Do Insecure Systems Increase Global Digital Divide?

Author(s):  
Jawed Siddiqi ◽  
Ja’far Alqatawna ◽  
Mohammad Hjouj Btoush

This chapter surveys the issues concerning the digital divide facing developing nations. The authors assert that “insecurity” and the “digital divide” are highly dependent on each other and as insecurity increases so does the digital divide. Therefore, the authors propose to extend the concept of the digital divide to include information security features by putting forward a new model or paradigm of security that is multi-faceted and is able to assist in bridging the digital divide gap. They argue that a lack of attention to security reduces the access to and use of resources with which to attack the digital divide. In particular, for e-business, the authors conclude that in developing countries having security issues at the forefront would encourage engagement with e-initiatives, or restrain it if there is an absence of security.

2011 ◽  
pp. 2102-2111
Author(s):  
Jawed Siddiqi ◽  
Ja’far Alqatawna ◽  
Mohammad Hjouj Btoush

This chapter surveys the issues concerning the digital divide facing developing nations. The authors assert that “insecurity” and the “digital divide” are highly dependent on each other and as insecurity increases so does the digital divide. Therefore, the authors propose to extend the concept of the digital divide to include information security features by putting forward a new model or paradigm of security that is multi-faceted and is able to assist in bridging the digital divide gap. They argue that a lack of attention to security reduces the access to and use of resources with which to attack the digital divide. In particular, for e-business, the authors conclude that in developing countries having security issues at the forefront would encourage engagement with e-initiatives, or restrain it if there is an absence of security.


Author(s):  
Oyelami Olufemi Moses

Aims: This article reports the various application areas of the spoken dialogue system in the developing world to determine if the system could be used to bridge the digital divide prevalent in these regions of the world. The work also aims to identify in which developing nations is the system currently being put to use. Study Design:  A survey of twenty articles on the subject matter was carried out and their domains of the application were identified. The different forms of the evaluation carried out on them were also identified towards determining their outcomes positivity for bridging the digital divide. Various comments made of the different evaluations were also considered in determining the suitability of spoken dialogue systems in bridging the digital divide. Place and Duration of Study: Department of Computer Science and Information Technology, Bowen University, Iwo, Nigeria, between February 2013 and October 2019. Methodology: The different domains of the works, the different forms of the evaluation carried out on the systems, the various comments consequent upon the testing of the systems by the participants and the developing countries where those works were carried out were identified. A position was now taken based on the results obtained.   Results: Nine of the works are in the healthcare domain, three in agriculture, one in banking, one in aviation, one in secretarial work, one in the accuracy of recognition, one in education and three having multiple domains. The various comments and results from the evaluations all point towards the system’s suitability for bridging the digital divide. The spoken dialogue system is currently being used in only six developing nations of the world. Conclusion: Consequent upon the results obtained, it is clear that spoken dialogue systems can be used to bridge the digital divide in the developing world and that other application areas not yet covered could be explored for the benefits of the citizens of these regions, especially the digitally disadvantaged ones.


Author(s):  
Meena Chary ◽  
Stephen K. Aikins

This chapter assesses how public policy can be used to bridge the global digital divide, especially in developing nations. First, the chapter characterizes the Internet technologies encompassed within the digital divide according to dimensions of individual socioeconomic characteristics and service provider infrastructure characteristics. Then, the chapter develops a set of technology policy dimensions as they affect those two dimensions, using case vignettes from India to illustrate policy actions. Finally, the chapter makes policy action recommendations to bridge the digital divide, including investments in education and literacy, e-governance, intermediary services, infrastructure, and regulation.


Author(s):  
Nikhilesh Dholakia ◽  
Nir Kshetri

This chapter presents a comparative view of e-business systems designed to extend the benefits of e-business to the poor demographic segments of the developing world and to reach populations that are on the “wrong side of the digital divide.” Four such systems are selected: the Global Trade Point Network (GTPN) of the United Nations, Alcatel Telemedicine Network, Little Intelligent Communities (LINCOS), and Johns Hopkins International’s (JHI) Telemedicine Network. The four networks are compared across various network architecture dimensions. Our analysis indicates that LINCOS offers reduced capital cost, flexible architectures, and at the same time access to worldwide information systems, and hence has the highest potential to reach effectively the most excluded population in developing countries. Collaborations among technology marketers, national governments and international agencies are needed to identify the needs of the digitally excluded population and select appropriate architectures to serve the needs.


