This document discusses the challenges of using information technology (IT) to empower women in Nigeria. It notes that while IT can be a powerful tool for empowerment, increasing women's participation in the IT field faces several obstacles. These include cultural and social norms that discourage women from technical careers, lack of access to resources and education in mathematics/science, and gender stereotypes that view IT as a male domain. The document argues that empowering women through IT is crucial to achieving development goals and creating economic opportunities, but overcoming entrenched challenges requires deliberate policies and efforts to promote gender equity in IT.
This document discusses women's health information needs in developing countries. It reviews literature on how women in developing nations seek health information and the barriers they face. Key barriers include lack of education, cultural and social norms, financial constraints, distance to resources, and gender inequality. Rural and illiterate women especially struggle to access reliable health information to make informed choices about their care.
This is the presentation prepared for MyLISA OPENS
This presentation discusses the Unit-1 of UGC prescribed text for NET examination: Role of Information
The document discusses the impact of information in society. It covers several topics:
1. How information is used in daily activities through different senses and how the amount of new information created is escalating rapidly.
2. The use of information devices, services, and how information is used by individuals for decision making, resolving uncertainty, and problem solving.
3. The impact of information technology on society from oral societies to print and digital/electronic societies and how this has changed communication and a sense of community.
4. An overview of the field of information studies, how it relates to information systems and computer science, and how it connects systems and technology to context.
Socio economic empowerment of rural women through ictsDr Lendy Spires
ICTs like mobile phones and television have helped empower rural women in India by providing access to information, opportunities for economic independence, and social networks. A study of rural women in Tamil Nadu found that most young working women owned mobile phones, which they used to stay in contact with family and friends, search for jobs and transportation information, and provide a sense of security. However, excessive mobile phone use has also led to some family and social issues. While ICTs offer benefits, ensuring rural women can safely access and take advantage of new technologies remains an ongoing challenge.
Information and communication technologies in social workDr Lendy Spires
This document discusses the importance of information and communication technologies (ICTs) for the field of social work. It argues that ICTs have greatly influenced society and will continue to influence the work of social workers and the clients they serve. While ICTs have received some attention in social work literature and curriculum, the level of attention has not matched their growth and impact. The document calls for social work education to provide greater focus on developing ICT competencies, in order to ensure social workers can effectively use technologies and uphold ethical practices in an increasingly digital age.
Implementing ICT’s in Developing Countries - Condensedbmock3
The document discusses the importance of implementing information and communication technologies (ICTs) in developing countries. It argues that ICT infrastructure is critical for improving economic and social development. However, simply building telecenters with a few computers has failed due to issues of sustainability and scalability. Going forward, delivering internet access to developing populations will require innovations in terminals, telecommunications, and power sources that are suitable for harsh conditions with limited infrastructure. Successfully implementing ICTs could allow developing nations to access benefits like education, healthcare, and government services that are increasingly information-based.
Mobile phones may provide an effective way to deliver internet access and improve communication in developing countries. While technologies like computers and infrastructure projects failed to scale effectively in the past, mobile phone usage has spread rapidly even in poor regions. A case study in Nigeria found that mobile phones could help address informational challenges in micro-businesses by enabling traders to more easily gather and share information, speeding up processes and reducing costs. However, countries must be careful not to repeat China's mistakes by implementing technologies without proper education and support systems.
This document discusses women's health information needs in developing countries. It reviews literature on how women in developing nations seek health information and the barriers they face. Key barriers include lack of education, cultural and social norms, financial constraints, distance to resources, and gender inequality. Rural and illiterate women especially struggle to access reliable health information to make informed choices about their care.
This is the presentation prepared for MyLISA OPENS
This presentation discusses the Unit-1 of UGC prescribed text for NET examination: Role of Information
The document discusses the impact of information in society. It covers several topics:
1. How information is used in daily activities through different senses and how the amount of new information created is escalating rapidly.
2. The use of information devices, services, and how information is used by individuals for decision making, resolving uncertainty, and problem solving.
3. The impact of information technology on society from oral societies to print and digital/electronic societies and how this has changed communication and a sense of community.
4. An overview of the field of information studies, how it relates to information systems and computer science, and how it connects systems and technology to context.
Socio economic empowerment of rural women through ictsDr Lendy Spires
ICTs like mobile phones and television have helped empower rural women in India by providing access to information, opportunities for economic independence, and social networks. A study of rural women in Tamil Nadu found that most young working women owned mobile phones, which they used to stay in contact with family and friends, search for jobs and transportation information, and provide a sense of security. However, excessive mobile phone use has also led to some family and social issues. While ICTs offer benefits, ensuring rural women can safely access and take advantage of new technologies remains an ongoing challenge.
Information and communication technologies in social workDr Lendy Spires
This document discusses the importance of information and communication technologies (ICTs) for the field of social work. It argues that ICTs have greatly influenced society and will continue to influence the work of social workers and the clients they serve. While ICTs have received some attention in social work literature and curriculum, the level of attention has not matched their growth and impact. The document calls for social work education to provide greater focus on developing ICT competencies, in order to ensure social workers can effectively use technologies and uphold ethical practices in an increasingly digital age.
Implementing ICT’s in Developing Countries - Condensedbmock3
The document discusses the importance of implementing information and communication technologies (ICTs) in developing countries. It argues that ICT infrastructure is critical for improving economic and social development. However, simply building telecenters with a few computers has failed due to issues of sustainability and scalability. Going forward, delivering internet access to developing populations will require innovations in terminals, telecommunications, and power sources that are suitable for harsh conditions with limited infrastructure. Successfully implementing ICTs could allow developing nations to access benefits like education, healthcare, and government services that are increasingly information-based.
Mobile phones may provide an effective way to deliver internet access and improve communication in developing countries. While technologies like computers and infrastructure projects failed to scale effectively in the past, mobile phone usage has spread rapidly even in poor regions. A case study in Nigeria found that mobile phones could help address informational challenges in micro-businesses by enabling traders to more easily gather and share information, speeding up processes and reducing costs. However, countries must be careful not to repeat China's mistakes by implementing technologies without proper education and support systems.
The document discusses the rapid global diffusion of information and communication technologies (ICT), focusing on mobile phones in Africa. It notes the economic and social implications of widespread ICT adoption, arguing that governments must carefully consider the costs and benefits of spending on technologies and regulate their use. While ICTs improve connectivity, they can also be distracting or addictive if overused. The document concludes that policies are needed to ensure technologies primarily benefit people, not the other way around, and that precious resources are not wasted on devices or software that harm consumers.
Toward a gender-inclusive innovation pattern in ICT: the case of VietnamiBoP Asia
This document discusses gender inclusion in innovation and ICT development in Vietnam. It explores opportunities for ICT entrepreneurs in Vietnam to develop products and services catered towards women users. Vietnam has made progress towards gender equality through laws and policies, and women now make up around half of the workforce and students in higher education. However, the ICT sector remains dominated by men. The document aims to investigate gender differences in ICT demands and identify obstacles to gender-specific technological development, to explore business models for women consumers.
This document discusses using ICT as an enabler of socioeconomic development in developing countries. It outlines challenges faced by rural citizens, and provides examples of how mobile technology can play an enabling role. Specifically, it discusses two mHealth projects in South Africa's Eastern Cape province - one using mobile phones to monitor and manage home-based care workers, and another using an app to screen for malnutrition in schools. The document advocates for a holistic approach that considers local needs and contexts when using ICT for development.
An exploratory evidence of youth’s ict empowerment in nigeriaAlexander Decker
This document summarizes an exploratory study on youth empowerment through information and communication technologies (ICTs) in Nigeria. It provides background on ICT development in Nigeria, defining ICTs and discussing their potential benefits. The study utilized a survey of 389 youths aged 18-35 across three zones of Bauchi state, Nigeria, analyzing responses using statistical methods to understand factors impacting ICT empowerment. Key findings could provide insight into how improving youth access to ICT training and skills development can promote economic opportunities and reduce poverty in Nigeria.
Challenges Facing the Adoption of Information Technology in the Management of...inventionjournals
The economic growth of any country depends, to a certain degree, on the ability of the country’s business community to maximize their growth potential. One of the biggest contributors from the business community of any nation, to the nation’s economic development, is the small and medium sized enterprise (SME) sector. Studies have shown that SMEs and indeed, large and multi-national organizations can improve their productive capacity by using the benefits of the Information and Communications Technology (ICT). This paper explores how the Small and Medium Sized Enterprises (SMEs) in the developing economies such as Nigeria can achieve their own growth through the adoption of information communication technology. This study relies on secondary data from various sources to examine the availability, accessibility and affordability to relevant ICT facilities and challenges facing SMEs in the use of information technology. The study recommends that agencies that regulate SMEs should formulate policies that will facilitate the adoption of ICT facilities by SMEs because of its potential in improving firms growth performance; SMEs owners should invest in ICT and its components because they have been proven to significantly influence organizational performance.
This report examines gender gaps in access to information and communication technologies (ICTs). It finds that while gender gaps in Internet access are declining in many countries, significant gaps still remain, especially in developing nations. Women are still around 200 million fewer online than men globally. The report recommends that governments integrate gender considerations into ICT and broadband policies, improve collection of gender-disaggregated data, boost affordability and usability of technologies for women, increase relevant online content, and develop plans to achieve gender equality in broadband access by 2020. Addressing these issues could help leverage ICTs to improve women's empowerment and socioeconomic opportunities.
The document discusses the focus on mobile phones in Africa as a tool for development and overcoming gender disparities. While mobile phones have significant potential, focusing only on this technology risks losing sight of the bigger picture. A multidimensional approach is needed that also addresses access to computers and the internet, which are important for economic growth. Infrastructure needs to expand beyond urban areas, and costs must lower to increase broadband penetration. Gender imbalances also require resolution through efforts beyond just mobile initiatives, as women face challenges from social, economic, political and cultural structures that have long resisted gender equality.
ICTs encompass a wide range of technologies used to process, store, and transmit information electronically. They have revolutionized connectivity by allowing vast networks to connect people and organizations across great distances at low cost. ICTs have significant potential to facilitate development by enabling the flow of information, ideas, people, and products. While ICT access and use is uneven between developed and developing areas, ICTs can help "leapfrog" development stages when used appropriately. Key applications of ICTs include education through improved access to information, remote healthcare delivery, citizen empowerment and participation, and opportunities for women and youth.
The document discusses the digital divide between developed and developing countries like the Philippines and India. It finds that while mobile phone usage has increased significantly in both countries, internet usage remains lower than in developed nations. Specifically, it notes that mobile phone subscription has more than doubled in the Philippines since 2004, with over 25% of the population owning phones. However, internet usage in the Philippines and India is still only around 3-28%, which is lower than other Asia-Pacific and global averages. While both countries have seen growth, the document concludes that a large digital divide still exists between high-income and lower-income countries in the region in terms of technology access and use.
Analysing the role_of (2) Relation Sandro Suzart SUZART GOOGLE INC Uni...Sandro Suzart
relationship between Sandro Suzart SUZART GOOGLE INC and United States on Demonstrations 2013 and Impeachments of 22 governments Relation, Sandro Suzart, SUZART, GOOGLE INC, United States on Demonstrations countries IMPEACHMENT GOOGLE INC
The 21st century has brought with itself a new
revolution in the global realm – the information society, which
has changed the global macroeconomic landscape. The
importance of technology cannot be denied as it has changed the
way we live, the way we work, the way we make decisions and the
way we correspond with each other. Advancements in
Information Communication Technologies not only have the
capability to improve the technological arena, but they also have
the potential to bring about social and economic improvements.
