feranil, Ariel Fontecoba, Omar Fraihat, Martin S. Hagger, Jianbin Hao, Sulaiman Hashim, Izaham Shah Ismail, Haziah Jamaludin, Xuemei Jiang, Laura Le??n, Guoxin Li, Balwant Singh Mehta, Nidhi Mehta, Marina Moguillansky, Marhaini Mohd Noor, Avis Momeni, Th??odomir Mugiraneza, Jimena Orchuela, Patricia Pe??a Miranda, Alejandra Phillippi, Jimena Ponce de Le??n, Ghaleb Rabab'ah, Saif Addeen AlRababah, Wei Shang, Ryan V. Silverio, Sylvie Siyam Siwe, Efenita M. Taqueban, Olga Balbine Tsafack Nguekeng, Xiaoguang Yang

  • Public Access Impact and Policy Implications

    This chapter summarizes the findings of previous chapters and, for completeness, also draws on significant findings from prior studies in search of patterns of use and impact that apply across countries and inform public access policy. Three themes emerge. First, public access enables most users to achieve personal objectives such as learning, communicating with family and friends, enhancing work skills and job prospects (Rwanda), and entertaining themselves (China). Not all impacts are positive: overuse can adversely affect school performance (Cameroon) and personal life spheres (China). Second, public access enables users to expand their social networks and build up social capital (Malaysia, Jordan), facilitates social inclusion (Argentina), and makes it easier for rural grassroots organizations to develop specific capacities, such as interacting with external agents (Peru). Third, although women and underprivileged groups can benefit significantly, their access to the most ubiquitous type of venue, cybercafes, is frequently limited, in some countries severely. This major obstacle must be overcome if public access benefits are to be widespread and equitable. The chapter ends with a discussion of policy design considerations regarding mobiles and public access, information and communication technology (ICT) skills training, telecenter establishment, cybercafe regulation, and options for redressing cybercafe gender imbalance.

  • About the Authors

    This chapter contains sections titled: Lead Editor, Contributing Editors, Chapter Authors

  • Index

    Shared public access to computers and the Internet in developing countries is often hailed as an effective, low-cost way to share the benefits of digital technology. Yet research on the economic and social effects of public access to computers is lacking. This volume offers the first systematic assessment of the impact of shared public access in the developing world, with findings from ten countries in South America, Asia, and Africa. It provides evidence that the benefits of diversified participation in digital society go beyond providing access to technology. Public access venues -- most often Internet caf??s in cities and state-run telecenters in rural areas -- are places for learning, sharing, working, empowerment and finding opportunities. The book documents the impact of public access on individuals, on society and networks, and on women. Chapters report findings and examine policy implications of research on such topics as users' perceptions of the benefits of Interne caf?? use in Jordan; ICT job training in Rwanda; understanding user motivations and risk factors for overuse and Internet addiction in China; the effect of technology use on social inclusion among low-income urban youth in Argentina; productive uses of technologies by grassroots organizations in Peru; use of technology by migrant ethnic minority Burmese women in Thailand to maintain ties with their culture and their family and friends; and women's limited access to the most ubiquitous type of venue, cybercaf??s, in practically all countries studied -- and quite severely in some places, e.g. Uttar Pradesh, India. **Contributing Editors **Erwin A. Alampay, Roxana Barrantes C??ceres, Hernan Galperin, Abiodun Jagun, George Sciadas, Ramata Molo Thioune, Kentaro Toyama **Chapter authors**Ali Farhan AbuSeileek, Carolina Aguerre, Oluwasefunmi 'Tale Arogundade, Nor Aziah Alias, Sebasti??n Ben??tez Larghi, Jorge Bossio, Juan Fernando Bossio, Marina Laura Calamari, Nikos Da anay, Jean Damasc??ne Mazimpaka, Laurent Aristide Eyinga Eyinga, Mary Luz Feranil, Ariel Fontecoba, Omar Fraihat, Martin S. Hagger, Jianbin Hao, Sulaiman Hashim, Izaham Shah Ismail, Haziah Jamaludin, Xuemei Jiang, Laura Le??n, Guoxin Li, Balwant Singh Mehta, Nidhi Mehta, Marina Moguillansky, Marhaini Mohd Noor, Avis Momeni, Th??odomir Mugiraneza, Jimena Orchuela, Patricia Pe??a Miranda, Alejandra Phillippi, Jimena Ponce de Le??n, Ghaleb Rabab'ah, Saif Addeen AlRababah, Wei Shang, Ryan V. Silverio, Sylvie Siyam Siwe, Efenita M. Taqueban, Olga Balbine Tsafack Nguekeng, Xiaoguang Yang

