Academic literature on the topic 'Value-added networks (Computer networks) – Ghana'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Value-added networks (Computer networks) – Ghana.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Value-added networks (Computer networks) – Ghana"

1

Adu-Manu, Kofi Sarpong, Ferdinand Apietu Katsriku, Jamal-Deen Abdulai, and Felicia Engmann. "Smart River Monitoring Using Wireless Sensor Networks." Wireless Communications and Mobile Computing 2020 (September 21, 2020): 1–19. http://dx.doi.org/10.1155/2020/8897126.

Full text
Abstract:
Water quality monitoring (WQM) systems seek to ensure high data precision, data accuracy, timely reporting, easy accessibility of data, and completeness. The conventional monitoring systems are inadequate when used to detect contaminants/pollutants in real time and cannot meet the stringent requirements of high precision for WQM systems. In this work, we employed the different types of wireless sensor nodes to monitor the water quality in real time. Our approach used an energy-efficient data transmission schedule and harvested energy using solar panels to prolong the node lifetime. The study took place at the Weija intake in the Greater Accra Region of Ghana. The Weija dam intake serves as a significant water source to the Weija treatment plant which supplies treated water to the people of Greater Accra and parts of Central regions of Ghana. Smart water sensors and smart water ion sensor devices from Libelium were deployed at the intake to measure physical and chemical parameters. The sensed data obtained at the central repository revealed a pH value of 7. Conductivity levels rose from 196 S/cm to 225 S/cm. Calcium levels rose to about 3.5 mg/L and dropped to about 0.16 mg/L. The temperature of the river was mainly around 35°C to 36°C. We observed fluoride levels between 1.24 mg/L and 1.9 mg/L. The oxygen content rose from the negative DO to reach 8 mg/L. These results showed a significant effect on plant and aquatic life.
APA, Harvard, Vancouver, ISO, and other styles
2

Gedel, Ibrahim Alhassan, and Nnamdi Nwulu. "Infrastructure Sharing for 5G Deployment: A Techno-Economic Analysis." International Journal of Interactive Mobile Technologies (iJIM) 15, no. 02 (January 26, 2021): 137. http://dx.doi.org/10.3991/ijim.v15i02.16749.

Full text
Abstract:
<p>Fifth-generation wireless (5G) mobile communication technology has been classified as a high wireless standard that is capable of handling internet of things, machine-to-machine, and device-to-device communication. Consequently, there is a need to meet the very sensitive requirements of 5G, which include high coverage density, high speed, high capacity and low end-to-end delay. Of crucial importance is 5G’s passive infrastructure. This paper therefore presents a techno-economic analysis of the current telecommunication infrastructure, as well as investigating and determining the suitable passive infrastructure for 5G technology deployment. The paper outlines all the passive infrastructure elements and proposes a mathematical model to calculate the capital expenditure, operational expenditure, total cost of investment (TCI) or total cost of ownership (TCO) and net present value (NPV). Experiments are performed using market prices from the national communication authority, the mobile network operators and the tower company of Ghana. Furthermore, a sensitivity analysis is performed to identify the variables that increase the TCO or TCI, NPV and return on investment, and to propose the most economical passive infrastructure architecture for easy implementation of 5G technology in Ghana and Africa.</p>
APA, Harvard, Vancouver, ISO, and other styles
3

Kubuga, Kennedy Kumangkem, Daniel Azerikatoa Ayoung, and Stephen Bekoe. "Ghana’s ICT4AD policy: between policy and reality." Digital Policy, Regulation and Governance 23, no. 2 (June 16, 2021): 132–53. http://dx.doi.org/10.1108/dprg-02-2020-0020.

