Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Showing 1 - 7 of 7 matches in All Departments
Handbook on ICT in Developing Countries: Next Generation ICT Technologies is the second volume of the Handbook of ICT in Developing Countries. The first volume was on the potential implementation and service delivery of the forth-coming 5G networks. Here the focus is on the new technologies and services enabled by 5G networks or broadband Internet networks including artificial Intelligence (AI), machine learning, augmented reality, Internet of Things (IoT), autonomous driving, blockchain solutions, cloud solutions etc. Some of these are already globally experiencing growth in the existing networks and all of them are expected to grow substantially in the future. Examples: currently, 5% of global organizations have fully adopted AI, but the penetration is expected to increase rapidly before 2025. IoT with 20.35 billion devices connected in 2017 is estimated to show 75.44 billion devices connected in 2025. The expected growth is based on delivering of new value to businesses and citizens. It is, however, not obvious that this growth will also occur in developing countries. Currently, the digital divide between developing countries and developed countries is widening. This is mostly due to the lack of infrastructure and low level of awareness by the businesses and citizens of the value made possible by the new technologies for developing countries. The book discusses the potentials of the new technologies for developing countries and the need for market interventions that will facilitate the demand and supply side of the market. It is designed for a broad audience including practitioners, researchers, academics, policy makers and industry players and influencers. The language and approach to the handbook is a combination of the academic writing style and professional reviews.
5G, the emerging technology in mobile communication, is expected to deliver an important and decisive impact on several of the UN’s Sustainable Development Goals where universal accessibility to ICTs remains a serious concern. However, cyber security has emerged as a serious challenge, not least because of the increased accessibility and broader usage with associated vulnerability. Developing countries have additional challenges associated with both the expected faster build-up of accessibility and lack of qualified competencies within cyber security. Discussion of these challenges is the overall theme and motivation for this book. Technical topics discussed in the book include: 5G in rural networks Critical infrastructures Open RAN Protection of privacy Cybersecurity and machine learning Cybersecurity and disaster monitoring
The mobile communications market in developing countries is growing at a rapid rate. This is evident in the rapid spread of mobile broadband cellular networks such as 3G. 4G is also being deployed in developing countries around the world. As the global communications market proceeds towards 5G, it is evident that developing countries will not be left behind. However, there are challenges and barriers on the road ahead specific to developing countries. To aid policy makers, researchers and members of the academia make informed decision that will help the advancement of 5G, this handbook provides an insight into the impact of existing mobile cellular networks in some developing countries. Topics discussed in this handbook include: * Digital divide * Policy outlook * 5G and rural areas * 5G readiness * Telco Business models * Telecom tower pricing * Mobile application adoption
The huge potential in future connected services has as a precondition that privacy and security needs are dealt with in order for new services to be accepted. This issue is increasingly on the agenda both at company and at individual level. Cybersecurity and Privacy - bridging the gap addresses two very complex fields of the digital world, i.e., Cybersecurity and Privacy. These multifaceted, multidisciplinary and complex issues are usually understood and valued differently by different individuals, data holders and legal bodies. But a change in one field immediately affects the others. Policies, frameworks, strategies, laws, tools, techniques, and technologies - all of these are tightly interwoven when it comes to security and privacy. This book is another attempt to bridge the gap between the industry and academia. The book addresses the views from academia and industry on the subject. Technical topics discussed in the book include: * Cybersecurity * Encryption * Privacy policy * Trust * Security and Internet of Things * Botnets * Data risks * Cloudbased Services * Visualization
Africa and especially Sub-Saharan Africa has during the past decade witnessed one of the fastest growing markets in mobile communication. This growth is recognized to have played a pivotal role in Africa's socio-economic development. It has had a huge impact on residential living patterns; on business networks and models; and on government services and income sources. The mobile industry has contributed more to economic growth than in any other comparable region globally introducing innovative, broadly used applications. Technical topics discussed in the book include: * Mobile Development in Sub-Saharan Africa; * Telecom Liberalization in Africa; * Role of Mobile in Socio-economic Development; * Mobile Applications in specific sectors; * Security in African Mobile; * Role of Prepaid in Africa
In most IT system development processes, the identification or elicitation of user requirements is recognized as a key building block. In practice, the identification of user needs and wants is a challenge and inadequate or faulty identifications in this step of an IT system development can cause huge problems with the final product. The elicitation of user requirements as such changes according to age groups;, to gender,; to cultural settings,; and into time; and experience in the use of the system/software. User requirements, therefore, cannot be used between projects, IT systems, and different software. That makes the elicitation of user requirements an inherent part of any software development project and a resourceful activity as well. This book provides insights to the process of identifying user requirements and to different types by describing varying case studies in which technologies or software has been developed. A variety of user requirements are provided illustrating the effect of changing the targeted user group with respect to age,; to the context and the different technologies or software as well as to the difference in viewpoint on ways of involving users in the elicitation process. Cases and user requirement elements discussed in the book include: * User requirements elicitation processes for children, construction workers, and farmers * User requirements for personalized services of a broadcast company * Variations in user involvement * Practical elements of user involvement and requirements elicitation * Usable security requirements for design of privacy
|
You may like...
Organophosphorus Chemistry - Volume 50
Lee J Higham, David W. Allen, …
Hardcover
R11,765
Discovery Miles 117 650
Integrating Information Literacy into…
Charity Lovitt, Kristen Shuyler, …
Hardcover
R4,913
Discovery Miles 49 130
|