Uploaded by D.U.M Superior

bilal2019

advertisement
Awareness and Settlement of IT Field Key Challenges for
Next Generation Development in World
Muhammad Bilal
Zhi Yu
Zhejiang Provincial Key Laboratory of Service Robot
College of Computer Science, Zhejiang University,
Hangzhou 310027, China
Zhejiang Provincial Key Laboratory of Service Robot
College of Computer Science, Zhejiang University,
Hangzhou 310027, China
mbilal@zju.edu.cn
yuzhirenzhe@zju.edu.cn
Abid Bashir
Muhammad Ali Hussain
Information Technology Services
Manager MIS / Deputy Director of IT
Department of Computer Science, National Textile
University, Faisalabad 38000, Pakistan
Management Science and Engineering
School of Management and Economics, University of
Electronic Science and Technology of China, Chengdu,
611731, China
mainabid1@gmail.com
aliuetians1@std.uestc.edu.cn
ABSTRACT
CCS Concepts
Information Technology (IT) is playing a vital role in all aspects
of our lives nowadays. IT is usually used for fast communication
links and transferring useful information from one place to another.
Nevertheless, around the world, unfortunately, IT is not properly
handled. Without IT and Information and Communication
Technology (ICT) world will become a dark place. M ost of the
research in the IT field is inadequate. A subjective IT field
development framework designed with the assistance of better
Internet features utilized properly in all developing countries
around the world. The proposed IT development framework can
be used innovatively by adopting a wireless-based network in
developing country growth around the world. We analyzed wired
and wireless systems based on six common key Internet feature
parameters for IT field improvement in developing countries
around the world. In this empirical research, a total of 72 IT
professional specialists included based on the statistical technique
judgment sampling. The questionnaire survey results signify that
speed, security, and reliability Internet features in the wired
network are better than the wireless network. Moreover, mobility,
coverage area, and cost relevant Internet features in the wireless
network are much better than a wired network. According to
expert decision-makers' strategy, the wireless-based network
transmission medium is better to develop improvement in the
world. Therefore, it finally concluded that developing countries
could also play a significant role in the IT field as well as other
fields around the world if Internet features are provided in the
form of a wireless-based network properly. In the future, security
and speed relevant problems will be resolved in the wireless-based
system through improving routing algorithms.
• Networks → Network services → Network management
Permission to make digital or hard copies of all or part of this work for
personal or classroom use is granted without fee provided that copies are
not made or distributed for profit or commercial advantage and that
copies bear this notice and the full citation on the first page. Copyrights
for components of this work owned by others than ACM must be
honored. Abstracting with credit is permitted. To copy otherwise, or
republish, to post on servers or to redistribute to lists, requires prior
specific permission and/or a fee. Request permissions from
Permissions@acm.org.
ICIT 2019, December 20–23, 2019, Shanghai, China
© 2019 Association for Computing Machinery.
ACM ISBN 978-1-4503-7663-1/19/12…$15.00
Information Technology is the technology that uses computerrelated resource information and transfers information from one
place to another place in a well-organized way. IT is a high-speed,
innovative technology throughout the world because it merges all
other existing fields in the world. IT-based on three specific
components.
Keywords
Information Technology; Internet; Transmission
Decision-makers; Developing countries
medium;
1. INTRODUCTION
Information Technology (IT) is the technology that use to gather,
arrange process, and distribution process data in an accurate
application. The processed data improve knowledge and allow us
to make the right decision and action begin. The most common
data types are numbers, text, image, audio, and video-based on
which IT processes and stores information [1].
Information technology is considered as a multiplicity term
because information technology has used in different studies in
different aspects. According to Thong & Yap defines information
technology is a solution of computer software and hardware that
supports the provision of operational, management, and
organizational strategy (1995). Boar describes that information
technology is a technology that involved operations, storage,
transport, access management, collection, and altogether
procedures of information transformation (1997). Information
technology considers as technological aspects of information
systems by Hollander et al. (1997). Information technology is the
application of Information and Communication Technologies
(ICT), which includes hardware, software, and computer networks
that required the Internet connection. IT covers a wide range of
information processing and computer applications at the
organization level by Tan et al. (2009) [2].