Across the globe, countries have recognized Information and
Communication Technology (ICT) as an effective tool in
catalyzing the economic activity in efficient governance, and in
developing human resources. The role of ICT’s to promote
gender equality and parity in education can be achieved by
targeting their efforts not only towards education itself, but also
towards society’s cultural and institutional framework. For
example, in many countries, parents do not expect their
daughters to have careers outside the home. Consequently, girlchildren
are forced to leave school after completing only a basic
or elementary education. In addition, if the benefits of schooling
for boys far outweigh those for girls, economically disadvantaged
parents will typically choose to send only the boys to school. The
differences in the health, education and standards of behavior
between the men and women of India, all contribute to the
impairment of women’s ability to improve their economic
situation. The continued perception that women are not of value
hinders women’s ability to fully participate in the economy.
Majority of women in India are doing tasks that are not
recognized by Indian society as meaningful and work much
longer hours than men, but much of their work is nurturing, and
therefore not recognized as important. Even when women are
contributing in family income, culturally their work is thought of
as connected to their position as nurturer and therefore is not
recognized as productive. The inequalities that exist among
region, social class and gender prevent the growth of the Indian
economy from improving the lives of many Indian people.
Nowhere is inequality more evident than in the lives of Indian
women, and likewise, there is no sector more affected by the lack
of improvement in social issues. Hence, the use of ICTs to
improve gender equality in education and employment may
initiate a continuous cycle of positive reinforcing feedback effects
between gender equality in employment and economic
development, leading to further improvements in both
The document discusses key aspects of teaching in a knowledge society, including:
1. It describes how a knowledge society differs from an information society and emphasizes the importance of universal access to knowledge.
2. It outlines new competencies needed for teachers, such as the ability to teach with technology, develop collective intelligence, and address ethical issues related to areas like digital divides.
3. It discusses scenarios for the future of education put forth by the OECD, including the potential for more networked, learner-focused models of schooling.
Prof. Dr. M. A. Pasha is speaking at the National ICT Awareness Campaign at the University of Education. He defines ICT as the study and use of computer hardware, software, and networks for processing and communicating information. ICT has changed how people learn, work and live through faster communication and greater access to data. The rise of knowledge work and a knowledge economy requires new skills from citizens, including digital literacy, to participate fully. Overcoming barriers like the digital divide is important for building an inclusive information society.
This document discusses bridging the digital divide between education and technology in Haiti versus the United States. It outlines the types of media available in each country and how they are sponsored. While American schools utilize technology extensively to enhance learning, Haitian schools struggle with basic access to education and lack of resources. Efforts are being made through donations to rebuild Haiti's communication infrastructure and improve access to technology to support education.
Distance training of teachers in a rural area in KenyaeLearning Papers
This document discusses a distance learning project for teachers in rural Kenya. It provides background context on technology and education in Kenya. Access to technology is limited in rural areas, with few having access to computers or the internet. Education also faces challenges, including high dropout rates and lack of teacher training opportunities. The project aims to provide distance training to address these issues, while being culturally sensitive to the local context.
Implicatimg mobile phones in violence against womenKutoma Wakunuma
This document analyzes how mobile phone access and use in Zambia has reinforced gender stereotypes and contributed to violence against women. Through a 4-year study involving surveys, interviews, and focus groups with 390 participants in urban and rural Zambia, the author found that while mobile phones provide clear social and economic advantages, they have also become a new focal point for social conflict and gender-based violence in relationships. Specifically, some women reported that possessing a mobile phone meant they had to be accountable to their husbands, accept their partner's decisions about phone access, and face physical or verbal abuse related to call logs or suspicions of infidelity. The author argues this dynamic undermines women's empowerment and full participation in social and
Empowering People and Transforming Society InSTEDD
This document introduces the World Economic Forum's Technology Pioneers of 2011. It discusses how technology companies like Twitter are empowering individuals and transforming society by allowing people to raise their voices, organize more easily, and share information. The 2011 class of Technology Pioneers addresses challenges like water management, internet security, disease treatment, and promoting sustainable energy use. They represent one of the most geographically diverse groups yet.
Advantages and disadvantages of Remote SensingEr Abhi Vashi
This document discusses the advantages and disadvantages of remote sensing. Some key advantages include large area coverage allowing regional surveys, repetitive coverage enabling monitoring of dynamic themes, and data being acquired at different scales and resolutions. Disadvantages include remote sensing being expensive for small areas, requiring specialized training, and human errors potentially being introduced. The document provides 15 advantages and 9 disadvantages of remote sensing in detail.
This document provides an overview of the basics of remote sensing. It defines remote sensing as acquiring information about an object without direct contact. It discusses key components of the remote sensing process including data acquisition, the electromagnetic spectrum, atmospheric interactions, spectral signatures, and satellite platforms and orbits. Remote sensing draws from many areas and plays an important role in monitoring the Earth through satellite imagery.
Remote sensing involves obtaining information about objects through analysis of sensor data without physical contact. It uses electromagnetic radiation as an information carrier. Key elements include an energy source, sensors to record energy interactions with objects, and transmission/processing of sensor data. Platforms can be ground, airborne, or space-based. Remote sensing provides regional views over broad portions of the electromagnetic spectrum and geo-referenced digital data. Applications include weather forecasting, mapping, monitoring vegetation/soils in agriculture, assessing water resources, and disaster control.
This document discusses the concept and history of remote sensing. It provides examples of different types of remote sensing technologies including cameras on satellites, multispectral imaging, radar, and medical imaging tools. It also outlines some applications of remote sensing such as military surveillance, medical diagnostics, and mineral exploration.
This document discusses remote sensing systems. It begins with an introduction to remote sensing as gathering information from objects without direct contact. It then covers the history of remote sensing from early aerial photography to modern satellite systems. The document outlines different types of remote sensing including passive methods like photography and radiometers and active methods like RADAR and LiDAR. It provides examples of remote sensing applications and techniques. Finally, it describes different optical, RADAR, and LiDAR remote sensing systems and how they work.
The document discusses the rapid global diffusion of information and communication technologies (ICT), focusing on mobile phones in Africa. It notes the economic and social implications of widespread ICT adoption, arguing that governments must carefully consider the costs and benefits of spending on technologies and regulate their use. While ICTs improve connectivity, they can also be distracting or addictive if overused. The document concludes that policies are needed to ensure technologies primarily benefit people, not the other way around, and that precious resources are not wasted on devices or software that harm consumers.
Toward a gender-inclusive innovation pattern in ICT: the case of VietnamiBoP Asia
This document discusses gender inclusion in innovation and ICT development in Vietnam. It explores opportunities for ICT entrepreneurs in Vietnam to develop products and services catered towards women users. Vietnam has made progress towards gender equality through laws and policies, and women now make up around half of the workforce and students in higher education. However, the ICT sector remains dominated by men. The document aims to investigate gender differences in ICT demands and identify obstacles to gender-specific technological development, to explore business models for women consumers.
This document discusses using ICT as an enabler of socioeconomic development in developing countries. It outlines challenges faced by rural citizens, and provides examples of how mobile technology can play an enabling role. Specifically, it discusses two mHealth projects in South Africa's Eastern Cape province - one using mobile phones to monitor and manage home-based care workers, and another using an app to screen for malnutrition in schools. The document advocates for a holistic approach that considers local needs and contexts when using ICT for development.
An exploratory evidence of youth’s ict empowerment in nigeriaAlexander Decker
This document summarizes an exploratory study on youth empowerment through information and communication technologies (ICTs) in Nigeria. It provides background on ICT development in Nigeria, defining ICTs and discussing their potential benefits. The study utilized a survey of 389 youths aged 18-35 across three zones of Bauchi state, Nigeria, analyzing responses using statistical methods to understand factors impacting ICT empowerment. Key findings could provide insight into how improving youth access to ICT training and skills development can promote economic opportunities and reduce poverty in Nigeria.
Challenges Facing the Adoption of Information Technology in the Management of...inventionjournals
The economic growth of any country depends, to a certain degree, on the ability of the country’s business community to maximize their growth potential. One of the biggest contributors from the business community of any nation, to the nation’s economic development, is the small and medium sized enterprise (SME) sector. Studies have shown that SMEs and indeed, large and multi-national organizations can improve their productive capacity by using the benefits of the Information and Communications Technology (ICT). This paper explores how the Small and Medium Sized Enterprises (SMEs) in the developing economies such as Nigeria can achieve their own growth through the adoption of information communication technology. This study relies on secondary data from various sources to examine the availability, accessibility and affordability to relevant ICT facilities and challenges facing SMEs in the use of information technology. The study recommends that agencies that regulate SMEs should formulate policies that will facilitate the adoption of ICT facilities by SMEs because of its potential in improving firms growth performance; SMEs owners should invest in ICT and its components because they have been proven to significantly influence organizational performance.
This report examines gender gaps in access to information and communication technologies (ICTs). It finds that while gender gaps in Internet access are declining in many countries, significant gaps still remain, especially in developing nations. Women are still around 200 million fewer online than men globally. The report recommends that governments integrate gender considerations into ICT and broadband policies, improve collection of gender-disaggregated data, boost affordability and usability of technologies for women, increase relevant online content, and develop plans to achieve gender equality in broadband access by 2020. Addressing these issues could help leverage ICTs to improve women's empowerment and socioeconomic opportunities.
The document discusses the focus on mobile phones in Africa as a tool for development and overcoming gender disparities. While mobile phones have significant potential, focusing only on this technology risks losing sight of the bigger picture. A multidimensional approach is needed that also addresses access to computers and the internet, which are important for economic growth. Infrastructure needs to expand beyond urban areas, and costs must lower to increase broadband penetration. Gender imbalances also require resolution through efforts beyond just mobile initiatives, as women face challenges from social, economic, political and cultural structures that have long resisted gender equality.
ICTs encompass a wide range of technologies used to process, store, and transmit information electronically. They have revolutionized connectivity by allowing vast networks to connect people and organizations across great distances at low cost. ICTs have significant potential to facilitate development by enabling the flow of information, ideas, people, and products. While ICT access and use is uneven between developed and developing areas, ICTs can help "leapfrog" development stages when used appropriately. Key applications of ICTs include education through improved access to information, remote healthcare delivery, citizen empowerment and participation, and opportunities for women and youth.
The document discusses the digital divide between developed and developing countries like the Philippines and India. It finds that while mobile phone usage has increased significantly in both countries, internet usage remains lower than in developed nations. Specifically, it notes that mobile phone subscription has more than doubled in the Philippines since 2004, with over 25% of the population owning phones. However, internet usage in the Philippines and India is still only around 3-28%, which is lower than other Asia-Pacific and global averages. While both countries have seen growth, the document concludes that a large digital divide still exists between high-income and lower-income countries in the region in terms of technology access and use.
Analysing the role_of (2) Relation Sandro Suzart SUZART GOOGLE INC Uni...Sandro Suzart
relationship between Sandro Suzart SUZART GOOGLE INC and United States on Demonstrations 2013 and Impeachments of 22 governments Relation, Sandro Suzart, SUZART, GOOGLE INC, United States on Demonstrations countries IMPEACHMENT GOOGLE INC
The 21st century has brought with itself a new
revolution in the global realm – the information society, which
has changed the global macroeconomic landscape. The
importance of technology cannot be denied as it has changed the
way we live, the way we work, the way we make decisions and the
way we correspond with each other. Advancements in
Information Communication Technologies not only have the
capability to improve the technological arena, but they also have
the potential to bring about social and economic improvements.
Across the globe, countries have recognized Information and
Communication Technology (ICT) as an effective tool in
catalyzing the economic activity in efficient governance, and in
developing human resources. The role of ICT’s to promote
gender equality and parity in education can be achieved by
targeting their efforts not only towards education itself, but also
towards society’s cultural and institutional framework. For
example, in many countries, parents do not expect their
daughters to have careers outside the home. Consequently, girlchildren
are forced to leave school after completing only a basic
or elementary education. In addition, if the benefits of schooling
for boys far outweigh those for girls, economically disadvantaged
parents will typically choose to send only the boys to school. The
differences in the health, education and standards of behavior
between the men and women of India, all contribute to the
impairment of women’s ability to improve their economic
situation. The continued perception that women are not of value
hinders women’s ability to fully participate in the economy.
