SlideShare a Scribd company logo
1 of 11
Structural Immunity and Technology Diffusion in Nepal:
Planned Technology and Unplanned Adaptation
Raj Kumar Bhattarai
Nepal Commerce Campus
Faculty of Management
Tribhuvan University
raj.bhattarai@outlook.com
1
The parable
 Technology planners, carriers, and adopters develop immunity
 Congruence between planned technology and planned
adaptation is essential
 Structural setting and technology diffusion are reciprocals
2
Technology planning context in Nepal
 Absence of technology planning before 1956
 Continuation of technology planning from 1956
 More than a half-century long planned technology
 No more changes in the contents and discourses of technology
planning priorities
 Continuity in reappearances of the technology planning priorities in
one after another periodic plans from 1956 to the year 2010
 No significant achievement in the process of technology development
and diffusion in the country
3
Statement of the problem
 What were the technology planning priorities and structural
settings during the planned economic efforts of more than 50
years in Nepal?
 How well the technology planning priorities and structural
setting aligned for the technology diffusion in Nepal?
4
Methods
 Overview of 5849 plus pages of the periodic plan and review
documents of Nepal (1956 to 2010)
 Overview of the structural/organizational setting for the
technology diffusion as envisaged in the plan documents
 Interviews with opinion leaders from the
structural/organizational settings
 Contents/discourse analysis and triangulation of the contents
and discourses with intuitive evaluation
5
Data sources for the content/discourse analysis
 Planning priorities in the 12 periodic planning and review
documents (1956-2013)
 Priorities and focused areas of the country’s technology
policies and acts
 Functional areas and objectives of the selected organizations
 Response of the opinion leaders
6
Discussion
 Agricultural technology prioritized but farmers’ were working with
their own ways of cultivating, farming, and harvesting
 Promotion/development of indigenous/local technology
emphasized but there was no more assessment of its mechanisms
 Developmental projects based on foreign assistance but there was
NO use of indigenous/local technology
 Information Technology (IT) development and adaptation
intended but there were no more efforts of integrating IT in agriculture,
manufacturing, and service industries
 Technological development was highly intended but there was no
regulator for guiding and facilitating in the area
7
Structural setting for technology diffusion
TECHNOL
OGY
DIFFUSIO
N
Regulato
ry
Organizi
ng
culture
Industry
and
services
Agricultu
re
Educatio
n and IT
Complia
nce
Conclusion: structural immunity to technology diffusion
 Agriculture sector immunity: The farmers were habitual with
traditional technology/processes and they were unable to adopt
new technology in absence of socioeconomic compatibility
 Industrial sector immunity: There was incompatibility with
hardware, software, brainware, know-how and know-why
 Educational sector immunity: The instructors and students both
were uncomfortable with the new course contents and the teaching
pedagogy
 Governmental sector immunity: Government officials were
more authoritarian instead of cooperative consultant
 Organizing cultural sector immunity: Solidarity was
mechanistic with a rigid authority hierarchy in parallel of national
planning priorities
 Compliance sector immunity: Good (corporate) governance 9
QUESTIONS PLEASE
10
THANKS
11

More Related Content

Viewers also liked

Modelling the effect of Conservation Agriculture on soil loss in Madagascar, ...
Modelling the effect of Conservation Agriculture on soil loss in Madagascar, ...Modelling the effect of Conservation Agriculture on soil loss in Madagascar, ...
Modelling the effect of Conservation Agriculture on soil loss in Madagascar, ...FreddyVHulst
 
Patriot Plaza/SNC - Rostrum
Patriot Plaza/SNC - RostrumPatriot Plaza/SNC - Rostrum
Patriot Plaza/SNC - Rostrumnhenry1965
 
How to prepare a thematic review?
How to prepare a thematic review?How to prepare a thematic review?
How to prepare a thematic review?Raj Bhattarai
 
Module 1 - TLC Training
Module 1 - TLC TrainingModule 1 - TLC Training
Module 1 - TLC TrainingMichael Forder
 
Cultural configuration and immunity to change
Cultural configuration and immunity to changeCultural configuration and immunity to change
Cultural configuration and immunity to changeRaj Bhattarai
 

Viewers also liked (10)

MUSIC GAME
MUSIC GAMEMUSIC GAME
MUSIC GAME
 
Modelling the effect of Conservation Agriculture on soil loss in Madagascar, ...
Modelling the effect of Conservation Agriculture on soil loss in Madagascar, ...Modelling the effect of Conservation Agriculture on soil loss in Madagascar, ...
Modelling the effect of Conservation Agriculture on soil loss in Madagascar, ...
 
Patriot Plaza/SNC - Rostrum
Patriot Plaza/SNC - RostrumPatriot Plaza/SNC - Rostrum
Patriot Plaza/SNC - Rostrum
 
How to prepare a thematic review?
How to prepare a thematic review?How to prepare a thematic review?
How to prepare a thematic review?
 