https://doi.org/10.1145/3377170.3377258
362
Computer
Communication Networks
Know-How [1, 3]
development in the world. Information system relevant public
projects continuously failed in employment in developing
countries because of the high level of government and private
vendors' conflict. Nowadays, developing countries' progress
depends on better decision making [10-14].
Decision making is one of the significant problems for the
decision-makers in the computer science and information
technology field. Decision making generally classified into two
principal groups, such as decision sciences (Human-based) and
decision systems (computer-based). A computer-based system is a
program-based decision system. Decision sciences, further divided
into three groups, consist of normative, descriptive, and decision
support. The decision support is very crucial in the decision than
the above two decision science systems. The decision support
further divided into three subsystems consists of operational
research, decision analysis, and decision support system. The
decision support system usually used in severe decision problems.
Decision making defined as a mental process that involves
multiple options, judgment, and alternative. Human-based
decision making also plays a vital role in any organization's
success [15].
Computer
Hardware
Program
Information
Information
Technology
Communication
Comprises Three
Interlocking Components
Hardware
Program
Information
Know-how
People
Applications
Procedures
Figure 1. Components of Information Technology [3]
Information Technology cannot be used effectively without these
three mentioned IT components involvement, as shown above in
Figure 1. Nevertheless, the Web communication gap is still a
hornets’ nest in the developing countries. The IT field is not used
in developing countries in better ways because of the lack of
awareness, and communication gaps are still there. These Web
communication gaps could be situated remove through the help of
transmission media types consists of wired or wireless networks.
Furthermore, ICT policy not implemented properly still has issues
in developing countries [3-5].
Information technology components are essential for managing
policy compliance. The data is necessary for determining policy
compliance, and policy compliance report is also produced based
on the data. The leading information technology infrastructures
are including instance data centers, an enterprise such as network
switches, storage devices, computer systems, computer
applications, and servers, etc. Today, organizations are spending a
lot of financial resources for handling IT infrastructure that
differentiates other IT infrastructure competitors. The IT policy
compliances are including security policy, massage delivery
policy, backup policy, message organization policy, login policy,
error policy, fault policy, and event policy, etc. These compliance
policies are managed information technology components by
identifying, determining, analyzing compliance policy methods [6].
Telecommunication industries are finding unique ways to transfer
reliable and secure information in the communication network
with maximizing their investment. The critical two popular
communication mediums are existing in the form of a wired and
wireless system. The term “wireless” basically is used for radio
receiver or transceiver. In a wireless network, routing is a
nontrivial nature due to an extremely dynamic environment. In
recent years, several routing protocols have been designed for the
betterment of a wireless network. In each different protocol has a
different security policy exists. Wireless network main parameters
such as mobility, usability, coverage, and reliability aspects are
much better than a wired network. However, speed and security
issues still exist [4, 16].
How can developing countries make progress efficiently in the
information technology field around the world for the next
generation growth? How can developing countries improve Web
communication gaps in the information technolo gy field around
the world for next-generation development?
The rest of this paper is organized in the following way: Section 2
describes the related work of the information technology field and
the Internet relevant to vital challenges in developing countries
around the world. Section 3 defines the methodology of
information technology field important issues highlight and also
provides ways to manage these issues in developing countries
around the world. Section 4 deliberated results and discussion
about the information technology field, and the Internet features
main issues around the world accurately. Section 5 describes the
limitations of the IT field and wireless network key challenges.
Section 6 concludes the central theme of our paper and also
provides guidelines to network administrators of developing
countries that will help them to perform better in the IT field in the
future.
Human emotions and performance are also handled by IT because
the system cannot run successfully without human involvement
and corporate satisfaction. The non-functional requirements are
provided to users, for instance, usability, and coverage area for
users is understanding correctly [7].
