Awareness and Settlement of IT Field Key Challenges for Next Generation Development in World Muhammad Bilal Zhi Yu Zhejiang Provincial Key Laboratory of Service Robot College of Computer Science, Zhejiang University, Hangzhou 310027, China Zhejiang Provincial Key Laboratory of Service Robot College of Computer Science, Zhejiang University, Hangzhou 310027, China mbilal@zju.edu.cn yuzhirenzhe@zju.edu.cn Abid Bashir Muhammad Ali Hussain Information Technology Services Manager MIS / Deputy Director of IT Department of Computer Science, National Textile University, Faisalabad 38000, Pakistan Management Science and Engineering School of Management and Economics, University of Electronic Science and Technology of China, Chengdu, 611731, China mainabid1@gmail.com aliuetians1@std.uestc.edu.cn ABSTRACT CCS Concepts Information Technology (IT) is playing a vital role in all aspects of our lives nowadays. IT is usually used for fast communication links and transferring useful information from one place to another. Nevertheless, around the world, unfortunately, IT is not properly handled. Without IT and Information and Communication Technology (ICT) world will become a dark place. M ost of the research in the IT field is inadequate. A subjective IT field development framework designed with the assistance of better Internet features utilized properly in all developing countries around the world. The proposed IT development framework can be used innovatively by adopting a wireless-based network in developing country growth around the world. We analyzed wired and wireless systems based on six common key Internet feature parameters for IT field improvement in developing countries around the world. In this empirical research, a total of 72 IT professional specialists included based on the statistical technique judgment sampling. The questionnaire survey results signify that speed, security, and reliability Internet features in the wired network are better than the wireless network. Moreover, mobility, coverage area, and cost relevant Internet features in the wireless network are much better than a wired network. According to expert decision-makers' strategy, the wireless-based network transmission medium is better to develop improvement in the world. Therefore, it finally concluded that developing countries could also play a significant role in the IT field as well as other fields around the world if Internet features are provided in the form of a wireless-based network properly. In the future, security and speed relevant problems will be resolved in the wireless-based system through improving routing algorithms. • Networks → Network services → Network management Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from Permissions@acm.org. ICIT 2019, December 20–23, 2019, Shanghai, China © 2019 Association for Computing Machinery. ACM ISBN 978-1-4503-7663-1/19/12…$15.00 Information Technology is the technology that uses computerrelated resource information and transfers information from one place to another place in a well-organized way. IT is a high-speed, innovative technology throughout the world because it merges all other existing fields in the world. IT-based on three specific components. Keywords Information Technology; Internet; Transmission Decision-makers; Developing countries medium; 1. INTRODUCTION Information Technology (IT) is the technology that use to gather, arrange process, and distribution process data in an accurate application. The processed data improve knowledge and allow us to make the right decision and action begin. The most common data types are numbers, text, image, audio, and video-based on which IT processes and stores information [1]. Information technology is considered as a multiplicity term because information technology has used in different studies in different aspects. According to Thong & Yap defines information technology is a solution of computer software and hardware that supports the provision of operational, management, and organizational strategy (1995). Boar describes that information technology is a technology that involved operations, storage, transport, access management, collection, and altogether procedures of information transformation (1997). Information technology considers as technological aspects of information systems by Hollander et al. (1997). Information technology is the application of Information and Communication Technologies (ICT), which includes hardware, software, and computer networks that required the Internet connection. IT covers a wide range of information processing and computer applications at the organization level by Tan et al. (2009) [2]. https://doi.org/10.1145/3377170.3377258 362 Computer Communication Networks Know-How [1, 3] development in the world. Information system relevant public projects continuously failed in employment in developing countries because of the high level of government and private vendors' conflict. Nowadays, developing countries' progress depends on better decision making [10-14]. Decision making is one of the significant problems for the decision-makers in the computer science and information technology field. Decision making generally classified into two principal groups, such as decision sciences (Human-based) and decision systems (computer-based). A computer-based system is a program-based decision system. Decision sciences, further divided into three groups, consist of