Majority of women in India are doing tasks that are not
recognized by Indian society as meaningful and work much
longer hours than men, but much of their work is nurturing, and
therefore not recognized as important. Even when women are
contributing in family income, culturally their work is thought of
as connected to their position as nurturer and therefore is not
recognized as productive. The inequalities that exist among
region, social class and gender prevent the growth of the Indian
economy from improving the lives of many Indian people.
Nowhere is inequality more evident than in the lives of Indian
women, and likewise, there is no sector more affected by the lack
of improvement in social issues. Hence, the use of ICTs to
improve gender equality in education and employment may
initiate a continuous cycle of positive reinforcing feedback effects
between gender equality in employment and economic
development, leading to further improvements in both
The document discusses key aspects of teaching in a knowledge society, including:
1. It describes how a knowledge society differs from an information society and emphasizes the importance of universal access to knowledge.
2. It outlines new competencies needed for teachers, such as the ability to teach with technology, develop collective intelligence, and address ethical issues related to areas like digital divides.
3. It discusses scenarios for the future of education put forth by the OECD, including the potential for more networked, learner-focused models of schooling.
Prof. Dr. M. A. Pasha is speaking at the National ICT Awareness Campaign at the University of Education. He defines ICT as the study and use of computer hardware, software, and networks for processing and communicating information. ICT has changed how people learn, work and live through faster communication and greater access to data. The rise of knowledge work and a knowledge economy requires new skills from citizens, including digital literacy, to participate fully. Overcoming barriers like the digital divide is important for building an inclusive information society.
This document discusses bridging the digital divide between education and technology in Haiti versus the United States. It outlines the types of media available in each country and how they are sponsored. While American schools utilize technology extensively to enhance learning, Haitian schools struggle with basic access to education and lack of resources. Efforts are being made through donations to rebuild Haiti's communication infrastructure and improve access to technology to support education.
Distance training of teachers in a rural area in KenyaeLearning Papers
This document discusses a distance learning project for teachers in rural Kenya. It provides background context on technology and education in Kenya. Access to technology is limited in rural areas, with few having access to computers or the internet. Education also faces challenges, including high dropout rates and lack of teacher training opportunities. The project aims to provide distance training to address these issues, while being culturally sensitive to the local context.
Implicatimg mobile phones in violence against womenKutoma Wakunuma
This document analyzes how mobile phone access and use in Zambia has reinforced gender stereotypes and contributed to violence against women. Through a 4-year study involving surveys, interviews, and focus groups with 390 participants in urban and rural Zambia, the author found that while mobile phones provide clear social and economic advantages, they have also become a new focal point for social conflict and gender-based violence in relationships. Specifically, some women reported that possessing a mobile phone meant they had to be accountable to their husbands, accept their partner's decisions about phone access, and face physical or verbal abuse related to call logs or suspicions of infidelity. The author argues this dynamic undermines women's empowerment and full participation in social and
Empowering People and Transforming Society InSTEDD
This document introduces the World Economic Forum's Technology Pioneers of 2011. It discusses how technology companies like Twitter are empowering individuals and transforming society by allowing people to raise their voices, organize more easily, and share information. The 2011 class of Technology Pioneers addresses challenges like water management, internet security, disease treatment, and promoting sustainable energy use. They represent one of the most geographically diverse groups yet.
Advantages and disadvantages of Remote SensingEr Abhi Vashi
This document discusses the advantages and disadvantages of remote sensing. Some key advantages include large area coverage allowing regional surveys, repetitive coverage enabling monitoring of dynamic themes, and data being acquired at different scales and resolutions. Disadvantages include remote sensing being expensive for small areas, requiring specialized training, and human errors potentially being introduced. The document provides 15 advantages and 9 disadvantages of remote sensing in detail.
This document provides an overview of the basics of remote sensing. It defines remote sensing as acquiring information about an object without direct contact. It discusses key components of the remote sensing process including data acquisition, the electromagnetic spectrum, atmospheric interactions, spectral signatures, and satellite platforms and orbits. Remote sensing draws from many areas and plays an important role in monitoring the Earth through satellite imagery.
Remote sensing involves obtaining information about objects through analysis of sensor data without physical contact. It uses electromagnetic radiation as an information carrier. Key elements include an energy source, sensors to record energy interactions with objects, and transmission/processing of sensor data. Platforms can be ground, airborne, or space-based. Remote sensing provides regional views over broad portions of the electromagnetic spectrum and geo-referenced digital data. Applications include weather forecasting, mapping, monitoring vegetation/soils in agriculture, assessing water resources, and disaster control.
This document discusses the concept and history of remote sensing. It provides examples of different types of remote sensing technologies including cameras on satellites, multispectral imaging, radar, and medical imaging tools. It also outlines some applications of remote sensing such as military surveillance, medical diagnostics, and mineral exploration.
This document discusses remote sensing systems. It begins with an introduction to remote sensing as gathering information from objects without direct contact. It then covers the history of remote sensing from early aerial photography to modern satellite systems. The document outlines different types of remote sensing including passive methods like photography and radiometers and active methods like RADAR and LiDAR. It provides examples of remote sensing applications and techniques. Finally, it describes different optical, RADAR, and LiDAR remote sensing systems and how they work.
The document provides an introduction to geographic information systems (GIS) and remote sensing. It discusses how GIS organizes and analyzes spatial data through data management, analysis, and visualization. It describes different data types including vector, raster, and imagery data. It also explains key concepts such as layers, modeling geospatial reality, and coding vector and raster data. The document outlines advantages and disadvantages of vector and raster data models. It introduces remote sensing and describes platforms and sensors used to collect spatial data from aircraft and satellites.
This document provides an overview of remote sensing through a seminar presented by Ashwathy Babu Paul. It defines remote sensing as obtaining information about an object without physical contact through electromagnetic radiation. It describes the basic components and process of remote sensing systems including energy sources, sensor recording, transmission and processing. Various sensors and platforms are discussed along with advantages and applications in fields like agriculture, natural resource management, national security, geology, meteorology, and more. Challenges are addressed but advantages of remote sensing are said to far outweigh these.
The document discusses the role of information and communication technology (ICT) in business, specifically e-commerce. E-commerce allows businesses and consumers to make purchases online through payment options on electronic networks, mainly the internet. For ICT systems and technological platforms to function properly, necessary infrastructure and technology is required to facilitate the platform. The platform also requires an information system to run smoothly.
ICT has had a significant impact on rural development in India. ICT initiatives have focused on infrastructure development and extending information and communication services from urban to rural areas. ICT can play an important role in many aspects of rural development such as poverty reduction by providing access to markets, education, and healthcare. ICT and e-governance in particular have helped strengthen governance in rural India by improving government processes and facilitating interaction between citizens, businesses, and government agencies. While ICT shows promise for rural development, initiatives must be tailored to local needs and involve stakeholders to ensure benefits are realized and sustained over the long term.
This document discusses how information and communication technologies (ICTs) can empower women entrepreneurs. It begins by explaining how ICTs provide opportunities for women to develop entrepreneurial skills and enhance their social and economic empowerment. ICTs allow women entrepreneurs to access global markets, obtain business information, and manage operations more efficiently. However, barriers like lack of access, skills, and infrastructure still limit many women's ability to benefit from ICTs. The document concludes by arguing governments should implement policies and training to promote greater ICT adoption among women entrepreneurs.
Challenges Facing the Adoption of Information Technology in the Management of...inventionjournals
The economic growth of any country depends, to a certain degree, on the ability of the country’s business community to maximize their growth potential. One of the biggest contributors from the business community of any nation, to the nation’s economic development, is the small and medium sized enterprise (SME) sector. Studies have shown that SMEs and indeed, large and multi-national organizations can improve their productive capacity by using the benefits of the Information and Communications Technology (ICT). This paper explores how the Small and Medium Sized Enterprises (SMEs) in the developing economies such as Nigeria can achieve their own growth through the adoption of information communication technology. This study relies on secondary data from various sources to examine the availability, accessibility and affordability to relevant ICT facilities and challenges facing SMEs in the use of information technology. The study recommends that agencies that regulate SMEs should formulate policies that will facilitate the adoption of ICT facilities by SMEs because of its potential in improving firms growth performance; SMEs owners should invest in ICT and its components because they have been proven to significantly influence organizational performance.
Impact of Information and Communication Technology on Rural IndiaIOSR Journals
ICTs are playing an important role in rural development in India. By providing infrastructure and access to information services, ICTs can help eradicate poverty in rural areas. They also enable e-governance which promotes transparent, efficient government services. However, the digital divide means many rural Indians still lack access to and skills for using ICTs. For ICTs to truly benefit rural development, interventions must be tailored to local needs and allow bi-directional knowledge sharing between communities and programs. When integrated effectively, ICTs have the potential to boost rural economies and empower communities.
Innovative ICT Solutions and Entrepreneurship Development in Rural Area Such ...RSIS International
The use of internet and information communication
technology (ICT) infrastructures is an essential aspect of
learning, this is why a lot of information on entrepreneurship
career choices are available online. However, the emerging
growth in the use of information and communication
technologies and services towards entrepreneurship development
is a challenge for efficient information dissemination and
learning especially in rural areas. This paper pointed out an area
in which MCIU can use Information and Communication
Technology (ICT) resources/infrastructure it possess for
entrepreneurship development and poverty alleviation in its
community. Thereby, encouraging social and economic growth,
and overcome the gap between urban and rural areas
entrepreneurship development. An online learning platform,
using video may contribute greatly in rural entrepreneurship
development such as MCIU community. Some examples of some
programmes like learning make over, headgear tying, bead
making, cake designing, etc online for a period of 4 to 6weeks
Enhancing women empowerment through information and communication technologyDr Lendy Spires
This report examines enhancing women's empowerment through information and communication technology (ICT). It aims to assess ICT infrastructure for women in rural versus urban areas and how women's social/economic backgrounds impact ICT workforce participation. It also evaluates ICT policies in education regarding scholarships, reservations, and self-employment programs for women. Finally, it assesses social and health implications of ICT for women workers. The report reviews literature, studies findings through research questions, and provides conclusions and suggestions. The overall goal is to understand how to strengthen ICT's role in empowering women across India.
Including the Excluded Can ICTs empower poor communities? Towards an alternat...Soren Gigler
nder which conditions can information and communications technologies (ICTs) empower poor communities? This paper investigates this question, focusing on the role of information and communications technologies in promoting indigenous people's development in Latin America. First, the paper analyzes key factors under which information and knowledge can be instrumental and substantive for the empowerment of marginalized groups. Hereby, we argue that improved access to information and ICT skills, similar to the enhancement of a person's writing and reading skills, can enhance poor peoples' capabilities to make strategic life choices and to achieve the lifestyle they value. Furthermore, the paper develops an alternative evaluation framework for ICT interventions based on Sen's capability approach. This framework places, in contrast to the current discourse around the "digital divide", the human development of the poor and not technology at the center of the analysis. The paper concludes that there does not exist a direct and causal relationship between ICTs and empowerment, but that in fact this relationship is being shaped by a dynamic, multi-dimensional interrelationship between technology and the social context.
ICT can empower poor and marginalized groups by improving access to education, markets, healthcare, and government services. It can help reduce poverty and increase security. However, a digital divide still exists between those who can access and use technology and those who cannot. ICT initiatives in India have aimed to empower women and rural communities through projects that provide access to computers, the internet, and information. Examples discussed include the e-Choupal kiosks managed by women's self-help groups, and the use of mobile phones and databases by organizations like SEWA. ICT is seen as a way to give "voice to the poor" and increase transparency and participation in governance.