The infrastructure of information technology provides the basis on
which a firm can construct a precise information system. It is
essential with the aspect of business in which information systems
exist. IT investment in sales and profitability is much higher than
any other expenditures such as advertising, research, and
developments [8, 9].
The Information System (IS) generally classified into five major
categories:





Office Information System (OIS)
Transaction Processing System (TPS)
M anagement Information System (M IS)
Decision Support System (DSS)
Executive System (ES)
2. RELATED WORK
The main impacts of information technology on the world level
organizations are in financial crises. These financial crises have
amplified to a better understanding of geographical similarities
and differences in managerial and technical IT trends. Due to the
economic crises, IT relevant services were not spread out in the
world entirely. The quantitative analysis-based survey conducted
in four regions consisting of Europe, the United States, Latin
All mentioned above, information system categories interrelate
with each other for a better management system. Appropriate use
of one of the information system categories, like a decision
support system, can play a vital role in developing countries'
363
America, and Asia total of 472 organizations. Nevertheless, the
cost, speed, reliability, efficiency, and communication gap still
exist in IT business progress in these countries [17].
hotels, trains, libraries, etc. M oreover, wireless technology has
some limitations, such as suffer in speed, and radio waves suffer
in propagation losses and user security [24].
Information Technology became famous in 1970 due to different
applications, but the vast gaps created among the developed and
developing countries. The developing countries have faced
significant issues as compared to developed countries, for instance,
economic, market demand, human capabilities, stockholders, and
utility infrastructure. If ICT technologies cannot be utilized in
developing countries in an organized way, then these countries
have no values in the IT field. Because the IT field is very much
crucial in day to day human daily [18].
This paper has highlighted the critical issues to improve the
transferability of knowledge in ICT. ICT has played an essential
role in managing a knowledge-based economy. The general
expertise obtained from Information where information is
gathered by arranging data in a meaningful form. According to
microeconomic analysis, knowledge seems to behave like
information. The knowledge has two ways, such as
explicit/codified knowledge and Implicit/tacit knowledge. The
codified knowledge is transmitted in the form of symbols or
recorded, for instance, writing, drawing, and tangible way. The
tacit knowledge is a non-codified knowledge attained through the
informal response of learning behaviors and procedures. However,
ICT favors the transferability of knowledge in the form of codified
that can reduce the data. This paper focuses on the central issues
of the relationship between knowledge transfer, ICT, and trust.
The ICT main impact of knowledge transferred is examined and
review by evidence of knowledge management and transfer
knowledge in Research and Development (R&D) international
enterprise activities. The ICT restricted the transfer of knowledge
in tacit form due to the relationship of trust, and mutual
understanding develops among parties difficult. The new ICT
communication issues can be managed in the future by this critical
review of transfer knowledge in the codified form [19].
The computer networks are typically a shared resource used in
several applications and purposes. Sometimes data transmitted in
these applications have confidential, and users prefer that other
users are unable to read this data A firewall programmed router
has sat between the site and the rest of the network for confidential
data. The Virtual Private Network (VPN) has an example of
providing controlled connectivity over the public network on the
Internet. The IP-tunnel concepts have come from the VPNs
network. In this paper, a system set up where servers are accessed
over the Internet by users who have different privileges. Both
firewalls and VPN provide security -relevant information on the
servers though maintained users' access with suitable opportunities.
M oreover, security comparisons of wired and wireless networks
realized with the assistance of OPNET 1.0. The simulation results
showing that the wired networks were able to receive data with or
without security using much better than wireless networks [25].
The wired and wireless communication system is very much
crucial for the next generations' development regarding accessible
Internet services. These services are in the form of convenience,
ultra-high bandwidth, and cost-effective way for fixed and mobile
users. The Radio Over Fiber (ROF) is one of the leading
technologies that enhanced capacity, bandwidth, mobility, and
decreases the cost of both wired and wireless systems. The radioover-fiber novel has a scheme simultaneously attained
independent wired and wireless fewer signals through the single
intensity of the modulator. According to experimental results
illustrate the ROF optical-based wireless access network has a
suitable solution in the future. This unique scheme obtained
critical advantages in the form of system simplicity, reliability,
and flexibility [26].
