The role of information and communications technology in refugee entrepreneurship: A critical realist case study
It is widely claimed that information and communications technology (ICT) enables
entrepreneurship among refugees. However, the specific impact ICT has on refugee …
entrepreneurship among refugees. However, the specific impact ICT has on refugee …
Mechanisms fostering the misuse of information systems for corrupt practices in the Nigerian public sector
The paper explores the misuse of information systems for corrupt practices in the Nigerian
public sector as a phenomenon under study. Routine Activity theory, Model of Emergent IT …
public sector as a phenomenon under study. Routine Activity theory, Model of Emergent IT …
Developing telerehabilitation in low-income countries during COVID-19: commencement and acceptability of telerehabilitation in Rohingya and host community …
Background. The world has witnessed a major change in providing and viewing the
treatment continuum for medical and rehabilitation services because of the COVID-19 …
treatment continuum for medical and rehabilitation services because of the COVID-19 …
NOTE: Unavoidable Service to Unnoticeable Risks: A Study on How Healthcare Record Management Opens the Doors of Unnoticeable Vulnerabilities for Rohingya …
Secure management of healthcare records in dynamic contexts requires an understanding
of the overall infrastructure of record flows and poses more challenges for vulnerable …
of the overall infrastructure of record flows and poses more challenges for vulnerable …
The Institutional Diffusion of Digital Identity IT Artifact among Marginalized Communities in Nigeria
HJ Onawola, C Ononiwu - 2023 International Conference on …, 2023 - ieeexplore.ieee.org
The recent engagement of Africans in the enrolment into digital identity scheme has been
acknowledged as a requisite for National development. However, the enrolment of such …
acknowledged as a requisite for National development. However, the enrolment of such …
Provenance for Secure Propagation of IoT Data
FT Jaigirdar - 2021 - bridges.monash.edu
In this thesis, we analyze overall IoT architecture from a security-aware data provenance
perspective and propose a novel IoT data provenance model for system security awareness …
perspective and propose a novel IoT data provenance model for system security awareness …
The Dilemma of Unlawful Digital Interventions and Their Impacts on the Rohingya Community During the Covid-19 Pandemic
BD Biswas, A Khan - Social Science and Humanities Journal (SSHJ …, 2024 - sshjournal.com
This study explores the impact of unlawful digital interventions on the Rohingya community
in Bangladesh during the COVID-19 pandemic. The Rohingya refugees, who have faced …
in Bangladesh during the COVID-19 pandemic. The Rohingya refugees, who have faced …