normative, descriptive, and decision support. The decision support is very crucial in the decision than the above two decision science systems. The decision support further divided into three subsystems consists of operational research, decision analysis, and decision support system. The decision support system usually used in severe decision problems. Decision making defined as a mental process that involves multiple options, judgment, and alternative. Human-based decision making also plays a vital role in any organization's success [15]. Computer Hardware Program Information Information Technology Communication Comprises Three Interlocking Components Hardware Program Information Know-how People Applications Procedures Figure 1. Components of Information Technology [3] Information Technology cannot be used effectively without these three mentioned IT components involvement, as shown above in Figure 1. Nevertheless, the Web communication gap is still a hornets’ nest in the developing countries. The IT field is not used in developing countries in better ways because of the lack of awareness, and communication gaps are still there. These Web communication gaps could be situated remove through the help of transmission media types consists of wired or wireless networks. Furthermore, ICT policy not implemented properly still has issues in developing countries [3-5]. Information technology components are essential for managing policy compliance. The data is necessary for determining policy compliance, and policy compliance report is also produced based on the data. The leading information technology infrastructures are including instance data centers, an enterprise such as network switches, storage devices, computer systems, computer applications, and servers, etc. Today, organizations are spending a lot of financial resources for handling IT infrastructure that differentiates other IT infrastructure competitors. The IT policy compliances are including security policy, massage delivery policy, backup policy, message organization policy, login policy, error policy, fault policy, and event policy, etc. These compliance policies are managed information technology components by identifying, determining, analyzing compliance policy methods [6]. Telecommunication industries are finding unique ways to transfer reliable and secure information in the communication network with maximizing their investment. The critical two popular communication mediums are existing in the form of a wired and wireless system. The term “wireless” basically is used for radio receiver or transceiver. In a wireless network, routing is a nontrivial nature due to an extremely dynamic environment. In recent years, several routing protocols have been designed for the betterment of a wireless network. In each different protocol has a different security policy exists. Wireless network main parameters such as mobility, usability, coverage, and reliability aspects are much better than a wired network. However, speed and security issues still exist [4, 16]. How can developing countries make progress efficiently in the information technology field around the world for the next generation growth? How can developing countries improve Web communication gaps in the information technolo gy field around the world for next-generation development? The rest of this paper is organized in the following way: Section 2 describes the related work of the information technology field and the Internet relevant to vital challenges in developing countries around the world. Section 3 defines the methodology of information technology field important issues highlight and also provides ways to manage these issues in developing countries around the world. Section 4 deliberated results and discussion about the information technology field, and the Internet features main issues around the world accurately. Section 5 describes the limitations of the IT field and wireless network key challenges. Section 6 concludes the central theme of our paper and also provides guidelines to network administrators of developing countries that will help them to perform better in the IT field in the future. Human emotions and performance are also handled by IT because the system cannot run successfully without human involvement and corporate satisfaction. The non-functional requirements are provided to users, for instance, usability, and coverage area for users is understanding correctly [7]. The infrastructure of information technology provides the basis on which a firm can construct a precise information system. It is essential with the aspect of business in which information systems exist. IT investment in sales and profitability is much higher than any other expenditures such as advertising, research, and developments [8, 9]. The Information System (IS) generally classified into five major categories: Office Information System (OIS) Transaction Processing System (TPS) M anagement Information System (M IS) Decision Support System (DSS) Executive System (ES) 2. RELATED WORK The main impacts of information technology on the world level organizations are in financial crises. These financial crises have amplified to a better understanding of geographical similarities and differences in managerial and technical IT trends. Due to the economic crises, IT relevant services were not spread out in the world entirely. The quantitative analysis-based survey conducted in four