ICT has made a huge contribution to women's empowerment. women living in remote and rural areas are also being benefitted by ICT and they are making their contribution to society-building and development of the country.
e-Governance Implementation In Ebonyi State Nigeria: Challenges and ProspectsEditor IJCATR
The deployment of Information and Communication Technology (ICT) in different facets of the world’s economy has yielded very reasonable results. ICT has blured the barriers of hinderances in tourism, trade, healthcare, education and training. In governance and administration, ICT applications have enhanced the delivery of public services to citizens and clients not only by improving the process and management of government, but also by redefining the traditional concepts of citizenship. This paper examined the challenges facing the implementation of e-Governance in Ebonyi State – Nigeria and highlights the prospects. The research used a primary source of data by distributing, collecting and analysing a total of 500 questionnaires administered to respondents in the research area (Ebonyi State). The research found that the most difficult challenges facing the deployment of e-governance in Ebonyi State were lack of steady power supply, poor communication infrastructure and high cost of computer and internet equipments. The survey also revealed that the use of e-governance would bring improved efficiency in government operations without necessarily increasing the cost of state governance. e-Governance would strengthen democratic principles and ideologies which inturn brings good governance to the people.
Challenges of Integrating ICT in Education and the Way Forward(1).docxAbbahEzekielOnucheoj
Introduction
Information and Communication Technology(ICT) in education is a recent development. In developed countries, ICT has been fully integrated into formal teaching and learning processes based on their advancement in technology as well as economic and otherwise wellbeing. The story is different with developing countries, where information and communication technological knowhow is especially low. Though developing countries have embraced this phenomenon, the use of ICT in education is faced with myriads of challenges ranging from economic, social, political, to cultural and technical barriers. This paper focuses on the challenges experienced in the integration of ICT in education and the various ways these challenges can be tackled. Since these challenges are not pronounced in developed countries, Nigeria (a developing country where these challenges are very much pronounced) is chosen as a case study.
The Challenges of integrating ICT in Education and the Way Forward
According to Esoswo Francisca Ogbomo, “There are so many factors that hinder the effective utilization of ICT in education” (10). Integration of ICT into the system of education was discussed by a number of authors such as Hargreaves (1994), Lawton (1994), Lai (2001), Ringstaff (1995), Murray and Campbell (2000), Billowes (1999), and others. It was emphasised that the change in teaching and learning while integrating information and communication technologies is a long process which requires a lot of resources and depends on every individual teacher, thus creating a number of challenges. Some of these challenges are adumbrated and discussed below.
Nigerian Universities are facing huge challenges on the adoption of information and communication technology like other renowned universities of the world. This is as a result of various factors which include but not limited to cost of internet data and electronic services, fear of change, computer illiteracy, fear of being made redundant, lack of facilities, internet and electronic security, inconsistency in electricity supply and the need for continuous training of staff.
RELEVANCE OF COMPUTER APPRECIATION/ICT TO THE CURRICULUM OF CERTIFICATE IN AU...Muhammad Muhammad Suleiman
Being A Text of Paper To Be Presented At Its 4-Days Final Phase of ASW Curriculum Review and Adaptation Meeting Held At Tahir Guest Palace, Kano, Organized By Society For Family Health, Between 27th To 30th April 2021
Ngonzi & Kosheek - Modelling for the diffusion of ICTs in Developing Countrie...Tibu Ngozi
This document discusses perspectives on diffusing ICTs in developing economies in Africa. It argues that current efforts focus too much on access and use without developing local innovation capacity. To better diffuse ICTs, initiatives need to promote complementary investments, innovations, and sectoral linkages within host economies. This can be achieved by conceptualizing ICTs as general purpose technologies and developing social innovation abilities within communities.
This document summarizes an article from the International Journal of Management that discusses the importance of information and communication technology (ICT) in improving the quality of education, especially in rural areas of developing countries like India. It outlines how ICT can increase access to education, improve teaching quality, and help create knowledgeable and skilled citizens. The document also discusses the current state of ICT in Indian education, the role of education in developing a knowledge-based society and economy, and how ICT can help make education systems more efficient.
Information and communications technology (ICT) refers to technologies that provide access to information through telecommunications. It is broader than information technology (IT), as it covers audiovisual and telephone networks in addition to computers and software. ICT allows for the electronic storage, retrieval, and sharing of information and has applications in many fields including education, business, and personal use. It has transformed how people communicate, access information, and learn. ICT skills are now considered essential for students and workers to function in today's digital world.
This document discusses gender inclusivity in socioeconomic development and reducing the gender digital divide. It notes that women face disadvantages compared to men in accessing technology due to factors like poverty and traditional gender roles. To promote inclusivity, it recommends gender-specific initiatives like MAMA that provide health information to mothers via mobile phones. It also suggests providing financial relief through lowered costs and increasing infrastructure in rural areas where many women live to expand access. The goal is to ensure equal participation of men and women in development by reducing barriers that women face in accessing mobile technologies.
This document discusses the impact of information and communication technologies (ICT) and mobile technology in agriculture in Maharashtra, India. It finds that ICT has played an important role in agricultural development by allowing farmers to connect directly with research centers, universities, government agencies, markets, and weather departments to access information on inputs, practices, prices, and forecasts. This has increased farmers' incomes in Maharashtra. However, many farmers still lack access to and knowledge of these technologies. The document examines several ICT initiatives and portals in Maharashtra that provide agricultural information to farmers via websites, SMS services, and other platforms. Overall, ICT and mobile technologies are transforming agriculture by improving access to knowledge and markets for farmers in Maharashtra.
This document discusses the importance of intellectual property in today's knowledge economy. Intellectual property typically includes copyrights, patents, and trademarks. In recent years, many firms have sought to patent software technologies used in smartphones. The use of patents to protect software technologies has increased exponentially since 2007 with the introduction of the iPhone. While there is no clear correlation between patent protection and economic growth, companies invest heavily in acquiring and protecting intellectual property to gain monopolies and competitive advantages. Protection strategies allow firms to maintain control over their technologies and innovations.
Abnormalities of hormones and inflammatory cytokines in women affected with p...Alexander Decker
Women with polycystic ovary syndrome (PCOS) have elevated levels of hormones like luteinizing hormone and testosterone, as well as higher levels of insulin and insulin resistance compared to healthy women. They also have increased levels of inflammatory markers like C-reactive protein, interleukin-6, and leptin. This study found these abnormalities in the hormones and inflammatory cytokines of women with PCOS ages 23-40, indicating that hormone imbalances associated with insulin resistance and elevated inflammatory markers may worsen infertility in women with PCOS.
A usability evaluation framework for b2 c e commerce websitesAlexander Decker
This document presents a framework for evaluating the usability of B2C e-commerce websites. It involves user testing methods like usability testing and interviews to identify usability problems in areas like navigation, design, purchasing processes, and customer service. The framework specifies goals for the evaluation, determines which website aspects to evaluate, and identifies target users. It then describes collecting data through user testing and analyzing the results to identify usability problems and suggest improvements.
A universal model for managing the marketing executives in nigerian banksAlexander Decker
This document discusses a study that aimed to synthesize motivation theories into a universal model for managing marketing executives in Nigerian banks. The study was guided by Maslow and McGregor's theories. A sample of 303 marketing executives was used. The results showed that managers will be most effective at motivating marketing executives if they consider individual needs and create challenging but attainable goals. The emerged model suggests managers should provide job satisfaction by tailoring assignments to abilities and monitoring performance with feedback. This addresses confusion faced by Nigerian bank managers in determining effective motivation strategies.
A unique common fixed point theorems in generalized dAlexander Decker
This document presents definitions and properties related to generalized D*-metric spaces and establishes some common fixed point theorems for contractive type mappings in these spaces. It begins by introducing D*-metric spaces and generalized D*-metric spaces, defines concepts like convergence and Cauchy sequences. It presents lemmas showing the uniqueness of limits in these spaces and the equivalence of different definitions of convergence. The goal of the paper is then stated as obtaining a unique common fixed point theorem for generalized D*-metric spaces.
A trends of salmonella and antibiotic resistanceAlexander Decker
This document provides a review of trends in Salmonella and antibiotic resistance. It begins with an introduction to Salmonella as a facultative anaerobe that causes nontyphoidal salmonellosis. The emergence of antimicrobial-resistant Salmonella is then discussed. The document proceeds to cover the historical perspective and classification of Salmonella, definitions of antimicrobials and antibiotic resistance, and mechanisms of antibiotic resistance in Salmonella including modification or destruction of antimicrobial agents, efflux pumps, modification of antibiotic targets, and decreased membrane permeability. Specific resistance mechanisms are discussed for several classes of antimicrobials.
A transformational generative approach towards understanding al-istifhamAlexander Decker
This document discusses a transformational-generative approach to understanding Al-Istifham, which refers to interrogative sentences in Arabic. It begins with an introduction to the origin and development of Arabic grammar. The paper then explains the theoretical framework of transformational-generative grammar that is used. Basic linguistic concepts and terms related to Arabic grammar are defined. The document analyzes how interrogative sentences in Arabic can be derived and transformed via tools from transformational-generative grammar, categorizing Al-Istifham into linguistic and literary questions.
A time series analysis of the determinants of savings in namibiaAlexander Decker
This document summarizes a study on the determinants of savings in Namibia from 1991 to 2012. It reviews previous literature on savings determinants in developing countries. The study uses time series analysis including unit root tests, cointegration, and error correction models to analyze the relationship between savings and variables like income, inflation, population growth, deposit rates, and financial deepening in Namibia. The results found inflation and income have a positive impact on savings, while population growth negatively impacts savings. Deposit rates and financial deepening were found to have no significant impact. The study reinforces previous work and emphasizes the importance of improving income levels to achieve higher savings rates in Namibia.
A therapy for physical and mental fitness of school childrenAlexander Decker
This document summarizes a study on the importance of exercise in maintaining physical and mental fitness for school children. It discusses how physical and mental fitness are developed through participation in regular physical exercises and cannot be achieved solely through classroom learning. The document outlines different types and components of fitness and argues that developing fitness should be a key objective of education systems. It recommends that schools ensure pupils engage in graded physical activities and exercises to support their overall development.
A theory of efficiency for managing the marketing executives in nigerian banksAlexander Decker
This document summarizes a study examining efficiency in managing marketing executives in Nigerian banks. The study was examined through the lenses of Kaizen theory (continuous improvement) and efficiency theory. A survey of 303 marketing executives from Nigerian banks found that management plays a key role in identifying and implementing efficiency improvements. The document recommends adopting a "3H grand strategy" to improve the heads, hearts, and hands of management and marketing executives by enhancing their knowledge, attitudes, and tools.
This document discusses evaluating the link budget for effective 900MHz GSM communication. It describes the basic parameters needed for a high-level link budget calculation, including transmitter power, antenna gains, path loss, and propagation models. Common propagation models for 900MHz that are described include Okumura model for urban areas and Hata model for urban, suburban, and open areas. Rain attenuation is also incorporated using the updated ITU model to improve communication during rainfall.
A synthetic review of contraceptive supplies in punjabAlexander Decker
This document discusses contraceptive use in Punjab, Pakistan. It begins by providing background on the benefits of family planning and contraceptive use for maternal and child health. It then analyzes contraceptive commodity data from Punjab, finding that use is still low despite efforts to improve access. The document concludes by emphasizing the need for strategies to bridge gaps and meet the unmet need for effective and affordable contraceptive methods and supplies in Punjab in order to improve health outcomes.
A synthesis of taylor’s and fayol’s management approaches for managing market...Alexander Decker
1) The document discusses synthesizing Taylor's scientific management approach and Fayol's process management approach to identify an effective way to manage marketing executives in Nigerian banks.
2) It reviews Taylor's emphasis on efficiency and breaking tasks into small parts, and Fayol's focus on developing general management principles.
3) The study administered a survey to 303 marketing executives in Nigerian banks to test if combining elements of Taylor and Fayol's approaches would help manage their performance through clear roles, accountability, and motivation. Statistical analysis supported combining the two approaches.