Vision Prospectiva
Vision ProspectivaVision Prospectiva
Vision Prospectiva
 
Numericals 08
Numericals 08Numericals 08
Numericals 08
 
Module 1 - TLC Training
Module 1 - TLC TrainingModule 1 - TLC Training
Module 1 - TLC Training
 
Sign out overview
Sign out overviewSign out overview
Sign out overview
 
Numericals 09
Numericals 09Numericals 09
Numericals 09
 
Cultural configuration and immunity to change
Cultural configuration and immunity to changeCultural configuration and immunity to change
Cultural configuration and immunity to change
 

Recently uploaded

Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...FIDO Alliance
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceSamy Fodil
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...ScyllaDB
 
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfLinux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfFIDO Alliance
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingScyllaDB
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxFIDO Alliance
 
TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024Stephen Perrenod
 
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfThe Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfFIDO Alliance
 
Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessStructuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessUXDXConf
 
State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!Memoori
 
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The InsideCollecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The InsideStefan Dietze
 
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...FIDO Alliance
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfSrushith Repakula
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentationyogeshlabana357357
 
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfSimplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfFIDO Alliance
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch TuesdayIvanti
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxFIDO Alliance
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Skynet Technologies
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024Lorenzo Miniero
 

Recently uploaded (20)

Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM Performance
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
 
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfLinux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream Processing
 
Overview of Hyperledger Foundation
Overview of Hyperledger FoundationOverview of Hyperledger Foundation
Overview of Hyperledger Foundation
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptx
 
TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024
 
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfThe Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
 
Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessStructuring Teams and Portfolios for Success
Structuring Teams and Portfolios for Success
 
State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!
 
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The InsideCollecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
 
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentation
 
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfSimplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch Tuesday
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptx
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024
 

Structural immunity to technology diffusion in nepal

  • 1. Structural Immunity and Technology Diffusion in Nepal: Planned Technology and Unplanned Adaptation Raj Kumar Bhattarai Nepal Commerce Campus Faculty of Management Tribhuvan University raj.bhattarai@outlook.com 1
  • 2. The parable  Technology planners, carriers, and adopters develop immunity  Congruence between planned technology and planned adaptation is essential  Structural setting and technology diffusion are reciprocals 2
  • 3. Technology planning context in Nepal  Absence of technology planning before 1956  Continuation of technology planning from 1956  More than a half-century long planned technology  No more changes in the contents and discourses of technology planning priorities  Continuity in reappearances of the technology planning priorities in one after another periodic plans from 1956 to the year 2010  No significant achievement in the process of technology development and diffusion in the country 3
  • 4. Statement of the problem  What were the technology planning priorities and structural settings during the planned economic efforts of more than 50 years in Nepal?  How well the technology planning priorities and structural setting aligned for the technology diffusion in Nepal? 4
  • 5. Methods  Overview of 5849 plus pages of the periodic plan and review documents of Nepal (1956 to 2010)  Overview of the structural/organizational setting for the technology diffusion as envisaged in the plan documents  Interviews with opinion leaders from the structural/organizational settings  Contents/discourse analysis and triangulation of the contents and discourses with intuitive evaluation 5
  • 6. Data sources for the content/discourse analysis  Planning priorities in the 12 periodic planning and review documents (1956-2013)  Priorities and focused areas of the country’s technology policies and acts  Functional areas and objectives of the selected organizations  Response of the opinion leaders 6
  • 7. Discussion  Agricultural technology prioritized but farmers’ were working with their own ways of cultivating, farming, and harvesting  Promotion/development of indigenous/local technology emphasized but there was no more assessment of its mechanisms  Developmental projects based on foreign assistance but there was NO use of indigenous/local technology  Information Technology (IT) development and adaptation intended but there were no more efforts of integrating IT in agriculture, manufacturing, and service industries  Technological development was highly intended but there was no regulator for guiding and facilitating in the area 7
  • 8. Structural setting for technology diffusion TECHNOL OGY DIFFUSIO N Regulato ry Organizi ng culture Industry and services Agricultu re Educatio n and IT Complia nce
  • 9. Conclusion: structural immunity to technology diffusion  Agriculture sector immunity: The farmers were habitual with traditional technology/processes and they were unable to adopt new technology in absence of socioeconomic compatibility  Industrial sector immunity: There was incompatibility with hardware, software, brainware, know-how and know-why  Educational sector immunity: The instructors and students both were uncomfortable with the new course contents and the teaching pedagogy  Governmental sector immunity: Government officials were more authoritarian instead of cooperative consultant  Organizing cultural sector immunity: Solidarity was mechanistic with a rigid authority hierarchy in parallel of national planning priorities  Compliance sector immunity: Good (corporate) governance 9