Volume 75 of EJISDC contains 8 regular articles
In the first paper, Ricardo Gomez explores the information practices (information seeking, using, and sharing) among Latino migrants, particularly undocumented migrants, in three different settings: at the US-Mexico border, in Seattle, Washington, and in Cali, Colombia. Through participatory photography and unstructured interviews, he explores the life experiences and information practices of marginalized and underserved communities and relates them to their experience of transience through different stages of the migration experience.
In the second paper, Christon Moyo, Jens Kaasboll, Petter Nielsen and Johan Saebo study the implementation process and its effects related to a computerized league table application for health services in Malawi. Focusing on the health district and using a field experiment research approach, the focus is on the implementation process and how it improves information transparency for health managers.
In the third paper, Devinder Thapa and Oystein Saebo present a case analysis of a project in Nepal called the Nepal Wireless Networking Project (NWNP). Investigating the specific initiatives that they enabled (telemedicine, education and jobs), the authors propose that the key participants in the NWNP were activist actors and the affected, and that activists drew upon existing social capital to enrol the affected through a process explained by Actor Network Theory. In the process, they built other forms of social capital, which in turn extended the benefits of participatory development to several mountain villages.
In the fourth paper, Thanh Ngoc Nguyen and Jorn Braa undertook a longitudinal action research study in the health care sector in Vietnam in the period between 2012 and 2015 in order to design or cultivate, reconfigure, (re)assembleand transform multiple socio-technical components into a larger health information infrastructure. To understand how gateways performed in our cases, we employed a concept namely “scaffolded gateways”, which was basically a hybrid between scaffoldings and gateways.
In the fifth paper, Cheah Wai Shiang, Alfian Abdul Halin, Marlenbe Lu and Gary CheeWhye present a post-mortem report upon completion of the Long Lamai e-commerce development project. Some weaknesses with regards to the current software modelling approach are identified and an alternative role-based approach is proposed. We argue that the existing software modelling technique is not suitable for modelling, making it difficult to establish a good contract between stakeholders causing delays in the project delivery. The role-based approach is able to explicitly highlight the responsibilities among stakeholders, while also forming the contract agreement among them leading towards sustainable ICT4D.
In the sixth paper, Peter Kyem investigates reasons behind the neglect of mobile phone aided e-government programs in sub-Saharan Africa.
In the seventh paper, Yeslam al-Saggaf investigates the views of Saudi women about privacy and threats of blackmail in social media. Qualitative interviews were conducted with 16 women who used Facebook regularly and a focus group discussion with another group of 10 Saudi female students were conducted. The findings of the study show that the Saudi women interviewed appeared concerned about their privacy in Facebook, worried about falling victim to blackmail, knew how to change the privacy settings and are not comfortable with communicating across gender lines.
In the eighth paper, Tsebetso Mapeshoane and Shaun Pather provides a detailed explanation of the factors influencing e-commerce uptake in the Lesotho tourism sector. Evidence for the study was collected using interviews with businesses. Data collected via interviews was used to examine the actual adoption issues amongst tourism businesses in Lesotho. In addition, where applicable, each organisation’s online activities or websites was assessed.
Table of Contents
In this Volume, the downloads# is the total number of downloads since publication.
|Vulnerability and Information Practices Among (Undocumented) Latino Migrants|
|Ricardo Gomez||# of downloads: 5|
|The Information Transparency Effects of Introducing League Tables in the Health System in Malawi|
|Christon Moyo, Jens Kaasbøll, Petter Nielsen, Johan Sæbø||# of downloads: 10|
|Participation in ICT Development Interventions: Who and How?|
|Devinder Thapa, Øystein Sæbø||# of downloads: 2|
|Scaffolding Health Information Infrastructure’s Generativity by Scaffolded Gateways: The Case of Vietnam|
|Thanh Ngoc Nguyen, Jorn Braa||# of downloads: 4|
|Long Lamai Community ICT4D E-Commerce System Modelling: An Agent Oriented Role-Based Approach|
|Cheah Wai Shiang, Alfian Abdul Halin, Marlene Lu, Gary CheeWhye||# of downloads: 5|
|Mobile Phone Expansion and Opportunities for e-Governance in Africa|
|Peter A. K. Kyem||# of downloads: 2|
|An Exploratory Study of Attitudes towards Privacy in Social Media and the Threat of Blackmail: The Views of a Group of Saudi Women|
|Yeslam Al-Saggaf||# of downloads: 6|
|The Adoption of e-Commerce in the Lesotho Tourism Industry|
|Tsebetso Mapeshoane, Shaun Pather||# of downloads: 5|