Full text
Abstract:
Purpose Nearly at the end of its lifespan, the Ghana ICT4AD policy is in a position for a holistic view, especially through the eyes of the intended beneficiaries. This paper aims to fill that gap. The paper measures the gap between what was intended and what has been realised and, based on that, makes recommendations for stakeholders. Design/methodology/approach The research used the design reality gap analysis approach to numerically examine the deviation or otherwise of the ideals of the Ghana ICT4AD policy from or to the reality on the ground. It required the breaking down of the problem into dimensions and subdimensions and involved interviewing office holders, academics, practitioners and students over a three-year period. The recommendations include a review of the policy before it expires and an explicit designation of an agency responsible for coordination, monitoring and evaluation of the various stages of the policy. Findings The chief finding is that Ghana’s ICT4AD policy might miss the targets totally, or might well be a partial failure unless action is taken to close the design–reality gaps identified by the research. As the policy is almost at the end of its lifespan, recommendations are even more useful when the recommended revision takes place. Research limitations/implications The major limitation of the is that it looks only at the implementation success or failure without a probe into the causal factors and/or the impact on society. Practical implications The policy runs full term at end 2022, with large gaps between the plans of the framers and the reality on the ground. An immediate revision of the policy is most recommended. Originality/value Besides this study, the authors have not come across any such comprehensive study of the Ghana ICT4AD policy, especially with the amount of data now available after two decades. There is a similarity with a Pakistani study, which has been acknowledged in this study, but the two works differ greatly in methodology, context and style.
APA, Harvard, Vancouver, ISO, and other styles
4

Osei-Frimpong, Kofi, Graeme McLean, and Samuel Famiyeh. "Social media brand engagement practices." Information Technology & People 33, no. 4 (November 25, 2019): 1235–54. http://dx.doi.org/10.1108/itp-05-2018-0220.

Full text
Abstract:
Purpose The purpose of this paper is to deepen the understanding on social media brand engagement (SMBE) practices by exploring the impact of consumer brand knowledge, perceived social pressure, perceived social relatedness (PSR) and the role of brand trust. Design/methodology/approach A model is proposed to suggest the influence of consumer-level antecedents and moderators of SMBE. Following a survey design approach, data collected from 687 respondents on Facebook are examined through structural equation modelling using AMOS 23.0. Findings The findings reveal significant relationship between the examined antecedents (brand knowledge, perceived social pressure and brand trust) and SMBE. Examination of the moderation role of PSR revealed significant interaction effects on the relationship between brand knowledge and SMBE, as well as perceived social pressure and SMBE. The findings also suggest a lack of interaction effect of PSR on the relationship between brand trust and SMBE. Research limitations/implications This research provides empirical evidence in support of understanding SMBE practices by testing theoretically grounded hypotheses. The study focussed on technologically savvy respondents and only Facebook users in Ghana, which could limit the generalisation of the findings reported. Practical implications This study illustrates a need for managers to integrate multi-communication channels to enhance brand interactions and engagements. Firms must also adopt strategies that would enhance the sharing of interesting information about their brands on their social media platforms to attract others through customer networks. Originality/value The conceptualization of SMBE in this study zooms out our understanding of online SMBE by examining pertinent variables that drive or moderate consumer participation in SMBE activities. The integration of these variables brings out new empirical understanding and extends our knowledge on SMBE.
APA, Harvard, Vancouver, ISO, and other styles
5

Ghani, Nasir, Qing Liu, Ashwin Gumaste, John Lankford, Abdallah Shami, Chadi Assi, Ahmad Khalil, and Driss Benhaddou. "Value-added services in next-generation SONET/SDH networks." IEEE Communications Magazine 46, no. 11 (November 2008): 64–73. http://dx.doi.org/10.1109/mcom.2008.4689247.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Capelastegui, Pedro, Alberto Hernandez, Francisco Gonzalez Vidal, Enrique Vazquez, Joaquin Navarro, and Nuria Siguero. "Group management in value-added services over IMS networks." IEEE Latin America Transactions 8, no. 2 (April 2010): 120–26. http://dx.doi.org/10.1109/tla.2010.5514437.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Dzidzah, Esther, Kwame Owusu Kwateng, and Benjamin Kofi Asante. "Security behaviour of mobile financial service users." Information & Computer Security 28, no. 5 (June 29, 2020): 719–41. http://dx.doi.org/10.1108/ics-02-2020-0021.