Author(s):  
Nikhilesh Dholakia ◽  
Nir K. Kshetri

This chapter presents a comparative view of e-business systems designed to extend the benefits of e-business to the poor demographic segments of the developing world and to reach populations that are on the “wrong side of the digital divide.” Four such systems are selected: the Global Trade Point Network (GTPN) of the United Nations, Alcatel Telemedicine Network, Little Intelligent Communities (LINCOS), and Johns Hopkins International’s (JHI) Telemedicine Network. The four networks are compared across various network architecture dimensions. Our analysis indicates that LINCOS offers reduced capital cost, flexible architectures, and at the same time access to worldwide information systems, and hence has the highest potential to reach effectively the most excluded population in developing countries. Collaborations among technology marketers, national governments and international agencies are needed to identify the needs of the digitally excluded population and select appropriate architectures to serve the needs.


2004 ◽  
Vol 19 (3) ◽  
pp. 172-177 ◽  
Author(s):  
Jeffrey James

The global digital divide is usually measured in terms of differences between rich and poor countries in the extent to which they use ICTs in general and the Internet in particular. Such a view of the problem, however, ignores the fact that there are all kinds of ways in which poor, illiterate persons in developing countries benefit from the Internet without any use of computers and Internet connectivity. Most of these benefits occur as a result of intermediaries who, in one way or another, transfer relevant parts of the knowledge available from the technology to recipients in a form that is relevant to their specific needs. Using India as an illustration of this argument, we find that usage understates actual beneficiaries by at least 30 percent. On the basis of this finding, we suggest that a reconstrued notion of the digital divide be based on usage as well as other more indirect forms of benefit from the Internet in developing countries. To this end, much more needs to be known about these other forms of benefit in a large sample of countries in addition to India.


2013 ◽  
pp. 364-379
Author(s):  
Meena Chary ◽  
Stephen K. Aikins

This chapter assesses how public policy can be used to bridge the global digital divide, especially in developing nations. First, the chapter characterizes the Internet technologies encompassed within the digital divide according to dimensions of individual socioeconomic characteristics and service provider infrastructure characteristics. Then, the chapter develops a set of technology policy dimensions as they affect those two dimensions, using case vignettes from India to illustrate policy actions. Finally, the chapter makes policy action recommendations to bridge the digital divide, including investments in education and literacy, e-governance, intermediary services, infrastructure, and regulation.


2020 ◽  
Vol 10 (7) ◽  
pp. 2613 ◽  
Author(s):  
Jean-Pierre Niyigena ◽  
Qingshan Jiang ◽  
Djemel Ziou ◽  
Ruey-Shiang Shaw ◽  
A S M Touhidul Hasan

During the last decade, information and communication technology has brought remarkable changes to the education style of developed countries, especially in the context of online learning materials accessibility. However, in developing nations such as the East African (EA) countries, university students may lack the necessary ICT training to take advantage of e-learning resources productively. Therefore, the comprehension of the key factors behind ICT fluency is a significant concern for this region and all the developing countries in general. This paper applies the Concentration Index and proposes a Logistic Regression based model to discover the key determinants of ICT fluency and to explore the evolution of the digital divide among EA students within the four years of undergraduate studies. To identify the principal determinants, data composing of 1237 participants is collected from three different universities in EA within a one year period. The experimental results indicate that the digital divide among students decreases quite fast from the first year to the fourth year. Regression computational findings show that the key determinants of ICT fluency are the student urban/rural origin, computer ownership, computer experience, class year, and major. The findings provide heuristic implications for developers, practitioners, and policy makers for an improved ICT environment implementation in EA and the developing nations in general.


2020 ◽  
pp. 61-73
Author(s):  
M.V. Shugurov

The present article is devoted to analyzing the role and significance of international information securityand its legal regulation in a process of transition to sustainable development. Based on examining the acts of«soft» and «hard» international law and also on results of activity of international organizations and workinggroup, the author concludes that conceptual provisions of the global strategy of sustainable development arereflected in international law of information security incompletely. The study substantiates a convergenceof these subject areas by arguments that ICT are key factors of achieving the Sustainable DevelopmentGoals. Accordingly, transfer of ICT and dissemination thereof in, especially, developing countries can leadto reducing the global digital divide but under one condition. The latter is an ensuring the proper level ofinformation security. Much attention is paid to mean of information security for transition to Industry-4.0corresponding the SDG No 9.


Author(s):  
G. Ikrissi ◽  
T. Mazri

Abstract. The smart campus is a sustainable and well-connected environment that aims to improve experience, efficiency and education. It uses a variety of interconnected components, smart applications and networked technologies to facilitate communication, make more efficient use of resources, improve performance, security and quality of campus services. However, as with many other smart environments, the smart campus is vulnerable to many security issues and threats that make it face many security-related challenges that limit its development. In our paper, we intend to provide an overview of smart campuses by highlighting the main applications and technologies used in this environment, presenting several vulnerabilities and susceptible attacks that affect data and information security in the smart campus. Moreover, we discuss the major challenges of smart campus and we conclude by overviewing some current security solutions to deal with campus security issues.


Sign in / Sign up

Export Citation Format

Share Document