Part of the SpringerBriefs in Information Systems book series (BRIEFSINORMAT)
Making the Global Convergence of ICT Available for Everyone
In 2011, the pace in the development of information and communication technology (ICT) seemed to peak, but the convergence phenomenon can still be described as a first-world trend.
KeywordsGlobal Convergence Ubiquitous Computing Network Neutrality Internet Architecture Content Distribution Network
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
- Andersen, K. N., Henriksen, H. Z., Medaglia, R., Danziger, J. N., Sannarnes, M. K., & Enemærke, M. (2010). Fads and facts of e-government: A review of impacts of e-government (2003–2009). International Journal of Public Administration, 33(11), 564–579.Google Scholar
- Banavar, G., & Bernstein, A. (2002). Software infrastructure and design challenges for ubiquitous computing applications. Communications of the ACM, 45(12), 92–96.Google Scholar
- Bell, S., & Walker, S. (2011). Futurescaping infinite bandwidth, zero latency. Futures, 43(5), 525–539. Elsevier Ltd.Google Scholar
- Boyle, J. (1997). Foucault in cyberspace: surveillance, sovereignty, and hard-wired censors. University of Cincinnati Law Review 66, 177.Google Scholar
- Cooper, H. M. (1988). Organizing knowledge syntheses: A taxonomy of literature reviews. Knowledge in Society, 1(1), 104–126. Springer: Netherlands.Google Scholar
- Denz, M. D. (2008). Sustainable telemedicine: Paradigms for future-proof healthcare. European Health Telematics Association, 1.Google Scholar
- Green, M. (2011). Better, smarter, faster: web 3.0 and the future of learning. Training + Development, 65(4), 70–72.Google Scholar
- Houghton, J. (2002). Information technology and the revolution in healthcare. Victoria University of Technology, Centre for Strategic Economic Studies, Melbourne. www.cfses.com.
- Islam, N., & Fayad, M. (2003). Toward ubiquitous acceptance of ubiquitous computing. Communications of the ACM, 46(2), 89–92. Association for Computing Machinery, Inc, One Astor Plaza, 1515 Broadway, New York, NY, 10036–5701, USA.Google Scholar
- Kumar, M. (2009). Distributed computing in opportunistic environments. Ubiquitous Intelligence and Computing, 1–1. Springer.Google Scholar
- Lewis, J. A. (2002). Assessing the risks of cyber terrorism, cyber war and other cyber threats. Center for Strategic & International Studies.Google Scholar
- Lyytinen, K. J., & Yoo, Y. (2002). Issues and challenges in ubiquitous computing. Communications of the ACM, 45(12), 62–65.Google Scholar
- Lyytinen, K. J., Yoo, Y., Varshney, U., Ackerman, M., Davis, G., Avital, M., et al. (2004). Surfing the next wave: design and implementation challenges of ubiquitous computing. Communications of the Association for Information Systems, 13(1), 40.Google Scholar
- Okediji, R. L. (2004). Development in the information age: issues in the regulation of intellectual property rights, computer software and electronic commerce. UNCTAD-ICTSD, 9. Google Scholar
- Paul, S., Pan, J., & Jain, R. (2011). Architectures for the future networks and the next generation internet: A survey. Computer Communications, 34(1), 2–42. Elsevier B.V.Google Scholar
- Poese, I., Frank, B., Ager, B., Smaragdakis, G., Uhlig, S., & Feldmann, A. (2012). Improving content delivery with PaDIS. IEEE Internet Computing, 16(3), 46–52. Google Scholar
- Prakash, G. (2005). Leapfrogging into the knowledge era: Use of ICT for development. IMR Conference (pp. 47–56).Google Scholar
- Ramsaroop, P. (2003). Cybercrime, cyberterrorism and cyberwarfare. Pan American Health Organization.Google Scholar
- Schuett, F. (2010). Network neutrality: A survey of the economic literature. Review of Network Economics, 9(2). doi: 10.2202/1446-9022.1224.
- Sommer, J. S. (2001). Against cyberlaw. Berkeley Technology Law Journal, 15(3), 1145–1232.Google Scholar
- Tariq, O. (2006). Internet censorship: the end of digital libertarianism? London School of Economics. Google Scholar
- vom Brocke, J., Simons, A., Niehaves, B., Riemer, K., Plattfaut, R., & Cleven, A. (2009). Reconstructing the giant: On the importance of rigour in documenting the literature search process. 17th European Conference on Information Systems (pp. 1–13).Google Scholar
- Waller, V., & Johnston, R. B. (2009). Making ubiquitous computing available. Communications of the ACM, 52(10), 127.Google Scholar
- Weiser, M. (1991). The computer for the 21st century. Scientific American, 265(3), 94–104. New York.Google Scholar
- Wu, T. (2003). Network neutrality, broadband discrimination. Journal on Telecommunications & High Technology Law, 2(1), 141–175.Google Scholar
© The Author(s) 2015