Full text
Abstract:
Purpose The inception of mobile financial services (MFSs) has positively provoked economic growth and productivity, nonetheless, it has pessimistically caused an upward surge in cybersecurity threat. Customers are progressively becoming conscious of some of the threat and several of them now shun away from some suspicious activities over the internet as a form of protection. This study aims to explore the factors that influence users’ to adopt security behaviour. Design/methodology/approach A synthesis of theories – Self-efficacy and technology threat avoidance theories – was used to examine the security behaviour of users of MFSs. Data was gathered from 530 students in Ghana using convenience sampling technique. Data analysis was carried out using descriptive statistics, inferential statistics and structural equation model. Findings Outcome of the investigation indicate that both mastery experience and verbal persuasion have substantial effect on the avoidance motivation of MFSs users. It was, however, found that emotional state and vicarious experience of users do not influence their avoidance motivation. Also, it was established that avoidance motivation is a positive prognosticator of avoidance behaviour. Practical implications Understanding the security behaviour of MFS users will help the operators to outline strategies to sustain the successes achieved. Originality/value Studies on user security behaviour are rare, especially in sub Saharan Africa, thus, this study will contribute to extant literature by adding a new dimension of user security behaviour.
APA, Harvard, Vancouver, ISO, and other styles
8

Leighfield, JP. "Implementing and operating a value added network." Computer Communications 8, no. 4 (August 1985): 199–202. http://dx.doi.org/10.1016/0140-3664(85)90254-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Gong, Chao, Kamil Sarac, Ovidiu Daescu, Balaji Raghavachari, and Raja Jothi. "Load-balanced agent activation for value-added network services." Computer Communications 29, no. 11 (July 2006): 1905–16. http://dx.doi.org/10.1016/j.comcom.2005.10.035.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Song, Qiang, Zhaoming Li, Ibrahim Habib, and Wesam Alanqar. "Value-added proposition of the GMPLS control plane in IP optical networks." Journal of Optical Networking 4, no. 12 (2005): 838. http://dx.doi.org/10.1364/jon.4.000838.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Value-added networks (Computer networks) – Ghana"

1

Hatting, Henry Lindo. "An opportunity exploration and best practices analysis for South African mobile value-added companies entering the Ghanaian market." Thesis, Stellenbosch : Stellenbosch University, 2015. http://hdl.handle.net/10019.1/97329.

Full text
Abstract:
Thesis (MBA)--Stellenbosch University, 2015.
ENGLISH ABSTRACT: Mobile penetration in Ghana and the rest of Western Africa is reaching maturity. Mobile operators are looking for ways to complement their traditional revenue streams, as they cannot merely rely on voice and short message service (SMS) income anymore. Mobile value-added services are a good addition to the portfolio, bringing much needed services like transactional banking, commerce, information and entertainment, insurance, and health information services to mobile users that had difficult to no access to the above services until recently. South African mobile value-added services (VAS) companies that have a good relationship with market leading mobile providers, like MTN, have the opportunity to tap into the Ghanaian market as these services predominantly consist of mobile financial services products with limited functionality. Other specific services like agriculture, health, entertainment and insurance have been identified as mobile subscriber needs in the Ghanaian market. The benefit that South African mobile value-added companies have is that they already have developed similar well-functioning value-added services for the local market where comparisons with the Ghanaian market dynamics can be found. These companies can tailor them to the specific needs and requirements of the market in Ghana, saving them time and having the much-needed first mover advantage with regards to new or better mobile VAS in this market. Ghana is seen as the most stable country in the West African region and ease of doing business is good in comparison with neighbouring countries like Nigeria. Ghana is therefore a good entry point for South African mobile VAS companies in the West African market to truly scale their business model. The researcher chose to investigate the opportunities and best ways to enter this market by interviewing a project manager and managing director of a leading mobile value-added services company doing business in emerging economies, including Ghana. Questionnaires were also sent to employees working for various mobile VAS employers with extensive experience in the research and development of mobile VAS in these markets. The researcher derived information on the difficulty of doing business in Ghana; the current available VAS in the Ghanaian market; factors that hinder business growth in this market specifically; drivers of success; the importance of partnering with leading mobile operators like MTN to be successful; how the South African business model can be compatible; South African and other African trends that will most likely overflow to Ghana; together with the size data-enabled VAS which will form part of the portfolio of products that mobile VAS companies can offer and be market ready for in the near future. The findings of the researcher can be used as a starting framework to further investigate and determine specific market size and to conduct in-depth market analysis of the needs and requirements of mobile subscribers with regards to mobile VAS in Ghana with the vision of moving into the rest of Western Africa.
APA, Harvard, Vancouver, ISO, and other styles
2