regions consisting of Europe, the United States, Latin All mentioned above, information system categories interrelate with each other for a better management system. Appropriate use of one of the information system categories, like a decision support system, can play a vital role in developing countries' 363 America, and Asia total of 472 organizations. Nevertheless, the cost, speed, reliability, efficiency, and communication gap still exist in IT business progress in these countries [17]. hotels, trains, libraries, etc. M oreover, wireless technology has some limitations, such as suffer in speed, and radio waves suffer in propagation losses and user security [24]. Information Technology became famous in 1970 due to different applications, but the vast gaps created among the developed and developing countries. The developing countries have faced significant issues as compared to developed countries, for instance, economic, market demand, human capabilities, stockholders, and utility infrastructure. If ICT technologies cannot be utilized in developing countries in an organized way, then these countries have no values in the IT field. Because the IT field is very much crucial in day to day human daily [18]. This paper has highlighted the critical issues to improve the transferability of knowledge in ICT. ICT has played an essential role in managing a knowledge-based economy. The general expertise obtained from Information where information is gathered by arranging data in a meaningful form. According to microeconomic analysis, knowledge seems to behave like information. The knowledge has two ways, such as explicit/codified knowledge and Implicit/tacit knowledge. The codified knowledge is transmitted in the form of symbols or recorded, for instance, writing, drawing, and tangible way. The tacit knowledge is a non-codified knowledge attained through the informal response of learning behaviors and procedures. However, ICT favors the transferability of knowledge in the form of codified that can reduce the data. This paper focuses on the central issues of the relationship between knowledge transfer, ICT, and trust. The ICT main impact of knowledge transferred is examined and review by evidence of knowledge management and transfer knowledge in Research and Development (R&D) international enterprise activities. The ICT restricted the transfer of knowledge in tacit form due to the relationship of trust, and mutual understanding develops among parties difficult. The new ICT communication issues can be managed in the future by this critical review of transfer knowledge in the codified form [19]. The computer networks are typically a shared resource used in several applications and purposes. Sometimes data transmitted in these applications have confidential, and users prefer that other users are unable to read this data A firewall programmed router has sat between the site and the rest of the network for confidential data. The Virtual Private Network (VPN) has an example of providing controlled connectivity over the public network on the Internet. The IP-tunnel concepts have come from the VPNs network. In this paper, a system set up where servers are accessed over the Internet by users who have different privileges. Both firewalls and VPN provide security -relevant information on the servers though maintained users' access with suitable opportunities. M oreover, security comparisons of wired and wireless networks realized with the assistance of OPNET 1.0. The simulation results showing that the wired networks were able to receive data with or without security using much better than wireless networks [25]. The wired and wireless communication system is very much crucial for the next generations' development regarding accessible Internet services. These services are in the form of convenience, ultra-high bandwidth, and cost-effective way for fixed and mobile users. The Radio Over Fiber (ROF) is one of the leading technologies that enhanced capacity, bandwidth, mobility, and decreases the cost of both wired and wireless systems. The radioover-fiber novel has a scheme simultaneously attained independent wired and wireless fewer signals through the single intensity of the modulator. According to experimental results illustrate the ROF optical-based wireless access network has a suitable solution in the future. This unique scheme obtained critical advantages in the form of system simplicity, reliability, and flexibility [26]. The wired system consists of a Digital Subscriber Line (DSL), cables, and fiber broadband technology. M oreover, the wireless network based upon the latest technologies that include Very Small Aperture Terminal (VSAT), Wireless Fidelity (Wi-Fi), and Worldwide Interoperability for M icrowave Access (WiM AX) broadband technology. In the developing countries, most of the people live in poverty status and a shortage of physical infrastructure that consists of roads, bridges, and dams. Technology awareness and management are some of the main limitations all-around developing countries [27]. The information system issues were examined in developing countries through a survey from 2000 to onward. In this survey, significant terms were addressed, such as technology role, methodological, and theoretical aspects. Second, it mainly focused on how to handle ICT study aspects and recognized gaps in developing countries. It also suggested future opportunities in these countries [20]. M any strategies have implemented for the proper use of Information and Communication Technology (ICT) in underdeveloped and developing countries. Nevertheless, these countries are still lackin g in the ICT sector. If developing countries economically stronger if using the latest technologies in the ICT field [21, 22]. Internet technology is necessary for the survival of all the latest technologies, such as communication technology, sensing technology, wireless technology, and the Internet of Things (IoT) technology around the world. Nevertheless, most famous technology IoT still facing security issues in all architecture layers [23]. Security has played a significant role in wireless networks. The 3G and 4G networks have separate security layers, but still, malicious attacks are possible. The wireless network attacks have been classified based on availability, authentication, confidentiality, access control, and availability. Currently, the mobility of the world increased, so traditional wired network methods got limited. This shortfall covered through wireless networks. Hotspot technology has supported the flexibility of a wireless network that can be installed anywhere, such as airports, 3. METHODOLOGY Information Technology (IT) plays a vital role in every aspect of life. However, around the world, the IT sector is not operating correctly. Around the world, the usage of IT services in developing countries is much costly as compared to settled countries. According to our research, specific underdeveloped countries in the world that includes Yemen, Afghanistan, Sudan, Senegal, Tanzania, Nepal, Bangladesh, and Bhutan. In developed countries, IT is almost free of cost. Nevertheless, in developing countries, the concept of IT knowledge is not even known by everyone. For the awareness of IT knowledge in developing countries around the world, IT professionals can play a vital role. IT considered the backbone of globalization across the globe. On the other hand, in developing countries, this ratio is meager. According to our viewpoint, if we practice the information technology environment correctly around the whole world on a technology equal basis without any discrimination, developing countries can also play a fair role in the information technology 364 among the cities, towns, and villages around the world will overcome through IT in a better way. Secondly, the Internet of Things (IoT) technology is still advance technology for developing countries around the world. M oreover, if the wireless system has been establishing in the world, then most of the cell phones can easily access this networking facility. The Subjective design framework of IT field development in the world through better Internet features used is shown in Figure 2, given below. race. If cost-effective Internet features provided in wireless networks, then knowledge is delivered quickly in the whole world, especially cities, towns, and villages. The conventional and costly wired system for Internet users must be situated replace. Information technology has always required innovation. Only some boosters are needed for wireless networks to be established around the world in all areas, including cities, towns, and villages. In this way, the geographical and Web communication gaps IT FIELD (World Level Established) Best Decision-Making Strategy Implementation Decision Making (Expert Decision Makers) Internet Features Utilization Transmission Medium Infrastructure Untrusty systems Trusty systems New Old Wired System (Costly) Wireless System (Almost Free) Bundle of cables/Wires used No cables/wires used Low Flexibility High Flexibility Connectivity Limited Connectivity Anytime Anyplace Difficult to Install and Maintain Easy to Install and Maintain Limited Area Coverage Larger Area Coverage Less Communication Devices More Communication Devices Figure 2. The S ubjective framework of IT field development in the world with better Internet features utilize The proposed subjective framework of IT field development in developing countries around the world with proper use of Internet features shown in above Figure 2. According to our proposed design framework, expert decision making can play an important role in IT field progress in developing countries around the world. Unfortunately, developing countries are lacking in specialist decision making because of high administration seats corruption issues, personal interests, and lack of awareness in IT filed around the world. The suitable human-based expert decision making can be helpful for the survival of IT infrastructure in developing countries around the world. For instance, an expert decision is very crucial in better transmission media type selection. There are two main conventional transmission mediums used in Internet connection 365 consists of the wired and wireless system. Our proposed design provides help to experts in decision making in such a way that transmission medium type is most suitable for the survival of the IT field in developing countries around the world. Our design framework signifies that the wired network is challenging to handle for the survival of IT sector awareness and settlement in developing countries around the world. The wired system is very costly because of the number of cables used, low flexibility issues, limited connectivity issues, difficult to install and manage, limited coverage area issues, and fewer communication devices