The wired system consists of a Digital Subscriber Line (DSL),
cables, and fiber broadband technology. M oreover, the wireless
network based upon the latest technologies that include Very
Small Aperture Terminal (VSAT), Wireless Fidelity (Wi-Fi), and
Worldwide Interoperability for M icrowave Access (WiM AX)
broadband technology. In the developing countries, most of the
people live in poverty status and a shortage of physical
infrastructure that consists of roads, bridges, and dams.
Technology awareness and management are some of the main
limitations all-around developing countries [27].
The information system issues were examined in developing
countries through a survey from 2000 to onward. In this survey,
significant terms were addressed, such as technology role,
methodological, and theoretical aspects. Second, it mainly focused
on how to handle ICT study aspects and recognized gaps in
developing countries. It also suggested future opportunities in
these countries [20].
M any strategies have implemented for the proper use of
Information and Communication Technology (ICT) in
underdeveloped and developing countries. Nevertheless, these
countries are still lackin g in the ICT sector. If developing
countries economically stronger if using the latest technologies in
the ICT field [21, 22]. Internet technology is necessary for the
survival of all the latest technologies, such as communication
technology, sensing technology, wireless technology, and the
Internet of Things (IoT) technology around the world.
Nevertheless, most famous technology IoT still facing security
issues in all architecture layers [23].
Security has played a significant role in wireless networks. The
3G and 4G networks have separate security layers, but still,
malicious attacks are possible. The wireless network attacks have
been classified based on
availability, authentication,
confidentiality, access control, and availability. Currently, the
mobility of the world increased, so traditional wired network
methods got limited. This shortfall covered through wireless
networks. Hotspot technology has supported the flexibility of a
wireless network that can be installed anywhere, such as airports,
3. METHODOLOGY
Information Technology (IT) plays a vital role in every aspect of
life. However, around the world, the IT sector is not operating
correctly. Around the world, the usage of IT services in
developing countries is much costly as compared to settled
countries. According to our research, specific underdeveloped
countries in the world that includes Yemen, Afghanistan, Sudan,
Senegal, Tanzania, Nepal, Bangladesh, and Bhutan. In developed
countries, IT is almost free of cost. Nevertheless, in developing
countries, the concept of IT knowledge is not even known by
everyone. For the awareness of IT knowledge in developing
countries around the world, IT professionals can play a vital role.
IT considered the backbone of globalization across the globe. On
the other hand, in developing countries, this ratio is meager.
According to our viewpoint, if we practice the information
technology environment correctly around the whole world on a
technology equal basis without any discrimination, developing
countries can also play a fair role in the information technology
364
among the cities, towns, and villages around the world will
overcome through IT in a better way. Secondly, the Internet of
Things (IoT) technology is still advance technology for
developing countries around the world. M oreover, if the wireless
system has been establishing in the world, then most of the cell
phones can easily access this networking facility. The Subjective
design framework of IT field development in the world through
better Internet features used is shown in Figure 2, given below.
race. If cost-effective Internet features provided in wireless
networks, then knowledge is delivered quickly in the whole world,
especially cities, towns, and villages. The conventional and costly
wired system for Internet users must be situated replace.
Information technology has always required innovation. Only
some boosters are needed for wireless networks to be established
around the world in all areas, including cities, towns, and villages.