  • Impact on Women

    Shared public access to computers and the Internet in developing countries is often hailed as an effective, low-cost way to share the benefits of digital technology. Yet research on the economic and social effects of public access to computers is lacking. This volume offers the first systematic assessment of the impact of shared public access in the developing world, with findings from ten countries in South America, Asia, and Africa. It provides evidence that the benefits of diversified participation in digital society go beyond providing access to technology. Public access venues -- most often Internet caf??s in cities and state-run telecenters in rural areas -- are places for learning, sharing, working, empowerment and finding opportunities. The book documents the impact of public access on individuals, on society and networks, and on women. Chapters report findings and examine policy implications of research on such topics as users' perceptions of the benefits of Interne caf?? use in Jordan; ICT job training in Rwanda; understanding user motivations and risk factors for overuse and Internet addiction in China; the effect of technology use on social inclusion among low-income urban youth in Argentina; productive uses of technologies by grassroots organizations in Peru; use of technology by migrant ethnic minority Burmese women in Thailand to maintain ties with their culture and their family and friends; and women's limited access to the most ubiquitous type of venue, cybercaf??s, in practically all countries studied -- and quite severely in some places, e.g. Uttar Pradesh, India. **Contributing Editors **Erwin A. Alampay, Roxana Barrantes C??ceres, Hernan Galperin, Abiodun Jagun, George Sciadas, Ramata Molo Thioune, Kentaro Toyama **Chapter authors**Ali Farhan AbuSeileek, Carolina Aguerre, Oluwasefunmi 'Tale Arogundade, Nor Aziah Alias, Sebasti??n Ben??tez Larghi, Jorge Bossio, Juan Fernando Bossio, Marina Laura Calamari, Nikos Da anay, Jean Damasc??ne Mazimpaka, Laurent Aristide Eyinga Eyinga, Mary Luz Feranil, Ariel Fontecoba, Omar Fraihat, Martin S. Hagger, Jianbin Hao, Sulaiman Hashim, Izaham Shah Ismail, Haziah Jamaludin, Xuemei Jiang, Laura Le??n, Guoxin Li, Balwant Singh Mehta, Nidhi Mehta, Marina Moguillansky, Marhaini Mohd Noor, Avis Momeni, Th??odomir Mugiraneza, Jimena Orchuela, Patricia Pe??a Miranda, Alejandra Phillippi, Jimena Ponce de Le??n, Ghaleb Rabab'ah, Saif Addeen AlRababah, Wei Shang, Ryan V. Silverio, Sylvie Siyam Siwe, Efenita M. Taqueban, Olga Balbine Tsafack Nguekeng, Xiaoguang Yang

  • Contributors

    Machine learning develops intelligent computer systems that are able to generalize from previously seen examples. A new domain of machine learning, in which the prediction must satisfy the additional constraints found in structured data, poses one of machine learning's greatest challenges: learning functional dependencies between arbitrary input and output domains. This volume presents and analyzes the state of the art in machine learning algorithms and theory in this novel field. The contributors discuss applications as diverse as machine translation, document markup, computational biology, and information extraction, among others, providing a timely overview of an exciting field. Contributors Yasemin Altun, Gï¿¿ï¿¿khan Bakir [no dot over i], Olivier Bousquet, Sumit Chopra, Corinna Cortes, Hal Daumï¿¿ï¿¿ III, Ofer Dekel, Zoubin Ghahramani, Raia Hadsell, Thomas Hofmann, Fu Jie Huang, Yann LeCun, Tobias Mann, Daniel Marcu, David McAllester, Mehryar Mohri, William Stafford Noble, Fernando Pï¿¿ï¿¿rez-Cruz, Massimiliano Pontil, Marc'Aurelio Ranzato, Juho Rousu, Craig Saunders, Bernhard Schï¿¿ï¿¿lkopf, Matthias W. Seeger, Shai Shalev-Shwartz, John Shawe-Taylor, Yoram Singer, Alexander J. Smola, Sandor Szedmak, Ben Taskar, Ioannis Tsochantaridis, S.V.N Vishwanathan, Jason Weston Gï¿¿ï¿¿khan Bakir [no dot over i] is Research Scientist at the Max Planck Institute for Biological Cybernetics in Tï¿¿ï¿¿bingen, Germany. Thomas Hofmann is a Director of Engineering at Google's Engineering Center in Zurich and Adjunct Associate Professor of Computer Science at Brown University. Bernhard Schï¿¿ï¿¿lkopf is Director of the Max Planck Institute for Biological Cybernetics and Professor at the Technical University Berlin. Alexander J. Smola is Senior Principal Researcher and Mac hine Learning Program Leader at National ICT Australia/Australian National University, Canberra. Ben Taskar is Assistant Professor in the Computer and Information Science Department at the University of Pennsylvania. S. V. N. Vishwanathan is Senior Researcher in the Statistical Machine Learning Program, National ICT Australia with an adjunct appointment at the Research School for Information Sciences and Engineering, Australian National University.

