scholarly journals The State of Information and Communication Technology and Health Informatics in Ghana

Author(s):  
Emmanuel Kusi Achampong
2019 ◽  
Vol 2 (2) ◽  
pp. 117
Author(s):  
Asep Id Hadiana ◽  
Faiza Renaldi

The development of mobile and mobile technology has given the Government the opportunity to utilize Mobile Information and Communication Technology (M-ICT) to help facilitate daily administration and to provide better services to citizens, businesses and government institutions through the use of mobile technology. The number of cellular telephone users in Indonesia continues to grow and now it has reached 50.6 million customers. Therefore, the application of m-Government in Indonesia is an interesting material to be studied. There are many forms of services that can be provided by m-Government, one of which is service in government offices for stakeholders of the state civil apparatus. This research takes place in the Office of Communication and Information (Diskominfo), which is one part of the Regional Work Unit (SKPD) in West Bandung Regency, and focuses on the existence of monitoring activities of the State Civil Apparatus (ASN) in the SKPD. ASN always plays an important role in the daily activities of the government bureaucracy, therefore it is necessary to manage employee data in order to achieve quality assurance on employee performance. Diskominfo West Bandung Regency has a number of employees of approximately 150 employees spread in 3 fields. The use of M-Government technology is believed to be able to provide a necessity to resolve the challenges that must be overcome, one of which is the external office / city monitoring of the ASN Diskominfo. This research will build a m-Government application in Diskominfo, West Bandung Regency to monitor the activities of the state civil apparatus (ASN), which uses smart cellphones based on Android as its media.


2008 ◽  
Vol 17 (01) ◽  
pp. 145-149 ◽  
Author(s):  
M. Altwaijiri ◽  
B. Aldosari

Summary Objective The purpose of this paper is to describe the Health Informatics Master Program at King Saud bin Abdulaziz University for Health Sciences (KSAU-HS), Riyadh, Saudi Arabia. Methods We have reviewed health informatics master programs worldwide with more emphasis on the recommendations of the International Medical Informatics Association on education in health informatics, research, and faculty/trainee participation at KSAU-HS. Results An applied health informatics master program has been designed where graduates will be able to deploy information and communication technology in support of health systems’ processes. This is due to the fact that most of health organizations are driven by information and communication technology. The program embodies the features of effective applied health informatics master programs recommended by the International Medical Informatics Association on education in health informatics and delineated as curricula integrating three areas of knowledge and skills: 1) Methodology and technology for the processing of data, information and knowledge in medicine and healthcare, 2) Medicine, health and biosciences, and 3) Informatics/ computer science, mathematics and biometry. Conclusions The health informatics master program (MHI) immerses students in the multidisciplinary field of health informatics education. Graduates of the MHI program will be wellprepared informaticians for leadership positions, able to meet the increasing demands in the field of health informatics to manage, plan, develop, and provide expert consultations to the healthcare sectors.


2016 ◽  
Vol 4 (2) ◽  
pp. 29-43
Author(s):  
Boštjan Delak

Nowadays, many organizations face the issues of information and communication technology (ICT) management and also issues related to knowledge management (KM). The organization undertakes various activities to assess the state of their ICT and KM. KM is vital for organizational progress and growth. KM is often perceived as an instrument leading to innovation. This paper summarizes the research regarding IS maturity assessment and also KM maturity assessment within different organizations where the authors have delivered either complete IS due diligence or made partial analysis – IS Mirror. The main objective of this research is to present and confirm the approach which could be used for IS maturity assessment and could be provided quickly and remotely. The paper presents results from several case studies and confirms the proposed hypothesis.


2015 ◽  
Vol 7 (2) ◽  
pp. 1316-1324
Author(s):  
Rashmi M ◽  
Lekshmi V Nair

The Kudumbashree project from Kerala (a state in the southern part of India) has been a much discussed case for the community of practitioners, policy makers, researchers working on technology, empowerment and development. It is built around three pillars of economic, social and womens empowerment. Its formation was the culmination of a process of community mobilization taken up by the State Government. But this article is focusing on the inclusion of gender in policies relating to information and communication technology with the aim of empowering women as users and producers of this technology. The prominent part of this investigation is the case study of Kudumbashree ICT enterprises in the State of Kerala to understand the factors that resulted in the working of these enterprises. Data were collected from Northern part of Kerala. Focus group discussions and interviews were the method employed to gather information.


Author(s):  
T.P. Pavan Kumar

This paper discusses the role of Information and Communication Technology (ICT) for economic growth in Andhra Pradesh, a state in India. It looks at demographics of the State and discusses various initiatives by the State Government to transform into a knowledge economy. The paper looks at the various ways to use ICT for economic development and to bridge the digital divide.


2014 ◽  
Vol 14 (3) ◽  
Author(s):  
Edi Nugroho

Eradication of corruption in repressive/enforcement/penal would be more effective if accompanied by efforts in preventive/precautionary/non penal. One of the sources of corruption that resulted in losses to the state and the country’s economy is in terms of government procurement of goods and services. Efforts to prevent corruption in the procurement of government goods and services, as well as efforts to create good governance and free from corruption, collusion and nepotism in providing services to the public, is to utilize information and communication technology, in the form of e-government and e-procurement, as part of efforts to eradicate corruption in Indonesia.Key words: corruption, prevention, eradication, e-government, e-procurement.


2020 ◽  
Vol 54 (2) ◽  
pp. 280-305
Author(s):  
Mark Lacy ◽  
Nayanika Mookherjee

This article examines the historical, social and political legacies of the Information and Communication Technology Act (ICT Act) (2006–2018, amended in 2013) and the Digital Security Act (DSA) (2018–) in the Bangladeshi state’s attempt to control the ‘virtual streets’ of Bangladesh. The application of ICT and DSA has become an increasingly visible and controversial means to provide the spectacle of a state that extends disciplinary power and governmentality into proliferating online spaces—akin to ‘firing cannons to kill mosquitoes’. We use the lens of Tim Mitchell’s structural-effect (1991, The American Political Science Review 85(1), 77–96) to understand the state beyond the frameworks of its salience or elusiveness, arguing that the criminalisation of online speech has enabled the creation of ‘digital vigilantes’ who are predominantly the powerful, the sycophants, and the multitude of attention seekers who are driven by their personal contestations and ambitions. The legal outcomes, however, have been more ambiguous and uncertain—but the effect is to produce fear as an ‘environment’ (Virilio 2012, The Administration of Fear. Cambridge, MA, The MIT Press) through frozen/suspended charges with the potential to be redeployed in different contexts.


2012 ◽  
Vol 43 (4) ◽  
pp. 222-231 ◽  
Author(s):  
Nina Hansen ◽  
Tom Postmes ◽  
Nikita van der Vinne ◽  
Wendy van Thiel

This paper studies whether and how information and communication technology (ICT) changes self-construal and cultural values in a developing country. Ethiopian children were given laptops in the context of an ICT for development scheme. We compared children who used laptops (n = 69) with a control group without laptops (n = 76) and a second control group of children whose laptop had broken down (n = 24). Results confirmed that after 1 year of laptop usage, the children’s self-concept had become more independent and children endorsed individualist values more strongly. Interestingly, the impact of laptop usage on cultural values was mediated by self-construal (moderated mediation). Importantly, modernization did not “crowd out” traditional culture: ICT usage was not associated with a reduction in traditional expressions (interdependent self-construal, collectivist values). Theoretical and practical implications are discussed.


Sign in / Sign up

Export Citation Format

Share Document