Mdlokovi, Lulama Reuben. "An evaluation of the process and impact of outsourcing information technology (IT) services by Eastern Cape Treasury Department (ECTD) to the State Information Technology Agency (SITA)." Thesis, Rhodes University, 2008. http://eprints.ru.ac.za/1160/.

Full text
Abstract:
Thesis (M.B.A. (Rhodes Investec Business School)) - Rhodes University, 2008.
Submitted in partial fulfilment of the requirements for the degree Master of Business Administration in the Rhodes Investec Business School (RIBS)
APA, Harvard, Vancouver, ISO, and other styles
3

Meyer, Ettienne. "Electronic data interchange : an implementation methodology." Diss., 1995. http://hdl.handle.net/10500/17443.

Full text
Abstract:
The purpose of the research is to propose and evaluate a methodology for implementing EDI to assist organisations in reaping the anticipated benefits. The research involved the systematic analysis of the state of the art of EDI and paradigms of methodologies, to define a model for the EDI implementation methodology, and to define criteria for evaluating such a model. The methodology was developed and modelled utilising the software process model, as adopted by Boehm (1988) and later duPlessis and van der Walt (1992), as a framework. Next a synthesis of the assimilated knowledge and brainstorming of project teams involved in EDI pilot projects, was used to systematically develop an EDI implementation methodology. The methodology was evaluated by utilising it in the implementation of EDI between two organisations, Computer Equipment Brokers (PTY) and Marksec (PTY). It was concluded that the methodology was efficient for implementing EDI.
Computing
M. Sc. (Information Systems)
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Value-added networks (Computer networks) – Ghana"

1

Implementing value-added telecom services. Boston: Artech House, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Zuidweg, Han. Implementing value-added telecom services. Boston, MA: Artech House, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Next generation intelligent networks. Boston, MA: Artech House, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Thörner, Jan. Intelligent networks. Boston: Artech House, 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Hills, Tim. Advanced intelligent networks. Cambridge, England: Analysis Publications, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

1931-, Steinmann Heinrich, ed. Intelligent networks: Telecommunications solutions for the 1990s. Boca Raton: CRC Press, 1990.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

B, Lawrence Victor, ed. Intelligent broadband multimedia networks: Generic aspects and architectures : wireless, ISDN, current and future intelligent networks. Boston, MA: Kluwer Academic Publishers, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

International Council for Computer Communication. Conference. Intelligent networks--the path to global networking: Proceedings of the International Council for Computer Communication intelligent networks conference, Tampa, Florida, May 4-6, 1992. Edited by Bayliss Paul W. Washington, DC: IOS Press, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

IFIP/IEEE International Workshop on Distributed Systems: Operations and Management (11th 2000 Austin, Teax.). Services management in intelligent networks: 11th IFIP/IEEE International Workshop on Distributed Systems: Operations and Management, DSOM 2000, Austin, TX, USA, December 4-6, 2000 : proceedings. Berlin: Springer, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Olgeirson, Ian. Home networking services: An analysis of the trends and opportunities for supporting residential data. Carmel, CA (126 Clock Tower Place, Carmel 93923): Kagan Resarch, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Value-added networks (Computer networks) – Ghana"

