Search results
1 – 4 of 4Manh Thai Do, Morten Falch and Idongesit Williams
This paper aims to look at the universal service policy in Vietnam interval 2005-2010 from a stakeholder perspective to clarify the role of stakeholders as well as initiatives…
Abstract
Purpose
This paper aims to look at the universal service policy in Vietnam interval 2005-2010 from a stakeholder perspective to clarify the role of stakeholders as well as initiatives used to implement the policy.
Design/methodology/approach
This paper applies the stakeholder framework of Papazafeiropoulou and Pouloudi (2000) to identify which actors implemented the universal service policy and what initiatives were used by the central government. In addition, this paper also uses the qualitative method to clarify the stakeholders’ position on performing the universal service policy. The qualitative interview is recruited to verify and triangulate the result of the secondary data.
Findings
This paper finds that the Vietnamese government controlled the universal service policy via an administrative regime that the central government ordered and other stakeholders followed; the universal service policy focused much on delivering universal service and infrastructure; however, there was lack of initiatives rising awareness of rural users about the benefit of the internet, or training courses on improving rural users’ skills to use the internet; and stakeholders implementing the universal service policy were state entities in which the national government played a central role, and there was no involvement of the private sector and the civil society.
Originality/value
Little research on universal service policies in Vietnam has been made. By analyzing the Vietnamese case, achievements and drawbacks in implementing universal service policies are identified and lessons for other developing countries are derived.
Details
Keywords
Olusesan Ayodeji Makinde, Emmanuel Olamijuwon, Nchelem Kokomma Ichegbo, Cheluchi Onyemelukwe and Michael Gboyega Ilesanmi
Incidents of violence perpetrated through digital technology platforms or facilitated by these means have been reported, often in high-income countries. Very little scholarly…
Abstract
Incidents of violence perpetrated through digital technology platforms or facilitated by these means have been reported, often in high-income countries. Very little scholarly attention has been given to the nature of technology-facilitated violence and abuse (TFVA) across sub-Saharan Africa (SSA) despite an explosion in the use of various technologies. We conducted a literature review to identify and harmonize available data relating to the types of TFVA taking place in SSA. This was followed by an online survey of young adults through the SHYad.NET forum to understand the nature of TFVA among young adults in SSA. Our literature review revealed various types of TFVA to be happening across SSA, including cyberbullying, cyberstalking, trolling, dating abuse, image-based sexual violence, sextortion, and revenge porn. The results of our online survey revealed that both young men and women experience TFVA, with the most commonly reported TFVA being receiving unwanted sexually explicit images, comments, emails, or text messages. Female respondents more often reported repeated and/or unwanted sexual requests online via email or text message while male respondents more often reported experiencing violent threats. Respondents used various means to cope with TFVA including blocking the abuser or deleting the abused profile on social media.
Details
Keywords
Oluyemi T. Adeosun, Kayode E. Owolabi, Idongesit C. Eshiet and Temitope J. Owolabi
The upsurge in global youth migration remains a major concern for policymakers, politicians and academia at large. Given the emerging interests in youth migration and informal…
Abstract
Purpose
The upsurge in global youth migration remains a major concern for policymakers, politicians and academia at large. Given the emerging interests in youth migration and informal jobs in cities around the world, this study aims to establish the barriers limiting the transition of migrant youths, in informal settings, into formal jobs and the consequent impact on their livelihood.
Design/methodology/approach
Leveraging the push-pull approach of the functionalist migration school, this study uses a primary research design. A structured questionnaire was administered among 150 migrant youths who were selected across informal settings in Lagos, using a convenient sampling technique. Then, a structured face-to-face interview was later conducted among 40 selected migrant youths.
Findings
There is a skill mismatch between the competence of the youths and the requirements of firms in the formal sector, and the migrant youths are largely disenfranchised from opportunities that flow within certain networks. Another critical constraint includes language barrier, ethnicity and religious biases by certain employers. Most migrant youths are economically better off compared to where they came from, even though they are yet to exit the poverty trap.
Originality/value
This study critically examined the challenges faced by the migrant youth population in Lagos, Nigeria, in their bid to transition from informal employment to formal employment.
Details
Keywords
“The Computing Research Association (CRA) is an association of more than 200 North American academic departments of computer science, computer engineering, and related fields;…
Abstract
“The Computing Research Association (CRA) is an association of more than 200 North American academic departments of computer science, computer engineering, and related fields; laboratories and centers in industry, government, and academia engaging in basic computing research; and affiliated professional societies” (CRA, 2010a). Each year the CRA publishes its Taulbee Survey. “The Taulbee Survey is the principal source of information on the enrollment, production, and employment of Ph.D.s in computer science and computer engineering (CS & CE) and in providing salary and demographic data for faculty in CS & CE in North America. Statistics given include gender and ethnicity breakdowns” (Computer Research Association, CRA, 2010a).