used. Nevertheless, in the wireless system, all features are much better than wired systems. Thus, the implementation of wireless network Internet services infrastructure around the world leads to a better economic solution. It is also removing the Web communication gaps by effective use of information technology in the world. Because suitable Web communication ways are connected to all developing countries with each other to gain knowledge effectively across the globe. Our proposed design framework strategy cycle is depending upon the following sequence: Information Technology Field Improvement Web Communication Gaps Relevant Issues Information System Categories Selection Decision Support Suitable Internet Features Usage Transmission M edium Selection Wireless Network Suitable Next Generation Development Figure 3. Comparatively analysis of wired and wireless system common Internet features 4. RESULTS AND DISCUSSION Engineering Field Business Field Defense Field Agricultural Field We analyzed both wired and wireless systems based on Internet infrastructure for next-generation improvement in the IT field around the world. Some significant parameters, such as mobility, speed, cost, security, coverage area, and reliability, are included in both systems comparisons. In this comparative analysis, a total of 72 persons of IT professional experts is included based on the judgment sampling technique. This questionnaire is the design itself for better development in developing countries that removes Web communication gaps in the IT field. The following twelve concerning questions were asked of these IT professionals to check the better Internet aspects of both wired and wireless systems. In this survey, both Strongly Agree and Agree parameters will be considered as same. Similarly, in this survey, both disagree and Strongly Disagree parameters will be considered as same. Science Field Information Technology Spread Knowledge Around the World Efficiently via Wirelessbased Internet Adoption Entertainment Field Medical Field Researcher Field According to the questionnaire survey (77.77%), respondents approved that the mobility features in wireless networks exist. The (38.88%) respondents supported that the speed features in wireless network exist. The respondents (51.38%) felt that the cost features in wireless networks exist. Approximately 27.77% of the respondents preferred that the security features in a wireless network exist. 62.5% of respondents felt that coverage Social Field Management Field Figure 4. Information Technology (IT) utilization in the developing countries specific field 366 61173185,61173186) and National Key Technology R&D Program (Grant No. 2012BAI34B01). area features in wireless networks exist. The respondents (34.72%) felt that the reliability features in wireless networks exist. M oreover, the primary deficiency finds out in wireless networks is speed, security, and reliability , as shown in above Figure 3. Figure 3 represents that the wireless network is better as compared to a wired network based on the better way Internet features provided to developing countries. The developing countries must adopt a wireless-based system for the latest technology awareness, and knowledge gains any time in the world. Figure 4 represents that developing countries can be utilized the mention main fields efficiently in the presence of information technology by adopting a wireless-based network. The developing countries’ main Web communication problems can be solved through IT utilization in all significant fields correctly if Internet facilities provided decently in the form of wireless. 8. REFERENCES [1] V. Rajaraman, Introduction to information Technology. PHI Learning Pvt. Ltd., 2018. [2] C. W. Onn and S. Sorooshian, "M ini literature analysis on information technology definition," in Information and Knowledge Management, 2013, vol. 3, no. 2, pp. 139-140. [3] J. A. Senn, Information technology: principles, practices, and opportunities. Prentice-Hall, Inc., 2003. [4] J. IBRAHIM , T. A. IDANLADI, and M . ADERINOLA, "COM PARATIVE ANALYSIS BETWEEN WIRED AND WIRELESS TECHNOLOGIES IN COM M UNICATIONS: A REVIEW," in 99th The IIER International Conference, 2017, pp. 45-48. [5] G. Kunyenje and W. Chigona, "Towards the effect of external agencies on national information and communication technology policies development in developing countries: Case of Africa," in 2016 IST-Africa Week Conference, 2016: IEEE, pp. 1-6. [6] R. Dasari, V. P. Kumar, and B. Suresh, "M anaging compliance across information technology components," ed: Google Patents, 2014. 5. LIMITATIONS The main limitations in the IT field and wireless network are: Lack of awareness has been found out in higher-level IT administration groups around the world. Lack of interest and decision-making deficiency has been found out in higher-level IT experts around the world. Poverty, Corruption, and trusty people deficiency issues have been found out in developing countries' development everywhere in the world. Security and speed issues have been faced still today in the wireless network side around the world. The malicious attack can gain authorized user access rights that destroy approved user sensitive data because of weak wireless network security algorithms. [7] M . S. Faridi, T. M ustafa, and F. Jan, "Human Persuasion Integration in Software Development Lifecycle (SDLC)," International Journal of Computer Science Issues (IJCSI), vol. 9, no. 4, 2012. [8] K. C. Laudon, "M anagement Information Systems Author: Kenneth C. Laudon, Carol Guercio Traver, Publisher: Prentice Hall Pa," 2011. 