1

Pan, Hua, and Linfu Sun. "Dynamic Evaluation of Suppliers for Industrial Value Chain Value-Added Service Platform." In Proceedings of the 4th International Conference on Computer Engineering and Networks, 1155–63. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-11104-9_133.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Jennett, Penny, I. J. T. Parboosingh, William R. Maes, and Jocelyn M. Lockyer. "Medical Rural/Academic Computer And Communication Networks: Their Potential to Assist with the Health of the Community i.e., Their Health Added Value." In Medical Informatics Europe ’90, 391–94. Berlin, Heidelberg: Springer Berlin Heidelberg, 1990. http://dx.doi.org/10.1007/978-3-642-51659-7_73.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Dadwal, Sumesh S., and Azizul Hassan. "The Augmented Reality Marketing." In Mobile Computing and Wireless Networks, 63–80. IGI Global, 2016. http://dx.doi.org/10.4018/978-1-4666-8751-6.ch004.

Full text
Abstract:
This chapter elaborates on augmented reality marketing (ARM) as a digital marketing campaign and a strategic trend in tourism and hospitality. The computer assisted augmenting of perception by means of additional interactive information levels in real time is known as augmented reality. Augmented reality marketing is a constructed worldview on a device with blend of reality and added or augmented themes interacting with five sense organs and experiences. The systems and approaches of marketing are integrating with technological applications in almost all sectors of economies and in all phases of a business's value delivery network. Trends in service sector marketing provide opportunities in generating technology led tourism marketing campaigns. Also, the adoption, relevance and significance of technology in tourism and hospitality value delivery network can hardly be ignored. Many factors are propelling the functionalities of diverse actors in tourism. This paper explores the use of technology at various phases of tourism and hospitality marketing, along with the role of technology in enhancing consumer experience and value addition. It further supports the view that technology is aiding in faster diffusion of tourism products, relates destinations or attractions and thus benefiting the entire society. The augmented reality in marketing can create effective and enjoyable interactive experience by engaging the customer through a rich and rewarding experience of virtually plus reality. Such a tool has real potential in marketing in tourism and hospitality sector. Thus, this study discusses the ARM as a promising trend in tourism and hospitality and how this will meet future needs of tourism and hospitality products or offerings.
APA, Harvard, Vancouver, ISO, and other styles
4

Goundar, Sam, Akashdeep Bhardwaj, Safiya Shameeza Nur, Shonal S. Kumar, and Rajneet Harish. "Industrial Internet of Things." In Advances in Computer and Electrical Engineering, 133–48. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-3375-8.ch010.

Full text
Abstract:
This chapter focused on the importance and influence of industrial internet of things (IIoT) and the way industries operate around the world and the value added for society by the internet-connected technologies. Industry 4.0 and internet of things (IoT)-enabled systems where communication between products, systems, and machinery are used to improve manufacturing efficiency. Human operators' intervention and interaction is significantly reduced by connecting machines and creating intelligent networks along the entire value chain that can communicate and control each other autonomously. The difference between IoT and IIoT is that where consumer IoT often focuses on convenience for individual consumers, industrial IoT is strongly focused on improving the efficiency, safety, and productivity of operations with a focus on return on investment. The possibilities with IIoT is unlimited, for example, smarter and more efficient factories, greener energy generation, self-regulating buildings that optimize energy consumption, smart cities that can adjust traffic patterns to respond to congestion.
APA, Harvard, Vancouver, ISO, and other styles
5

De Lara, Juan D. "The Circuits of Capital." In Inland Shift. University of California Press, 2018. http://dx.doi.org/10.1525/california/9780520289581.003.0005.

Full text
Abstract:
Global economic restructuring, especially the geographic expansion of commodity networks during the 1990s and 2000s, had a profound effect on logistics workers. This chapter examines how companies used new technologies and scientific management techniques to produce labor regimes that cut costs and added value to distribution practices. Some of these technologies included barcodes, radio-frequency identification (RFID), and computer tracking software. Retailers used such technologies to develop sophisticated inventory systems and point-of-sale (POS) information databases that allowed them to implement just-in-time (JIT) production and distribution business models. In addition to these technological systems, retailers and third-party logistics companies (3PLs) or subcontractors also developed new just-in-time management practices and labor regimes. Less time and more goods became the mantra for retailers, who embraced shorter commodity cycles, dispersed production, and flexible labor.
APA, Harvard, Vancouver, ISO, and other styles
6

Boye, Niels. "Pervasive Healthcare." In Ubiquitous and Pervasive Computing, 764–81. IGI Global, 2010. http://dx.doi.org/10.4018/978-1-60566-960-1.ch046.

