Using Alternative Technologies for Teacher Training in Developing Countries

Author(s):  
Victoria L. Frank

In this chapter the author discusses how developing countries are using technology in education when Internet connectivity or electricity is not dependable. Developing countries are embracing educational technologies because they are the fastest, cheapest, and most consistent way to train large numbers of teachers and support education reform. Emerging nations are also enjoying funding opportunities that include public/private partnerships, which contribute to the needed infrastructure, providing significant amounts of computers and networking hardware and software from the likes of Microsoft, Cisco, Dell, and Oracle. Many outstanding ICT case studies and examples abound, but most rely on the Internet in whole or in part (Trucano, 2010). One of the great challenges in the developing world is finding sustainable methods for improving teacher training where Internet and electricity are not a given. Some of the ways these obstacles have been overcome in developing countries are discussed in this chapter.

2004 ◽  
Vol 19 (3) ◽  
pp. 172-177 ◽  
Author(s):  
Jeffrey James

The global digital divide is usually measured in terms of differences between rich and poor countries in the extent to which they use ICTs in general and the Internet in particular. Such a view of the problem, however, ignores the fact that there are all kinds of ways in which poor, illiterate persons in developing countries benefit from the Internet without any use of computers and Internet connectivity. Most of these benefits occur as a result of intermediaries who, in one way or another, transfer relevant parts of the knowledge available from the technology to recipients in a form that is relevant to their specific needs. Using India as an illustration of this argument, we find that usage understates actual beneficiaries by at least 30 percent. On the basis of this finding, we suggest that a reconstrued notion of the digital divide be based on usage as well as other more indirect forms of benefit from the Internet in developing countries. To this end, much more needs to be known about these other forms of benefit in a large sample of countries in addition to India.


2005 ◽  
Vol 04 (02) ◽  
pp. 297-309 ◽  
Author(s):  
A. O. IDOWU ◽  
PETER ADEBAYO IDOWU ◽  
E. R. ADAGUNODO

The phenomenal growth of information and communication technology (ICT) especially the Internet has affected youths in developed and developing countries alike. Although progressing at a slower rate in developing countries than in any other parts of the world, Internet connectivity is also transforming the face of Africa. This paper presents a study that examines what Nigerian youths use Internet for and which of the Internet use has adverse effect on the youth's social life. It reveals that majority of youths use Internet for e-mail, making use of Yahoo followed by Hotmail, and the study also reveals that over 50% of youths interviewed visit pornographic sites.


2021 ◽  
Author(s):  
Rajesh Kumar ◽  
Ravi Kant ◽  
Poonam Yadav ◽  
Tamar Rodney ◽  
Mukesh Bairwa

Abstract BackgroundThe burden of tobacco-associated disorders is prevalent worldwide. Over the years, many innovative internet-based approaches have been utilized with variable success to quit tobacco. Though the effectiveness of internet-based and face-to-face interventions on quitting smoking are very well reported in the literature, due to limitation in methodology and limited sample size, it is required to integrate and analyze these studies' findings to reach a single conclusion. The study evaluated the effectiveness of the internet as an intervention approach versus face-to-face interaction on reducing tobacco use as control among adults.MethodsA systematic search was performed through various electronic databases such as Medline, PsychInfo, PubMed, Embase, Cochrane Central Register of Controlled Trials (CENTRAL), ResearchGate, Google Scholar, and Academia. Reference lists of the eligible articles were also screened. Full-text articles were included as per eligibility criteria (PICO framework). No ethnicity restriction was applied.ResultsA total of 13 studies were selected for meta-analysis, with 3852 and 3908 participants in intervention and control groups respectively. Forest plot favours the intervention group at one month follow up for tobacco quitting (OR: 2.37, CI: 1.86-3.02, P-0.00001, I2 =0%), at three months (OR: 1.88, CI: 1.48-2.40, P-0.00001, I2 =42%) at six months (OR: 2.02, CI: 1.64-2.50, P-0.00001, I2 =38%) and at 1 year of follow-up (OR: 1.43, CI: 1.18-1.74, P-0.00001, I2 = 36%) comparing to control group. ConclusionInternet and web-based interventions are highly useful in tobacco quitting at one month, three months, six months, and one year of follow-up compared to face-to-face interaction or no intervention, although the level of evidence was moderate. Additionally, limited availability of trials in developing countries, arising need for research of internet use in developing countries to quit tobacco. Prospero Registration number- PROSPERO 2020 CRD42020214306


2012 ◽  
Vol 210 ◽  
pp. 398-418 ◽  
Author(s):  
Yan Hairong ◽  
Barry Sautman

AbstractA recent addition to the global discourse of China's interaction with developing countries has been the claim that the Chinese government exports prison labour to these countries. While no evidence is ever presented to support this claim, it has been widely circulated in international and local media, as well as on the internet. This article examines the origins of the rumour and the mechanisms of its transmission. It shows that while the rumour often originates at the grass roots in developing countries, it is promoted locally and globally by political, economic and media elites with distinct agendas that often involve building support for opposition parties, competition in obtaining contracts, or geo-strategic and ideological rivalry. We analyse the rumour's circulation in light of the larger discourse on China and developing countries, and discuss why Chinese official responses to the claim have proved to be ineffective.