In this way, the geographical and Web communication gaps
IT FIELD (World Level Established)
Best Decision-Making Strategy
Implementation
Decision Making (Expert Decision Makers)
Internet Features Utilization
Transmission Medium Infrastructure
Untrusty systems
Trusty systems
New
Old
Wired System (Costly)
Wireless System (Almost Free)
Bundle of cables/Wires used
No cables/wires used
Low Flexibility
High Flexibility
Connectivity Limited
Connectivity Anytime Anyplace
Difficult to Install and Maintain
Easy to Install and Maintain
Limited Area Coverage
Larger Area Coverage
Less Communication Devices
More Communication Devices
Figure 2. The S ubjective framework of IT field development in the world with better Internet features utilize
The proposed subjective framework of IT field development in
developing countries around the world with proper use of
Internet features shown in above Figure 2. According to our
proposed design framework, expert decision making can play an
important role in IT field progress in developing countries
around the world. Unfortunately, developing countries are
lacking in specialist decision making because of high
administration seats corruption issues, personal interests, and
lack of awareness in IT filed around the world.
The suitable human-based expert decision making can be helpful
for the survival of IT infrastructure in developing countries
around the world. For instance, an expert decision is very crucial
in better transmission media type selection. There are two main
conventional transmission mediums used in Internet connection
365
consists of the wired and wireless system. Our proposed design
provides help to experts in decision making in such a way that
transmission medium type is most suitable for the survival of the
IT field in developing countries around the world. Our design
framework signifies that the wired network is challenging to
handle for the survival of IT sector awareness and settlement in
developing countries around the world. The wired system is very
costly because of the number of cables used, low flexibility
issues, limited connectivity issues, difficult to install and
manage, limited coverage area issues, and fewer communication
devices used. Nevertheless, in the wireless system, all features
are much better than wired systems. Thus, the implementation of
wireless network Internet services infrastructure around the
world leads to a better economic solution. It is also removing the
Web communication gaps by effective use of information
technology in the world. Because suitable Web communication
ways are connected to all developing countries with each other
to gain knowledge effectively across the globe. Our proposed
design framework strategy cycle is depending upon the
following sequence:
Information Technology Field Improvement  Web
Communication Gaps Relevant Issues  Information System
Categories Selection  Decision Support Suitable  Internet
Features Usage  Transmission M edium Selection  Wireless
Network Suitable  Next Generation Development
Figure 3. Comparatively analysis of wired and wireless system common Internet features
4. RESULTS AND DISCUSSION
Engineering Field
Business
Field
Defense Field
Agricultural
Field
We analyzed both wired and wireless systems based on Internet
infrastructure for next-generation improvement in the IT field
around the world. Some significant parameters, such as mobility,
speed, cost, security, coverage area, and reliability, are included
in both systems comparisons. In this comparative analysis, a
total of 72 persons of IT professional experts is included based
on the judgment sampling technique. This questionnaire is the
design itself for better development in developing countries that
removes Web communication gaps in the IT field. The
following twelve concerning questions were asked of these IT
professionals to check the better Internet aspects of both wired
and wireless systems. In this survey, both Strongly Agree and
Agree parameters will be considered as same. Similarly, in this
survey, both disagree and Strongly Disagree parameters will be
considered as same.
Science Field
Information
Technology
Spread
Knowledge
Around the
World Efficiently
via Wirelessbased Internet
Adoption
Entertainment
Field
Medical Field
Researcher
Field
According to the questionnaire survey (77.77%), respondents
approved that the mobility features in wireless networks exist.
The (38.88%) respondents supported that the speed features in
wireless network exist. The respondents (51.38%) felt that the
cost features in wireless networks exist. Approximately 27.77%
of the respondents preferred that the security features in a
wireless network exist. 62.5% of respondents felt that coverage
Social Field
Management Field
Figure 4. Information Technology (IT) utilization in the
developing countries specific field
366
61173185,61173186) and National Key Technology R&D
Program (Grant No. 2012BAI34B01).
area features in wireless networks exist. The respondents
(34.72%) felt that the reliability features in wireless networks
exist. M oreover, the primary deficiency finds out in wireless
networks is speed, security, and reliability , as shown in above
Figure 3. Figure 3 represents that the wireless network is better
as compared to a wired network based on the better way Internet
features provided to developing countries. The developing
countries must adopt a wireless-based system for the latest
technology awareness, and knowledge gains any time in the
world.