A survey paper on sequence pattern mining with incrementalAlexander Decker
This document summarizes four algorithms for sequential pattern mining: GSP, ISM, FreeSpan, and PrefixSpan. GSP is an Apriori-based algorithm that incorporates time constraints. ISM extends SPADE to incrementally update patterns after database changes. FreeSpan uses frequent items to recursively project databases and grow subsequences. PrefixSpan also uses projection but claims to not require candidate generation. It recursively projects databases based on short prefix patterns. The document concludes by stating the goal was to find an efficient scheme for extracting sequential patterns from transactional datasets.
A survey on live virtual machine migrations and its techniquesAlexander Decker
This document summarizes several techniques for live virtual machine migration in cloud computing. It discusses works that have proposed affinity-aware migration models to improve resource utilization, energy efficient migration approaches using storage migration and live VM migration, and a dynamic consolidation technique using migration control to avoid unnecessary migrations. The document also summarizes works that have designed methods to minimize migration downtime and network traffic, proposed a resource reservation framework for efficient migration of multiple VMs, and addressed real-time issues in live migration. Finally, it provides a table summarizing the techniques, tools used, and potential future work or gaps identified for each discussed work.
A survey on data mining and analysis in hadoop and mongo dbAlexander Decker
This document discusses data mining of big data using Hadoop and MongoDB. It provides an overview of Hadoop and MongoDB and their uses in big data analysis. Specifically, it proposes using Hadoop for distributed processing and MongoDB for data storage and input. The document reviews several related works that discuss big data analysis using these tools, as well as their capabilities for scalable data storage and mining. It aims to improve computational time and fault tolerance for big data analysis by mining data stored in Hadoop using MongoDB and MapReduce.
1. The document discusses several challenges for integrating media with cloud computing including media content convergence, scalability and expandability, finding appropriate applications, and reliability.
2. Media content convergence challenges include dealing with the heterogeneity of media types, services, networks, devices, and quality of service requirements as well as integrating technologies used by media providers and consumers.
3. Scalability and expandability challenges involve adapting to the increasing volume of media content and being able to support new media formats and outlets over time.
This document surveys trust architectures that leverage provenance in wireless sensor networks. It begins with background on provenance, which refers to the documented history or derivation of data. Provenance can be used to assess trust by providing metadata about how data was processed. The document then discusses challenges for using provenance to establish trust in wireless sensor networks, which have constraints on energy and computation. Finally, it provides background on trust, which is the subjective probability that a node will behave dependably. Trust architectures need to be lightweight to account for the constraints of wireless sensor networks.
This document discusses private equity investments in Kenya. It provides background on private equity and discusses trends in various regions. The objectives of the study discussed are to establish the extent of private equity adoption in Kenya, identify common forms of private equity utilized, and determine typical exit strategies. Private equity can involve venture capital, leveraged buyouts, or mezzanine financing. Exits allow recycling of capital into new opportunities. The document provides context on private equity globally and in developing markets like Africa to frame the goals of the study.
This document discusses a study that analyzes the financial health of the Indian logistics industry from 2005-2012 using Altman's Z-score model. The study finds that the average Z-score for selected logistics firms was in the healthy to very healthy range during the study period. The average Z-score increased from 2006 to 2010 when the Indian economy was hit by the global recession, indicating the overall performance of the Indian logistics industry was good. The document reviews previous literature on measuring financial performance and distress using ratios and Z-scores, and outlines the objectives and methodology used in the current study.
"Choosing proper type of scaling", Olena SyrotaFwdays
Imagine an IoT processing system that is already quite mature and production-ready and for which client coverage is growing and scaling and performance aspects are life and death questions. The system has Redis, MongoDB, and stream processing based on ksqldb. In this talk, firstly, we will analyze scaling approaches and then select the proper ones for our system.
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...DanBrown980551
This LF Energy webinar took place June 20, 2024. It featured:
-Alex Thornton, LF Energy
-Hallie Cramer, Google
-Daniel Roesler, UtilityAPI
-Henry Richardson, WattTime
In response to the urgency and scale required to effectively address climate change, open source solutions offer significant potential for driving innovation and progress. Currently, there is a growing demand for standardization and interoperability in energy data and modeling. Open source standards and specifications within the energy sector can also alleviate challenges associated with data fragmentation, transparency, and accessibility. At the same time, it is crucial to consider privacy and security concerns throughout the development of open source platforms.
This webinar will delve into the motivations behind establishing LF Energy’s Carbon Data Specification Consortium. It will provide an overview of the draft specifications and the ongoing progress made by the respective working groups.
Three primary specifications will be discussed:
-Discovery and client registration, emphasizing transparent processes and secure and private access
-Customer data, centering around customer tariffs, bills, energy usage, and full consumption disclosure
-Power systems data, focusing on grid data, inclusive of transmission and distribution networks, generation, intergrid power flows, and market settlement data
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...Alex Pruden
Folding is a recent technique for building efficient recursive SNARKs. Several elegant folding protocols have been proposed, such as Nova, Supernova, Hypernova, Protostar, and others. However, all of them rely on an additively homomorphic commitment scheme based on discrete log, and are therefore not post-quantum secure. In this work we present LatticeFold, the first lattice-based folding protocol based on the Module SIS problem. This folding protocol naturally leads to an efficient recursive lattice-based SNARK and an efficient PCD scheme. LatticeFold supports folding low-degree relations, such as R1CS, as well as high-degree relations, such as CCS. The key challenge is to construct a secure folding protocol that works with the Ajtai commitment scheme. The difficulty, is ensuring that extracted witnesses are low norm through many rounds of folding. We present a novel technique using the sumcheck protocol to ensure that extracted witnesses are always low norm no matter how many rounds of folding are used. Our evaluation of the final proof system suggests that it is as performant as Hypernova, while providing post-quantum security.
Paper Link: https://eprint.iacr.org/2024/257
How information systems are built or acquired puts information, which is what they should be about, in a secondary place. Our language adapted accordingly, and we no longer talk about information systems but applications. Applications evolved in a way to break data into diverse fragments, tightly coupled with applications and expensive to integrate. The result is technical debt, which is re-paid by taking even bigger "loans", resulting in an ever-increasing technical debt. Software engineering and procurement practices work in sync with market forces to maintain this trend. This talk demonstrates how natural this situation is. The question is: can something be done to reverse the trend?
Conversational agents, or chatbots, are increasingly used to access all sorts of services using natural language. While open-domain chatbots - like ChatGPT - can converse on any topic, task-oriented chatbots - the focus of this paper - are designed for specific tasks, like booking a flight, obtaining customer support, or setting an appointment. Like any other software, task-oriented chatbots need to be properly tested, usually by defining and executing test scenarios (i.e., sequences of user-chatbot interactions). However, there is currently a lack of methods to quantify the completeness and strength of such test scenarios, which can lead to low-quality tests, and hence to buggy chatbots.
To fill this gap, we propose adapting mutation testing (MuT) for task-oriented chatbots. To this end, we introduce a set of mutation operators that emulate faults in chatbot designs, an architecture that enables MuT on chatbots built using heterogeneous technologies, and a practical realisation as an Eclipse plugin. Moreover, we evaluate the applicability, effectiveness and efficiency of our approach on open-source chatbots, with promising results.
inQuba Webinar Mastering Customer Journey Management with Dr Graham HillLizaNolte
HERE IS YOUR WEBINAR CONTENT! 'Mastering Customer Journey Management with Dr. Graham Hill'. We hope you find the webinar recording both insightful and enjoyable.
In this webinar, we explored essential aspects of Customer Journey Management and personalization. Here’s a summary of the key insights and topics discussed:
Key Takeaways:
Understanding the Customer Journey: Dr. Hill emphasized the importance of mapping and understanding the complete customer journey to identify touchpoints and opportunities for improvement.
Personalization Strategies: We discussed how to leverage data and insights to create personalized experiences that resonate with customers.
Technology Integration: Insights were shared on how inQuba’s advanced technology can streamline customer interactions and drive operational efficiency.
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...Fwdays
Direct losses from downtime in 1 minute = $5-$10 thousand dollars. Reputation is priceless.
As part of the talk, we will consider the architectural strategies necessary for the development of highly loaded fintech solutions. We will focus on using queues and streaming to efficiently work and manage large amounts of data in real-time and to minimize latency.
We will focus special attention on the architectural patterns used in the design of the fintech system, microservices and event-driven architecture, which ensure scalability, fault tolerance, and consistency of the entire system.
What is an RPA CoE? Session 2 – CoE RolesDianaGray10
In this session, we will review the players involved in the CoE and how each role impacts opportunities.
Topics covered:
• What roles are essential?
• What place in the automation journey does each role play?
Speaker:
Chris Bolin, Senior Intelligent Automation Architect Anika Systems
Session 1 - Intro to Robotic Process Automation.pdfUiPathCommunity
👉 Check out our full 'Africa Series - Automation Student Developers (EN)' page to register for the full program:
https://bit.ly/Automation_Student_Kickstart
In this session, we shall introduce you to the world of automation, the UiPath Platform, and guide you on how to install and setup UiPath Studio on your Windows PC.
📕 Detailed agenda:
What is RPA? Benefits of RPA?
RPA Applications
The UiPath End-to-End Automation Platform
UiPath Studio CE Installation and Setup
💻 Extra training through UiPath Academy:
Introduction to Automation
UiPath Business Automation Platform
Explore automation development with UiPath Studio
👉 Register here for our upcoming Session 2 on June 20: Introduction to UiPath Studio Fundamentals: https://community.uipath.com/events/details/uipath-lagos-presents-session-2-introduction-to-uipath-studio-fundamentals/
This talk will cover ScyllaDB Architecture from the cluster-level view and zoom in on data distribution and internal node architecture. In the process, we will learn the secret sauce used to get ScyllaDB's high availability and superior performance. We will also touch on the upcoming changes to ScyllaDB architecture, moving to strongly consistent metadata and tablets.
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/temporal-event-neural-networks-a-more-efficient-alternative-to-the-transformer-a-presentation-from-brainchip/
Chris Jones, Director of Product Management at BrainChip , presents the “Temporal Event Neural Networks: A More Efficient Alternative to the Transformer” tutorial at the May 2024 Embedded Vision Summit.
The expansion of AI services necessitates enhanced computational capabilities on edge devices. Temporal Event Neural Networks (TENNs), developed by BrainChip, represent a novel and highly efficient state-space network. TENNs demonstrate exceptional proficiency in handling multi-dimensional streaming data, facilitating advancements in object detection, action recognition, speech enhancement and language model/sequence generation. Through the utilization of polynomial-based continuous convolutions, TENNs streamline models, expedite training processes and significantly diminish memory requirements, achieving notable reductions of up to 50x in parameters and 5,000x in energy consumption compared to prevailing methodologies like transformers.
Integration with BrainChip’s Akida neuromorphic hardware IP further enhances TENNs’ capabilities, enabling the realization of highly capable, portable and passively cooled edge devices. This presentation delves into the technical innovations underlying TENNs, presents real-world benchmarks, and elucidates how this cutting-edge approach is positioned to revolutionize edge AI across diverse applications.
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyScyllaDB
Freshworks creates AI-boosted business software that helps employees work more efficiently and effectively. Managing data across multiple RDBMS and NoSQL databases was already a challenge at their current scale. To prepare for 10X growth, they knew it was time to rethink their database strategy. Learn how they architected a solution that would simplify scaling while keeping costs under control.
Must Know Postgres Extension for DBA and Developer during MigrationMydbops
Mydbops Opensource Database Meetup 16
Topic: Must-Know PostgreSQL Extensions for Developers and DBAs During Migration
Speaker: Deepak Mahto, Founder of DataCloudGaze Consulting
Date & Time: 8th June | 10 AM - 1 PM IST
Venue: Bangalore International Centre, Bangalore
Abstract: Discover how PostgreSQL extensions can be your secret weapon! This talk explores how key extensions enhance database capabilities and streamline the migration process for users moving from other relational databases like Oracle.