2021 ◽  
Vol 5 (6) ◽  
pp. 1161-1170
Author(s):  
Valen Brata Pranaya ◽  
Theophilus Wellem

The validity of the routing advertisements sent by one router to another is essential for Internet connectivity. To perform routing exchanges between Autonomous Systems (AS) on the Internet, a protocol known as the Border Gateway Protocol (BGP) is used. One of the most common attacks on routers running BGP is prefix hijacking. This attack aims to disrupt connections between AS and divert routing to destinations that are not appropriate for crimes, such as fraud and data breach. One of the methods developed to prevent prefix hijacking is the Resource Public Key Infrastructure (RPKI). RPKI is a public key infrastructure (PKI) developed for BGP routing security on the Internet and can be used by routers to validate routing advertisements sent by their BGP peers. RPKI utilizes a digital certificate issued by the Certification Authority (CA) to validate the subnet in a routing advertisement. This study aims to implement BGP and RPKI using the Bird Internet Routing Daemon (BIRD). Simulation and implementation are carried out using the GNS3 simulator and a server that acts as the RPKI validator. Experiments were conducted using 4 AS, 7 routers, 1 server for BIRD, and 1 server for validators, and there were 26 invalid or unknown subnets advertised by 2 routers in the simulated topology. The experiment results show that the router can successfully validated the routing advertisement received from its BGP peer using RPKI. All invalid and unknown subnets are not forwarded to other routers in the AS where they are located such that route hijacking is prevented.  


2023 ◽  
Vol 55 (1) ◽  
pp. 1-35
Author(s):  
Abhishek Hazra ◽  
Mainak Adhikari ◽  
Tarachand Amgoth ◽  
Satish Narayana Srirama

In the era of Industry 4.0, the Internet-of-Things (IoT) performs the driving position analogous to the initial industrial metamorphosis. IoT affords the potential to couple machine-to-machine intercommunication and real-time information-gathering within the industry domain. Hence, the enactment of IoT in the industry magnifies effective optimization, authority, and data-driven judgment. However, this field undergoes several interoperable issues, including large numbers of heterogeneous IoT gadgets, tools, software, sensing, and processing components, joining through the Internet, despite the deficiency of communication protocols and standards. Recently, various interoperable protocols, platforms, standards, and technologies are enhanced and altered according to the specifications of the applicability in industrial applications. However, there are no recent survey papers that primarily examine various interoperability issues that Industrial IoT (IIoT) faces. In this review, we investigate the conventional and recent developments of relevant state-of-the-art IIoT technologies, frameworks, and solutions for facilitating interoperability between different IIoT components. We also discuss several interoperable IIoT standards, protocols, and models for digitizing the industrial revolution. Finally, we conclude this survey with an inherent discussion of open challenges and directions for future research.


Author(s):  
Inderjeet Singh Sodhi

This chapter highlights the constant increase in the number of attacks on computer network systems, which has pushed governments, researchers, and experts to devise better security policies and strategies. However, the rapid growth of systems, components, and services offered has increased the difficulty of administering them. In many organizations in developed and developing countries, more emphasis is being given on use of Automatic Computing for proper network security. The chapter clarifies how various projects and tools could be relevant for network security. The chapter provides insights about what steps have been taken for network security in a developing country like India. It looks into various strategies adopted for communication data and network security in India. It emphasizes that, with increasing demand for basic/citizen services over the Internet, it has become important to protect data and ensure efficient backup and data recovery. The chapter proposes a need for better and effective policy and strategy for communication data and network security to make the government citizen-oriented in developing countries.


Author(s):  
Gohar Feroz Khan ◽  
Junghoon Moon

Electronic government, or e-Government, is the practice of providing public services to citizens, businesses, and other government agencies where government services can be accessed through the Internet, mobile phone, fax, mail, telephone, and personal visits (MGAHA, 2005). Developing countries, utilizing the late comer advantage, are mimicking trends of paperless governments with the expectations to reap the same benefits enjoyed by developed countries. However, e-Government initiatives have not always been successful in developing countries. According to the study conducted by Heeks (2003), the rate of e-Government success in developing countries was only 15 percent. The authors believe that such failures are mainly due to certain unique social, economic, technological, and environmental challenges faced by e-Government in developing countries. For example, some major issues include digital divide, political instability, and skills-related issues. However, the research dealing with these problems is limited. Therefore, in this chapter, the authors discuss these challenges.


Sign in / Sign up

Export Citation Format

Share Document