6. CONCLUSION AND FUTURE WORK This empirical research work shows that developing countries' growth in the IT field needs to be situated improve in terms of the quality of Internet features. It concludes that developing countries can remove Web communication gaps in the IT field by adopting our proposed design framework. Therefore, it determined that the wireless system is a much better solution than a wired network in developing countries' progress in the world. The questionnaires-based analysis result shows that adopting the wireless network for proper use of IT facilities and provided awareness of the latest technology in the world. The wireless-based system would imp rove the young generation’s development in the IT field by adopting our design strategy. In the future wireless system will be improved even more if security and speed-related features are managed. M oreover, somehow the wireless network, both speed and security aspects, would be handled through next-generation Wi-Fi IEEE standards Wi-Fi 6 (802.11 ax). [9] S. M ithas, A. R. Tafti, I. Bardhan, and J. M . J. M . Q. Goh, "Information technology and firm profitability: mechanisms and empirical evidence," vol. 36, no. 1, pp. 205-224, 2012. [10] M . Awais, T. Samin, and M . Bilal, "Effective Business Value of Bal Information System," IJCSI, vol. 8, no. 6, pp. 366-370, 2011. [11] M . Awais, M . Irfan, M . Bilal, and T. Samin, "Helpful Business Value of Advance Bal Information System," International Journal of Computer Science Issues (IJCSI), vol. 9, no. 1, p. 415, 2012. [12] M . Bilal and M . Awais, "Executive Enhance Business Value of BAL Information System," International Journal of Computer Science Issues (IJCSI), vol. 9, no. 5, p. 413, 2012. [13] R. Vaidya, M . D. M yers, and L. Gardner, "M ajor issues in the successful implementation of information systems in developing countries," in International Working Conference on Transfer and Diffusion of IT, 2013: Springer, pp. 151-163. [14] M . Aftab and S. M yeong, "Challenges for Developing Countries to Adopt ICT in Government Services," in 2018 IEEE 9th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON), 2018: IEEE, pp. 1088-1093. 7. ACKNOWLEDGMENTS We are thankful to the College of Computer Science, Zhejiang University, for academic and research support and all the teachers for their continuous guidance and support. Authors gratefully acknowledge M r. Kamran Ashraf (Consultant IT infrastructure) M idas Safety, Pakistan, for some useful discussions in this paper. This work is supported by Alibaba-Zhejiang University Joint Institute of Frontier Technologies, Zhejiang Provincial Natural Science Foundation of China (Grant No: LZ13F020001), National Science Foundation of China (Grant No. [15] M . Bohanec, "Decision making: A computer-science and information-technology viewpoint," Interdisciplinary 367 Description of Complex Systems, vol. 7, no. 2, pp. 22-37, 2009. [16] S. K. J. I. J. o. I. D. Garg and Technology, "Wireless Network Security Threats," vol. 1, no. 2, pp. 110-113, 2011. [17] J. Luftman and H. S. Zadeh, "Key information technology and management issues 2010–11: an international study," Journal of Information Technology, vol. 26, no. 3, pp. 193204, 2011. Conference on Information Technology: Research and Education, 2003. Proceedings. ITRE2003., 2003: IEEE, pp. 523-524. [23] G. S. M atharu, P. Upadhyay, and L. Chaudhary, "The internet of things: Challenges & security issues," in 2014 International Conference on Emerging Technologies (ICET), 2014: IEEE, pp. 54-59. [24] A. Gupta and R. K. Jha, "Security threats of wireless networks: A survey," in International Conference on Computing, Communication & Automation, 2015: IEEE, pp. 389-395. [18] M . W. Fong, "Digital divide: The case of developing countries," Issues in Informing Science and Information Technology, vol. 6, no. 2, pp. 471-478, 2009. [19] J. Roberts, "From know-how to show-how? Questioning the role of information and communication technologies in knowledge transfer," Technology Analysis & Strategic Management, vol. 12, no. 4, pp. 429-443, 2000. [25] Y. Kosta, U. D. Dalal, and R. K. Jha, "Security Comparison of Wired and Wireless Network with Firewall and Virtual Private Network (VPN)," in 2010 International Conference on Recent Trends in Information, Telecommunication and Computing, 2010: IEEE, pp. 281-283. [26] Z. Jia, J. Yu, A. Chowdhury, G. Ellinas, and G.-K. Chang, "Simultaneous generation of independent wired and wireless services using a single modulator in millimeterwave-band radio-over-fiber systems," IEEE Photonics Technology Letters, vol. 19, no. 20, pp. 1691-1693, 2007. [27] V. Gunasekaran and F. C. Harmantzis, "Emerging wireless technologies for developing countries," Technology in Society, vol. 29, no. 1, pp. 23-42, 2007. [20] G. Walsham and S. Sahay, "Research on information systems in developing countries: Current landscape and future prospects," Information Technology for Development, vol. 12, no. 1, pp. 7-24, 2006. [21] M . W. Fong, "Technology leapfrogging for developing countries," in Encyclopedia of Information Science and Technology, Second Edition: IGI Global, 2009, pp. 37073713. [22] A. Galvis, "Information and communication technologies for education in developing countries," in International 368