Key Takeaways:
* Learn about crucial extensions like oracle_fdw, pgtt, and pg_audit that ease migration complexities.
* Gain valuable strategies for implementing these extensions in PostgreSQL to achieve license freedom.
* Discover how these key extensions can empower both developers and DBAs during the migration process.
* Don't miss this chance to gain practical knowledge from an industry expert and stay updated on the latest open-source database trends.
Mydbops Managed Services specializes in taking the pain out of database management while optimizing performance. Since 2015, we have been providing top-notch support and assistance for the top three open-source databases: MySQL, MongoDB, and PostgreSQL.
Our team offers a wide range of services, including assistance, support, consulting, 24/7 operations, and expertise in all relevant technologies. We help organizations improve their database's performance, scalability, efficiency, and availability.
Contact us: info@mydbops.com
Visit: https://www.mydbops.com/
Follow us on LinkedIn: https://in.linkedin.com/company/mydbops
For more details and updates, please follow up the below links.
Meetup Page : https://www.meetup.com/mydbops-databa...
Twitter: https://twitter.com/mydbopsofficial
Blogs: https://www.mydbops.com/blog/
Facebook(Meta): https://www.facebook.com/mydbops/
Dandelion Hashtable: beyond billion requests per second on a commodity serverAntonios Katsarakis
This slide deck presents DLHT, a concurrent in-memory hashtable. Despite efforts to optimize hashtables, that go as far as sacrificing core functionality, state-of-the-art designs still incur multiple memory accesses per request and block request processing in three cases. First, most hashtables block while waiting for data to be retrieved from memory. Second, open-addressing designs, which represent the current state-of-the-art, either cannot free index slots on deletes or must block all requests to do so. Third, index resizes block every request until all objects are copied to the new index. Defying folklore wisdom, DLHT forgoes open-addressing and adopts a fully-featured and memory-aware closed-addressing design based on bounded cache-line-chaining. This design offers lock-free index operations and deletes that free slots instantly, (2) completes most requests with a single memory access, (3) utilizes software prefetching to hide memory latencies, and (4) employs a novel non-blocking and parallel resizing. In a commodity server and a memory-resident workload, DLHT surpasses 1.6B requests per second and provides 3.5x (12x) the throughput of the state-of-the-art closed-addressing (open-addressing) resizable hashtable on Gets (Deletes).
Northern Engraving | Modern Metal Trim, Nameplates and Appliance PanelsNorthern Engraving
What began over 115 years ago as a supplier of precision gauges to the automotive industry has evolved into being an industry leader in the manufacture of product branding, automotive cockpit trim and decorative appliance trim. Value-added services include in-house Design, Engineering, Program Management, Test Lab and Tool Shops.
Main news related to the CCS TSI 2023 (2023/1695)Jakub Marek
An English 🇬🇧 translation of a presentation to the speech I gave about the main changes brought by CCS TSI 2023 at the biggest Czech conference on Communications and signalling systems on Railways, which was held in Clarion Hotel Olomouc from 7th to 9th November 2023 (konferenceszt.cz). Attended by around 500 participants and 200 on-line followers.
The original Czech 🇨🇿 version of the presentation can be found here: https://www.slideshare.net/slideshow/hlavni-novinky-souvisejici-s-ccs-tsi-2023-2023-1695/269688092 .
The videorecording (in Czech) from the presentation is available here: https://youtu.be/WzjJWm4IyPk?si=SImb06tuXGb30BEH .
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...Jason Yip
The typical problem in product engineering is not bad strategy, so much as “no strategy”. This leads to confusion, lack of motivation, and incoherent action. The next time you look for a strategy and find an empty space, instead of waiting for it to be filled, I will show you how to fill it in yourself. If you’re wrong, it forces a correction. If you’re right, it helps create focus. I’ll share how I’ve approached this in the past, both what works and lessons for what didn’t work so well.
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
The challenges of using information technology (it) as a veritable tool for the empowerment of women a road-map.
1. Journal of Information Engineering and Applications www.iiste.org
ISSN 2224-5782 (print) ISSN 2225-0506 (online)
Vol.3, No.7, 2013
17
The Challenges of Using Information Technology (IT) As a
Veritable Tool for the Empowerment of Women: a Road-Map.
Victoria Ezeano, N1*
Ezeano, Nnaemeka. A2
Ezeano, Chidinma3
1. Entrepreneurship Development Centre,.Akanu Ibiam Federal Polytechnic Unwana.
2. Department of Computer Science, Akanu Ibiam Federal Polytechnic Unwana.
3. Dept. of Science & Computer Education, Enugu State University of Science & Technology.
E-mail of the corresponding author: aezeano@yahoo.com,
Abstract
Empowerment refers to increasing the spiritual, political, social, educational, or economic strength of an
individual(s) and community(ies). It includes encouraging and developing the skills for, self-sufficiency, with a
focus on eliminating the future need for charity or welfare in the individual or group. The natural endowment of
the women/female folk is particularly informative when considering her enduring roles in any human endeavor.
Nature has uniquely bestowed on the female to mother, nurture, unify and uplift the human society. Ideally, as a
mother, she conceives, delivers, tends and fends for the child to a well- balanced adult. Similarly the IT
(Information Technology) world, should borrow a leaf from nature by encouraging the women folk to participate
at the conceptual planning and implementation stages in achieving the millennium development goals in Nigeria
using IT strategies and tools (MILDEG). In this paper, therefore, the authors throw up the underlying challenges,
opportunities and prospects of the empowerment of our female folks towards the technological boom of our
nation, via the creation, use and application of IT and related technology.
Keyword: Information Technology (IT), Empowerment, Telecommunication links, VSAT, WITED, Electronic
Fund Transfer, Job creation.
1. Introduction.
Before the advent of computers, maintaining and processing large collections of data were at best, awkward and
time-consuming. The application of computers and communication technologies (popularly referred to as
Information and Communication technology – ICT) has enhanced the capture, and manipulation of
data/information; thus empowering the users of same. Information is one of the major determinants of economic
and social development. One of the reasons behind underdevelopment of a country, individual, or any sector of
the economy is bad / ineffective management of data. Daintith, John, ed. (2009) in (en.m.wikipedia.org), stated
that “Information Technology (IT) in the context of business is the application of computers and
Telecommunications equipment to store, retrieve, transmit and manipulate data”. Data, being the live-wire of
any activity is vital and the importance of its timely capture, process, and transmission; through the use of
computers related devices, cannot be over-emphasized. IT/ICT is the principal driver of economic, social, and
cultural change; hence empowering the users (women, inclusive). However, the use of IT/ICT facilities are
hindered by many challenges (Oladunjoye, M. I, Ajayi Ebenezer Akinyemi, Adeleke Tyelolu Olayemi, 2011).
2. Some Reviewed Literatures, and Discussions.
Mayuri Odedra-Straub (1996) opined that Information technology can be of great advantage in various
economic sectors, if used for decision-making. Any decision that is not based on timely, and accurate data is
bound to stunt any meaningful development and hence empowerment. Empowerment entails acquiring
knowledge, fostering self-confidence, expansion of choices, participation in decision making and improving
access to and control over resources, (Stromquist, 2005). ICT, when used effectively, can achieve all of these
goals. With it, one can have access to unlimited resources (knowledge being the most important resource of all).
It is able to improve women's standing, both economically (in terms of access to greater job opportunities/higher
wages), and socially in terms of networking/social interaction. Mastering the basic IT/ICT skills should not be
seen as an end in itself but as a vehicle for one to improve one’s life through access to diverse and vast collection
of online resources that will even assist teachers/educators to design curricular that will meet the socio-economic
needs of women.
According to Dayo Oketola (2012), “The deployment of information and communication technologies at all
levels of education (primary, secondary and tertiary institutions), no doubt will contribute to the meeting of the
Millennium Development Goals (MDGs) of gender parity in education”. Again, it will facilitate interaction and
sharing of knowledge and learning experiences quickly and cheaply over long geographic distances and this will
sustain women's interest in educational activity.
According to Ezeano et.al (2006) in Central Bank of Nigeria (1990), Information Technology (IT) is the ability
for one to create, access, manipulate, store and transmit information in form of text, data, image and voice
2. Journal of Information Engineering and Applications www.iiste.org
ISSN 2224-5782 (print) ISSN 2225-0506 (online)
Vol.3, No.7, 2013
18
through the application of computers, electronic devices and related technology, such as global system mobile
phone (GSM), Micro-electronics, FAX, internet, Electronic Fund Transfer System (EFT), Automated Teller
Machine (ATM), etc. The activities involved in processing (e.g. create, access, manipulate transmit and store)
data (e.g. numbers, text, image and voice), and communicating information are clearly illustrated in table 1.
The two key activities performed in the IT-grid, as illustrated in table 1, are;
Processing and
Communication.
Processing activities: These. are as explained below.
- Create: This reflects the initial building or collection of data (which could be in the form of numbers,
or text, or image, or voice).
- Access: Data already held in the computer’s memory can be retrieved for use.
- Manipulate: Data could be retrieved for the purpose of making changes (i.e. updating, deleting etc.).
- Transmit: The sole purpose of data processing is that of sending it across to another user (which can
be a machine or person).
- Store: All processed data are normally kept either as a hard copy or soft copy for future reference.
Communication: This is an integral part of processing data, text, image, or voice. Without this, the above
processing activities will not be of any use. The System software in conjunction with Application packages
(Excel Spreadsheet, MS Word, etc), facilitates these activities, as illustrated in the IT-grid.
Our former President Obasanjo (2007) explained Empowerment as “… the ability to be self- employed and be
an employer of labor”, (FRCN news, 7.30am). Empowerment encourages people to gain the skills and
knowledge that will allow them to overcome obstacles in life or work environment and ultimately, help them
develop within themselves or the society. One empowerment strategy is to assist marginalized people to generate
their own wealth through education. Education, as a basic human right, is the key to the development of human
capabilities. Any country that refuses to educate it citizens, especially women cannot sustain growth and poverty
reduction. Countries that have invested in education for women as part of their educational priorities, and
integrated approach to societal development have always witnessed slower population growth, faster economic
growth, and a higher level of social cohesion. It is time for all countries to put aside their doubts and fears about
educating women, and give it the highest priority. The realization of this fact, especially on the part of women in
developing countries; has attracted the attention of the international community. This is why development
agencies such as the World Bank, United Nations Development Fund for Women-UNIFEM, and the United
Nation Development Program-UNDP, observed that ICT symbolizes an exceptional enabling instrument when
deployed and used properly. ICTs have given women new opportunities for expanding their projects and the
possibility of a social, political and cultural change. For instance, women networks like WOUGNET have shown
that ICT usage improved the involved women’s means of communication, with positive effect on their livelihood
as well as their participation in public life (Konyeha Susan and Osubor Veronica, 2010).
Abbasi (2001), stated that ICT represents a unique “knowledge-based social Infrastructure” which can be of
great help for women to evade marginalization. Women, therefore, should be empowered by enhancing their
skills, knowledge and access to information technology. This will strengthen their ability to combat negative
portrayals of women and to challenge instances of abuse and negligence.
Women have always been active in agriculture, trade, and other economic pursuits, but “most women across the
globe rely on the informal work sector for an income (United Nations Research Institute for Social Development,
2010). Being guardians of their children’s welfare and having the explicit responsibility to provide for them
materially, the need of empowering them is mandatory. Empowering women through Information and
Communications Technology has been considered as very critical to the attainment of the Millennium
Development Goals in Nigeria (Dayo Oketola, 2012).