Figure 4 represents that developing countries can be utilized the
mention main fields efficiently in the presence of information
technology by adopting a wireless-based network. The
developing countries’ main Web communication problems can
be solved through IT utilization in all significant fields correctly
if Internet facilities provided decently in the form of wireless.
8. REFERENCES
[1] V. Rajaraman, Introduction to information Technology.
PHI Learning Pvt. Ltd., 2018.
[2] C. W. Onn and S. Sorooshian, "M ini literature analysis on
information technology definition," in Information and
Knowledge Management, 2013, vol. 3, no. 2, pp. 139-140.
[3] J. A. Senn, Information technology: principles, practices,
and opportunities. Prentice-Hall, Inc., 2003.
[4] J. IBRAHIM , T. A. IDANLADI, and M . ADERINOLA,
"COM PARATIVE ANALYSIS BETWEEN WIRED AND
WIRELESS TECHNOLOGIES IN COM M UNICATIONS:
A REVIEW," in 99th The IIER International Conference,
2017, pp. 45-48.
[5] G. Kunyenje and W. Chigona, "Towards the effect of
external agencies on national information and
communication technology policies development in
developing countries: Case of Africa," in 2016 IST-Africa
Week Conference, 2016: IEEE, pp. 1-6.
[6] R. Dasari, V. P. Kumar, and B. Suresh, "M anaging
compliance across information technology components," ed:
Google Patents, 2014.
5. LIMITATIONS
The main limitations in the IT field and wireless network are:  Lack of awareness has been found out in higher-level IT
administration groups around the world.
 Lack of interest and decision-making deficiency has been
found out in higher-level IT experts around the world.
 Poverty, Corruption, and trusty people deficiency issues
have been found out in developing countries' development
everywhere in the world.
 Security and speed issues have been faced still today in the
wireless network side around the world.
 The malicious attack can gain authorized user access
rights that destroy approved user sensitive data because of
weak wireless network security algorithms.
[7] M . S. Faridi, T. M ustafa, and F. Jan, "Human Persuasion
Integration in Software Development Lifecycle (SDLC),"
International Journal of Computer Science Issues (IJCSI),
vol. 9, no. 4, 2012.
[8] K. C. Laudon, "M anagement Information Systems Author:
Kenneth C. Laudon, Carol Guercio Traver, Publisher:
Prentice Hall Pa," 2011.
6. CONCLUSION AND FUTURE WORK
This empirical research work shows that developing countries'
growth in the IT field needs to be situated improve in terms of
the quality of Internet features. It concludes that developing
countries can remove Web communication gaps in the IT field
by adopting our proposed design framework. Therefore, it
determined that the wireless system is a much better solution
than a wired network in developing countries' progress in the
world. The questionnaires-based analysis result shows that
adopting the wireless network for proper use of IT facilities and
provided awareness of the latest technology in the world. The
wireless-based system would imp rove the young generation’s
development in the IT field by adopting our design strategy.
In the future wireless system will be improved even more if
security and speed-related features are managed. M oreover,
somehow the wireless network, both speed and security aspects,
would be handled through next-generation Wi-Fi IEEE
standards Wi-Fi 6 (802.11 ax).
[9] S. M ithas, A. R. Tafti, I. Bardhan, and J. M . J. M . Q. Goh,
"Information technology and firm profitability:
mechanisms and empirical evidence," vol. 36, no. 1, pp.
205-224, 2012.
[10] M . Awais, T. Samin, and M . Bilal, "Effective Business
Value of Bal Information System," IJCSI, vol. 8, no. 6, pp.
366-370, 2011.
[11] M . Awais, M . Irfan, M . Bilal, and T. Samin, "Helpful
Business Value of Advance Bal Information System,"
International Journal of Computer Science Issues (IJCSI),
vol. 9, no. 1, p. 415, 2012.