  • A Theoretical Interlude

    Innovation in information and communication technology (ICT) fuels the growth of the global economy. How ICT markets evolve depends on politics and policy, and since the 1950s periodic overhauls of ICT policy have transformed competition and innovation. For example, in the 1980s and the 1990s a revolution in communication policy (the introduction of sweeping competition) also transformed the information market. Today, the diffusion of Internet, wireless, and broadband technology, growing modularity in the design of technologies, distributed computing infrastructures, and rapidly changing business models signal another shift. This pathbreaking examination of ICT from a political economy perspective argues that continued rapid innovation and economic growth require new approaches in global governance that will reconcile diverse interests and enable competition to flourish. The authors (two of whom were architects of international ICT policy reforms in the 1990s) discuss this crucial turning point in both theoretical and practical terms.

  • Introduction: The Distributed Architecture of Network Global Governance

    This chapter contains sections titled: The Nature of ICT Global Governance, Historical Evolution, The Global Governance of Infrastructure, The Global Governance of Networked Information, Communication, and Commerce, References

  • Introduction to Biomedical Telemetry

    Exploitation of information and communication technologies (ICT) assists in a fundamental redesign of the health care processes based on the use and integration of communication technologies at all levels. Demand on radio spectrum for use in wireless biomedical telemetry systems is currently on the increase. This demand is driven by a rapid increase in the use of medical devices, advancements in wireless communication technologies, and the need to improve quality, reliability, and delivery of health care. Advances in microelectromechanical system (MEMS) and biological, chemical, electrical, and mechanical sensor technologies have led to a wide range of medical devices, such as pressure sensors, silicon microphones, accelerometers, gyroscopes, optical MEMS and image sensors, microfluidic chips, microdispensers for drug delivery, flowmeters, infrared (IR) temperature sensors, radio frequency identification (RFID) tags, and strain sensors. A number of commercial medical telemetry devices have already been reported for wearable, implantable, and ingestible applications.

  • Women and Cybercafés in Uttar Pradesh

    The study was conducted in two mid-sized towns in India, namely, the Bhadohi and Ferozabad districts of Uttar Pradesh. We analyzed the outcome of structured in-depth interviews with 100 women users and 100 women nonusers of cybercafes. We identify the user profiles, usage patterns, and reasons for the low rate of cybercafe usage by women in northern India. Our study reveals that cybercafe usage by women is most common among female students, followed by educated women from the upper socioeconomic class. They access information mostly relating to education, employment, and entertainment. Users usually go to cybercafes during the afternoon and evening when they are relatively free from other duties. Overall, we observed that few women use cybercafes, and those who do have many socioeconomic restrictions placed on on them; these obstacles are tied to social, cultural, structural (time, location, illiteracy), and environmental issues. Women users, however, found cybercafes very useful. To close the gap between the value women perceive from cybercafe usage and actual usage, several suggestions can be made: (1) enhance literacy and awareness among women, (2) sensitize cybercafe operators to genderspecific issues and environment, (3) make content on gender issues available in local languages, (4) increase emphasis on English in schools, and (5) implement gender-specific welfare programs more thoroughly. These initiatives will not only enhance the sustainability of cybercafes but will provide wider Internet access to disadvantaged people in developing areas.



Standards related to ICT

Back to Top

No standards are currently tagged "ICT"