If women are empowered to do more and be more; especially through the application of IT, the possibility for
economic growth becomes apparent. An empowered woman can impact a situation, as witnessed by a study that
“shows that companies with more women board of directors, had significantly higher financial returns on equity,
sales, invested capital (OECD, 2008). With skill acquisition, education and basic resources, women can become
catalysts for change and build a better world for all.
IT is the technology that merges computing with high speed telecommunication links carrying data, sound, video,
etc, while telecommunication consists of electromagnetic devices and systems for communicating over long
distances. The process of transmitting data/information from one device to another via specific media e.g. cable,
microwave, satellite, fiber optics etc, to an end-user or application is called Information Communication
Technology (ICT), (Ezeano et al 2006). Hence, ICT is a microcosm of IT. A major component of the Obasanjo
administration’s economic reform program is the restructuring of key sectors of the economy among which is
telecommunication/ICT/IT identified as a critical social driver and enhancer (i.e. job creator). The quality and
density of the sector network and intensity of the use of its services are major indicators of social and economic
3. Journal of Information Engineering and Applications www.iiste.org
ISSN 2224-5782 (print) ISSN 2225-0506 (online)
Vol.3, No.7, 2013
19
development and empowerment (The Obasanjo’s Reforms – telecommunication sector, 2005). Furthermore, the
information in table 2 confirms more that there is growth in operators in the various service categories as shown.
From the displays in Charts 1 and 2, it is evident that, there is an increase in the number of Internet service
providers and VSAT Networks. This signifies an increase in patronage/number of people using ICT.
The phenomenal growth of the ICT/IT industry in recent years is reflected in the fact that Nigeria is today
reckoned as one of the fastest growing IT/ICT markets in the world. Consequently, “thousands of new jobs are
directly/indirectly created” (Ibid) and by reasonable projection more women/females empowered. In this regard,
NCS in concert with WITED [Women in Technical Education and Employment … a project conceptualized by
the commonwealth association of Polytechnics in Africa (CAPA)] in reaction to the observed exceeding low
participation of women in technical education (IT) in its member institutions, instituted WITED. This body,
established in Nigeria in 1994, among other charges, is aimed at identifying the factors which impede women
participation in technical education such as (IT), training and employment. The long term objective of the project
is to enhance the participation of women in technical education (IT) at all levels.
Obayelu, A., & Ogunlade, I. (2006) elaborated that “a study in Nigeria revealed that women considered the word
"technology" to have male connotations, even though "information" seemed more feminine. Some even believed
that working with ICTs would drive women mad. These examples indicate a high level of discomfort with new
information technologies”. With this development, it is necessary to deliberately increase gender equity in ICT
utilization through the following practical steps:
Provision of many different computer packages and applications that addresses critical challenges and
aspirations of women.
Giving sufficient opportunities for women and girls in accessing computers, as well as increasing teacher
consciousness of gender issues in relation to ICT.
Paying particular attention to the career prospects of women and girls who achieve at school and in ICT
Avoiding a situation in which working with computers will be identified with abstract technical knowledge.
Creating role models through ' peer learning' for women and girls.
Increasing the number of female teachers/lecturers using computers as role-models for women and girls.
Embedding ICT teaching in the normal curricula subjects for both male and female students.
According to Economic Action Plan (2012), government is committed to supporting job creation by small
businesses and opportunities for under-represented groups (women) in the workforce. With ICT, many women
can perform better; as they will be enabled to share information or idea with others across the globe. If afforded
this opportunity, women can “participate effectively in policy-making and governance (OnlineNigeria, ***2013).
3. Challenges/problems of low women empowerment using IT
“Most women all over the world face a variety of legal, economic and social constraints. Some are still being
treated as minors, while some are even expected to obtain their husbands consent before opening a bank account.”
(Harison, 1983). This makes it often more difficult for women to gain access to IT, resources and credit.
Again, the rearing practices of girls and boys in Africa have been hindrances to female choice of an excellence in
some skills, one of which is information technology (IT). The segregate-treatment in intentions and method of
handling between boys and girls by the society has led to some deficiencies in girls, educationally, which are
artificial (Mivanyi, 1997). The girl can do what the boy does if the society allows her. Traditionally by the age of
9 years or even 8, the girl child is warned not to manipulate objects like a boy, she must be in the kitchen. The
girls are finding it difficult to leave those technical skills because of these cultural practices and inhibitions. For
instance in the department of education technical of Kaduna Polytechnic, out of 799 students, 772 are males
while the remaining 27 are females. The same unbalanced ratio applies in courses like Engineering and
Computer Science in Akanu Ibiam Federal Polytechnic, Unwana. Just as the girl is asked to stay in the kitchen
and learn/admire the mother display her talent in cooking, mothers should learn the arts of using IT/ICT; as well
the manipulation of television, sound sets, fixing of plugs, etc. Other problems include, but not limited to:-
Poor background of girls in Mathematics and other science subjects.
General lack of confidence and interest in females.
Lack of effective career guidance and counseling.
Some cultural and attitudinal beliefs and gender stereo-typing by parents and society.
Failure by employers to recognize or accept female suitability for IT jobs.
Lack of specific government policies/legislation or affirmative action.
Lack of supportive facilities by employers, and tertiary institutions that are gender-biased.
Limited career prospects and salaries and unfavorable conditions at work places.
Peer bias against IT.
4. Journal of Information Engineering and Applications www.iiste.org
ISSN 2224-5782 (print) ISSN 2225-0506 (online)
Vol.3, No.7, 2013
20
4. Constraints of Women Empowerment
It has even been argued that for any sustainable and meaningful development to take place, the question of
women in Information technology and nation must be addressed (Ayoade, Nwabuzo Sambo and Omoruyi, 1992).
Apparently, the Nigerian women work more in IT as receptionists, computer operators, cleaners/office assistants
than as managers and decision-makers. This is further evidenced by large number of them in business centers
and umbrella-based GSM call centers etc. This implies that women are not positioned to influence decisions in
this regard. As a result, the British Prime minister, Margaret Thatcher, was prompted to bemoan that it was high
time there were more women in politics (Information Technology) so that she and her few colleagues would not
be conspicuous (Nigeria Vanguard, 2 October, 1990). Regrettably, B. Blutto of Philippines, Indira Ghandi of
India and Bandaranaike of Sri Lanka, all rose to fame because of the demise of their famous male relatives in
form of husbands/fathers; including our Governor Virgy Etiaba of Anambra State who clinched the post due to
series of impeachment-saga in that state. This is not the type of empowerment, per se, that is being advocated (i.e.
one done in sympathy and unsavory conditions). The economic commission of Africa (1989) observed further
that “at the decision-making level and political participation that the factors that affect women’s participation in
IT/politics include: resources, time, skill, experience, patronage, contacts and information. Women are at a
disadvantage with regard to all these factors that promote success in polities (IT). Participation of women
requires both human, financial resources as well as attitudinal change on the part of society towards women
participation in political and administrative positions that require decision-making (UN, ECA Report 1989).
Again women face difficulties in being as resourcefully active in IT as men, because of their position in the
family, absence of relevant occupations and gender socialization (Norris and Lovendaskei, 1995). Furthermore,
even those few women who have managed to get through to the top by “cracking the glass ceiling” notably in
politics, industry, finance/banking, academics, find it difficult to be fully accepted on the high-ground level
(News letter, 2000). Interestingly, Holtzman and Williams (1987) confirmed that women candidates are
frequently held to higher standards than their male counterparts. The media and other institutions scrutinize a
female candidate much more closely than a man. The effect is that it requires a great deal more courage for
women to opt for high-level IT careers than their male counterparts. To add more credence to this, Hon. Senator
Buckonor Akerele, the then Deputy Governor of Lagos State, stated in Sunday Vanguard of 16 June, 2002 that
“… all sorts of things have been done against me basically because of my gender but more importantly because
of certain degree of complex combined with greed in some men to make them want to reduce my status, my
contribution to the socio-economic development of Lagos state and render my office redundant. In politics, they
have erected walls which are impossible for many women to scale” (Akerele 2002). In effect even when women
transcend the barriers and successfully capture IT power position, they are expected to carry the traditional
image along with them into the new functions, unfortunately. Arguing further (Akerele 2002) added that “… to
ensure that women are effectively kept out of political power, they (men) organize critical caucus meeting for
unholy hours of the night when no self respecting and respectable women can afford to be out of her home.” It is
at this ungodly hour that they take all crucial decisions, share all-important positions and leave only token posts
for women. As a panacea, government should give top priority to the actualization of the ideals of the National
policy on women, by directing cabinet members to implement them without further delay. Again, there should be
equal sharing of household chores between boys and girls so that the girls would also be afforded equal
opportunities for necessary traits in IT-acquisition. The federal character clause should also be introduced into
the constitution of the Federal Republic of Nigeria for gender balancing and equality through IT education,
training and management.
5. Job Creation/Opportunities
The areas of IT applications can be broken into two;
Commercial: This covers the use of computer for clerical, administrative and business purposes in
private and public organization.
Scientific/Engineering/Research application: This covers the use of computers for complex
calculations, design, analysis and control of physical systems including teaching and research. The qualified
women computer professionals can take up employment in industries, government establishments, and financial
institutions like banks, oil companies, teaching and research or establish their own computer bureau
outfits/business.
5.1 Roles/Functions of Some Selected IT Professionals.
With globalization and increasing demand for a highly skilled workforce, women cannot afford to remain at a
crossroad. Women and girls must not be left behind in the digital revolution, they must take advantage of the
capabilities of ICTs in education to achieve their full potentials and contribute meaningfully to national
development. A skilled woman in ICT can become any of the following;
5. Journal of Information Engineering and Applications www.iiste.org
ISSN 2224-5782 (print) ISSN 2225-0506 (online)
Vol.3, No.7, 2013
21
(i) Programmer: As a programmer, the women/girl child has any of the available job activities to
perform:-
Drawing of flowcharts, decision tables, and pseudo-codes, required to develop the codes into
acceptable computer language e.g. Visual BASIC, JAVA, FORTRAN HTML etc.
Coding of programs and their preparation for computer operations.
Designing and testing of program logics.
Thoroughly testing of the operations of completed programs.
Designs of quality web-sites etc.
(ii) Analyst: The following tasks await the choice of being an analyst:-
Authors and analyses information for development and modifying data processing systems.
Designs and specifies systems and methods of installing them and supervises same.
Documents fact-finding and system study results.
Makes formal presentation of findings with recommendations etc.
(iii) Controller/Director of IT: As controller of IT, the following activities await her:-
Designs, maintains and controls the organizations database/Intranet/Internet.
Establishes and enforces standards for use of the database/cyber-café.
Analyses information-requirements of new or modified systems and develops database
specification.
Establishes and enforces control to ensure database integrity and security.
Develops specification for database/internet set-up and maintenance.
Reconstruction of database to cater for emerging, information requirements to reflect current
needs of the users and state-of-the-arts.
Ensures that only the best, for the organization/users are in the database/Internet etc.
(iv) Web Master /Designer: As a web Master designer, the following activities exist.
Designs and maintains web servers and database servers.
Develops, tests, and documents new web-based services for web-sites.
Works with internal and external customers to create higher quality content pages for web-sites.
(v) Word Processing Secretary: As word processing Secretary, she will be responsible to the controller
of IT for all word processing jobs using Ms-Word, Excel, etc. for the production of articles,
memoranda, and letters (both hard and soft copies) to meet the organizational goals and objectives
etc.
(vi) Computer Engineer: As a computer engineer, she:-
Maintains the computers and peripherals in good-working conditions.
Monitors the computer room environment and specifies ideal working condition.
Repairs or replaces defective component parts.
Installs new computers e.g. stand-alone networks or full Internet connectivity.
Maintains system logs and performs procedures required for systems backups, etc.