[12] M . Bilal and M . Awais, "Executive Enhance Business
Value of BAL Information System," International Journal
of Computer Science Issues (IJCSI), vol. 9, no. 5, p. 413,
2012.
[13] R. Vaidya, M . D. M yers, and L. Gardner, "M ajor issues in
the successful implementation of information systems in
developing countries," in International Working
Conference on Transfer and Diffusion of IT, 2013: Springer,
pp. 151-163.
[14] M . Aftab and S. M yeong, "Challenges for Developing
Countries to Adopt ICT in Government Services," in 2018
IEEE 9th Annual Information Technology, Electronics and
Mobile Communication Conference (IEMCON), 2018:
IEEE, pp. 1088-1093.
7. ACKNOWLEDGMENTS
We are thankful to the College of Computer Science, Zhejiang
University, for academic and research support and all the
teachers for their continuous guidance and support. Authors
gratefully acknowledge M r. Kamran Ashraf (Consultant IT
infrastructure) M idas Safety, Pakistan, for some useful
discussions in this paper.
This work is supported by Alibaba-Zhejiang University Joint
Institute of Frontier Technologies, Zhejiang Provincial Natural
Science Foundation of China (Grant No: LZ13F020001),
National Science Foundation of China (Grant No.
[15] M . Bohanec, "Decision making: A computer-science and
information-technology viewpoint," Interdisciplinary
367
Description of Complex Systems, vol. 7, no. 2, pp. 22-37,
2009.
[16] S. K. J. I. J. o. I. D. Garg and Technology, "Wireless
Network Security Threats," vol. 1, no. 2, pp. 110-113, 2011.
[17] J. Luftman and H. S. Zadeh, "Key information technology
and management issues 2010–11: an international study,"
Journal of Information Technology, vol. 26, no. 3, pp. 193204, 2011.
Conference on Information Technology: Research and
Education, 2003. Proceedings. ITRE2003., 2003: IEEE, pp.
523-524.
[23] G. S. M atharu, P. Upadhyay, and L. Chaudhary, "The
internet of things: Challenges & security issues," in 2014
International Conference on Emerging Technologies
(ICET), 2014: IEEE, pp. 54-59.
[24] A. Gupta and R. K. Jha, "Security threats of wireless
networks: A survey," in International Conference on
Computing, Communication & Automation, 2015: IEEE, pp.
389-395.
[18] M . W. Fong, "Digital divide: The case of developing
countries," Issues in Informing Science and Information
Technology, vol. 6, no. 2, pp. 471-478, 2009.
[19] J. Roberts, "From know-how to show-how? Questioning
the role of information and communication technologies in
knowledge transfer," Technology Analysis & Strategic
Management, vol. 12, no. 4, pp. 429-443, 2000.
[25] Y. Kosta, U. D. Dalal, and R. K. Jha, "Security Comparison
of Wired and Wireless Network with Firewall and Virtual
Private Network (VPN)," in 2010 International Conference
on Recent Trends in Information, Telecommunication and
Computing, 2010: IEEE, pp. 281-283.
[26] Z. Jia, J. Yu, A. Chowdhury, G. Ellinas, and G.-K. Chang,
"Simultaneous generation of independent wired and
wireless services using a single modulator in millimeterwave-band radio-over-fiber systems," IEEE Photonics
Technology Letters, vol. 19, no. 20, pp. 1691-1693, 2007.
[27] V. Gunasekaran and F. C. Harmantzis, "Emerging wireless
technologies for developing countries," Technology in
Society, vol. 29, no. 1, pp. 23-42, 2007.
[20] G. Walsham and S. Sahay, "Research on information
systems in developing countries: Current landscape and
future prospects," Information Technology for Development,
vol. 12, no. 1, pp. 7-24, 2006.
[21] M . W. Fong, "Technology leapfrogging for developing
countries," in Encyclopedia of Information Science and
Technology, Second Edition: IGI Global, 2009, pp. 37073713.
[22] A. Galvis, "Information and communication technologies
for education in developing countries," in International
368
Download