6. Some Career women in Africa women: who is who.
No nation is ever able to rise above the need to benefit from the empowered female roles. Of note here are the
legacies of such internationally acclaimed women achievers as Prof. Dora Akunyelu, former Director General of
NAFDAC, Dr. Oby. Ezekwesiri ( former Minister of Education), Hajai Sara Jibril of Women Affairs Ministry
and above all former , Governor Virgy Etiaba of Anambra State , President Banda of Malawi to mention but a
few. These are some of the acclaimed women IT-Compliant experts who have assailed the disturbing hurdles
rarely overcome by men. One good turn deserves another; so let more women be empowered for more
technological breakthroughs.
7. Professional Bodies in the field of IT
Any interested female graduate of the Computer Science, Computer Engineering, Information Technology,
System Science etc can register and be admitted into the Nigerian Computer Society (NCS) at different levels of
membership. This entitles the beneficiary to numerous rights and privileges within and outside the country. Also
there are different required educational qualifications as prerequisites for admission available from the body on
request.
8. Conclusion
In many societies of the world, women never belong wholly to themselves; they are the property of others
throughout their lives. Their physical well-being – health, security and bodily integrity – is often beyond their
control (http://www.care.org/newsroom/publications/whitepapers/woman_and_empowerment.pdf). Women bear
6. Journal of Information Engineering and Applications www.iiste.org
ISSN 2224-5782 (print) ISSN 2225-0506 (online)
Vol.3, No.7, 2013
22
almost all responsibility for meeting basic needs of the family, yet are systematically denied the resources,
information and freedom of action they need to fulfill this responsibility. The empowerment of individuals
(women) or society; largely depends on their access to information and knowledge (which is the key to
performance and survival).
Timitokpe Olorunfemi and Onaolopo, (2008) opined that ICTs are indispensable tools used by all to deal with
the limitations of time, cost, and distance problems”; thus creating new opportunities. With these, “Women who
“are suffering from various problems” (Arpita Sharma, 2012), can easily avail themselves of large resources that
will assist them, over the Net. The empowering use of ICT is closely connected to socio-economic development,
especially in this time and age.
Despite all the social, political, and cultural obstacles; women generally and more especially career women,
often put in their best in any assigned task. This explains the reason why they keep pace even with their male
counterparts and continue to move into different professions, including those traditionally seen as male jobs (e.g.
engineering, architecture, medicine, etc). Due to their determination to succeed, in spite of all odds, they are
found at different levels in many organizations. The female/women contributions to society’s progress (IT) are
probably best demonstrated in their ability to uplift the human spirits particularly at the points of despair, as it
seems in Nigeria now. When all hope seems lost the encouraging words of the concerned female, women could
make the differences between eventual failure or success. Some analysts have grouped our time as a transition
from “industrial age” to the “information age”. For an effective, efficient and sustainable transition to be realized,
the full participation of the female gender is needed. At present most people in developed and developing nations
work on blue collar jobs in factories. By the end of this century, majority of workers in Nigeria/Africa are
projected to be information workers, not manual workers. Government should ensure through appropriate
legislation, provision of infrastructures and creation of awareness nationwide, as to the criticality of women
empowerment. The women/females must be our catalysts from the present gloom to the expected boom in this
Information super-high-way age.
References
Abdullahi, Aliyu (1997). The Role of females in Technical Education on the Implementation of the Family
Economic Advancement Program, FEAP, Seminar paper delivered at the 1st
National Workshop of Women in
Technical Education and Empowerment (WITED), Women Development Centre, Abuja, October 22-23.
Ayoade, J. A.A., Nwahuzo, E.J. Sambo, S. and Omoruyi O. (1992). Women and Politics in Nigeria, Ikeja:
Center for Democratic studies Mallhouse Press Ltd.
Cecilia, U.O. (2006), The constraints on Nigeria Women participation in Politics, Journals of University of the
Gambia, Pages 50-57.
Daintith, John ed. (2009).”IT” A Dictionary of Physics, Oxford University Press. Retrieved August 1, 2012
Economic Action Plan (2012), Jobs Growth and Long-Term Prosperity.
Ezeano, A, N, and Ezeano V.N. (1997). Career in Computer Science: issues and & Prospects, Technical
Education Today, NBTE Kaduna Vol.7, No.1&2
Ezeano, V.N. & Ezeano A, N, (2006). E-learning/Virtual classroom as a Sinequanon to
Functional open & Distance learning (ODL): Burdens and Benefits, Journal of University of the Gambia,
University of the Gambia, pp 164-165.
Ezeano, A, N. and Onoh O. (1992). A case for computer literary in Nigeria, Technical
Education Today, NBTE, Kaduna, Vol 3. No. 1 & 2.
FRCN (2007, Oral) .Network News, 7.30a.m.
Harison (1983). The third World Tomorrow, NY, PilgrimPress & Harmondsworth, Penguin. Retrieved, April 21,
2013.
Holtzmen, E. and Williams, S. (1987). Women in political World Observation, in Daedalus. Journal of the
American Academy of Arts and Sciences. Vol. 116 No. 4:25-34
http://www.care.org/newsroom/publications/whitepapers/woman_and_empowerment.pdf
Konyeha Susan and Osubor Veronica (2010) Empowering Women Through ICT
http://www.uniben.edu/abstracts/empowering-women-through-ict.
OnlineNigeria (2013). Nigerian Women In Development. Posted on June 14, 2013. Retrieved on May 15, 2013.
Temitope Olorunfemi and Onaolapo F. Oladipo (2008). Impact of ICT on Women Empowerment in Nigeria.
The Fifteenth International Conference on Learning. University of Illinois Chicago, USA. 3-8 June, 2008.
Mayuri Odedra-Straub (1996). Overall status of women in Africa. (htpp://unu.edu.).
Mivanyi, J.Y. (1997). Enhancing Opportunities for an increased participation of Female Students in Technical
Education through Modeling, paper presented at WITED, Abuja.
Norris, P. and Lovenduski J. eds (1985). Political Recruitment: Gender race and class in the British parliament:
Cambride University Press.
7. Journal of Information Engineering and Applications www.iiste.org
ISSN 2224-5782 (print) ISSN 2225-0506 (online)
Vol.3, No.7, 2013
23
Thatcher, M. (1990) Comment on the position of Women in Politics, women Vanguard, October 2.
Oladunjoye, M. I, Ajayi Ebenezer Akinyemi, Adeleke Tyelolu Olayemi (2011). Effective use of Information
Technology to Create Wealth and Job in Subsidy Re-investment policy of Nigeria Government. Book of
Abstracts for 1st
and 2nd
Annual State conference 2011/2012 of the Nigeria Computer Society, Kogi State
Chapter. Pp 134-137.
United Nations Research Institute for Social Development (2010). Combating Poverty and Inequality: Structural
Change, Social Policy and Politics. Geneva:UNRISD “Gender Inequalities at Home and in the Market.” pp 5-33
U.N. Economic Commission of Africa (1989). Report to the 4th Regional Conference on the Integration of
women in Development. Abuja November 6-10.
Wikipedia.org/wiki/Empowerment. Retrieved April 21, 2013.
WITED Handbook (1994).
Victoria Ezeano, N. (MNCS’01-MBCS’08-FCAI’11) is a Principal Lecturer in the department of Computer
Science, Akanu Ibiam Federal Polytechnic, Unwana. She has not less than twenty-five years of post graduate
experience in Computer Science and Information Technology. This author became a full member of Nigeria
Computer Society in 2001, a chartered member of British Computer Society in 2008 and a Fellow of Institute of
Corporate Administration of Nigeria in 2011). She has scores of national and international journal articles to her
credit including text books in addition to being a notable seminar presenter in IT conferences within and outside
the country. She parades the following credentials: Certificate on Entrepreneurship, Republic of Benin
(SONGHAI CENTRE), HDIMT (Computer Science), PGD (Computer Technology) Federal University of
Technology Owerri, Nigeria; M.Sc. (Computer Science) Ebonyi State University, Abakaliki, Nigeria and
currently in her last stage of her PhD (Computer Science) programme also in Ebonyi State University, Abakaliki.
Ezeano Nnaemeka A (MNCS’01-MBCS’08-MCPN’10-FCAI’11); is a popular humorist, essayist, orator and
guest artist to the then Anambra Broadcasting Corporation and Radio Nigeria Enugu. He is also an award winner
of letters from Africa, a popular BBC (British Broadcasting Corporation) London program. He is a prolific
writer and assessor of reputed International Journals like Nigeria Journal of Technical Education, an outfit of the
NBTE Kaduna & Journal of Science and Engineering Development of A.I.F.P.U. He has also written over thirty
national and international journal articles within and outside Nigeria and also a co-author of text books such as:-
computer software packages, and Model Questions & answers in information technology/computer science. He
was one of the pioneer students of Computer Science department in the Institute of Management and Technology
(IMT) Enugu in 1978, coming out with HDIMT. Later, he obtained a PGD in Computer Science & Engineering
from ESUT, Enugu, Nigeria. He also holds MSc (Computer Science) from the Nnamdi Azikiwe University,
Awka, in Nigeria; a chartered Member (M) of British Computer Society, Member (M) of Nigeria Computer
Society and Member (M) Computer Professionals Registration Council of Nigeria (MCPN). He is presently in
the last stage of his PhD programme in Ebonyi State University, Abakaliki, a chief Lecturer and Head,
department of Computer Science, Akanu Ibiam Federal Polytechnic Unwana.
Dr Chidinma Ezeano (M’08) is a Senior Lecturer in the Department of Computer Education, Enugu State
University of Science and Technology, Enugu, Nigeria. She holds a BSc. degree in Education (Chemistry) from
University of Nigeria, Nsukka (UNN) in1990; MSc. Education (Chemistry) from UNN; PhD in Education
(Chemistry), UNN. She is a Member, of Science Teachers’ Association (STAN). She has published several
conference and Journal papers on Science education.
Table 1: IT grid activities.
Processing/
communication
Create Access Manipulate Transmit Store
Data x x Excel Spreadsheet x x
Text x x x x x
Image x x x x x
Voice x x x x x
8. Journal of Information Engineering and Applications www.iiste.org
ISSN 2224-5782 (print) ISSN 2225-0506 (online)
Vol.3, No.7, 2013
24
Table 2: Service category.
Year 1999 2000 2001 2002 2003 2004
VSAT Networks 25 32 38 45 51 52
Internet Service
providers
18 30 30 35 35 36
Chart 1: Comparison of different values, representing various categories of IT/ICT, over time.
Chart 2: Line-graph representation of the trend (of ICT user over time in their categories)
0
10
20
30
40
50
60
1 2 3 4 5 6
VSAT Networks
Internet Service Providers
0
10
20
30
40
50
60
70
80
90
100
1 2 3 4 5 6
Internet Service
Providers
VSAT Networks
9. This academic article was published by The International Institute for Science,
Technology and Education (IISTE). The IISTE is a pioneer in the Open Access
Publishing service based in the U.S. and Europe. The aim of the institute is
Accelerating Global Knowledge Sharing.
More information about the publisher can be found in the IISTE’s homepage:
http://www.iiste.org
CALL FOR PAPERS
The IISTE is currently hosting more than 30 peer-reviewed academic journals and
collaborating with academic institutions around the world. There’s no deadline for
submission. Prospective authors of IISTE journals can find the submission
instruction on the following page: http://www.iiste.org/Journals/
The IISTE editorial team promises to the review and publish all the qualified
submissions in a fast manner. All the journals articles are available online to the
readers all over the world without financial, legal, or technical barriers other than
those inseparable from gaining access to the internet itself. Printed version of the
journals is also available upon request of readers and authors.
IISTE Knowledge Sharing Partners
EBSCO, Index Copernicus, Ulrich's Periodicals Directory, JournalTOCS, PKP Open
Archives Harvester, Bielefeld Academic Search Engine, Elektronische
Zeitschriftenbibliothek EZB, Open J-Gate, OCLC WorldCat, Universe Digtial
Library , NewJour, Google Scholar