Full text
Abstract:
Pervasive healthcare is a vision for the future of healthcare. Healthcare provisions can be delivered with high quality at low cost along with higher patient-experienced quality and satisfaction as a service on top of a pervasive computing infrastructure, which can be built by integrating communicating computer-power into industrial products and fixed structures in urban and rural spaces. For pervasive healthcare, integration with on body networks sensors and actuators may also be needed. This chapter discusses the prerequisites of this vision from a point of a healthcare professional. A number of parallel advances in concepts have to take place before pervasive healthcare (PH) is matured into a general method for delivering healthcare provisions. The contemporary, most widespread model of healthcare provisions as industrial products with consumer-goods characteristics has to mature into the concepts of welfare economics. New market models have to be developed for PH to pervade society and add value to the health aspects of an individual’s life. Ethical and legal aspects must also be further matured. Maturation of technology is needed. This includes all the components of the “pervasive loop” from sensors to the central intelligence back to the actuators. The “virtual patient/healthy human” as an operational digital representation of the “object/subject of care” also has to be developed. Pervasive healthcare (or the European Union term: ambient assisted living) is a promising field, that has potential to integrate health considerations and health promoting activities for patients and non-patients in their everyday conduct and provide added value to life quality for individuals.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Value-added networks (Computer networks) – Ghana"

1

Wacht, Patrick, and Ulrich Trick. "A novel test creation framework for value-added services." In 2016 24th International Conference on Software, Telecommunications and Computer Networks (SoftCOM). IEEE, 2016. http://dx.doi.org/10.1109/softcom.2016.7772108.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Value-added networks (Computer networks) – Ghana"

1

African Open Science Platform Part 1: Landscape Study. Academy of Science of South Africa (ASSAf), 2019. http://dx.doi.org/10.17159/assaf.2019/0047.

Full text
Abstract:
This report maps the African landscape of Open Science – with a focus on Open Data as a sub-set of Open Science. Data to inform the landscape study were collected through a variety of methods, including surveys, desk research, engagement with a community of practice, networking with stakeholders, participation in conferences, case study presentations, and workshops hosted. Although the majority of African countries (35 of 54) demonstrates commitment to science through its investment in research and development (R&D), academies of science, ministries of science and technology, policies, recognition of research, and participation in the Science Granting Councils Initiative (SGCI), the following countries demonstrate the highest commitment and political willingness to invest in science: Botswana, Ethiopia, Kenya, Senegal, South Africa, Tanzania, and Uganda. In addition to existing policies in Science, Technology and Innovation (STI), the following countries have made progress towards Open Data policies: Botswana, Kenya, Madagascar, Mauritius, South Africa and Uganda. Only two African countries (Kenya and South Africa) at this stage contribute 0.8% of its GDP (Gross Domestic Product) to R&D (Research and Development), which is the closest to the AU’s (African Union’s) suggested 1%. Countries such as Lesotho and Madagascar ranked as 0%, while the R&D expenditure for 24 African countries is unknown. In addition to this, science globally has become fully dependent on stable ICT (Information and Communication Technologies) infrastructure, which includes connectivity/bandwidth, high performance computing facilities and data services. This is especially applicable since countries globally are finding themselves in the midst of the 4th Industrial Revolution (4IR), which is not only “about” data, but which “is” data. According to an article1 by Alan Marcus (2015) (Senior Director, Head of Information Technology and Telecommunications Industries, World Economic Forum), “At its core, data represents a post-industrial opportunity. Its uses have unprecedented complexity, velocity and global reach. As digital communications become ubiquitous, data will rule in a world where nearly everyone and everything is connected in real time. That will require a highly reliable, secure and available infrastructure at its core, and innovation at the edge.” Every industry is affected as part of this revolution – also science. An important component of the digital transformation is “trust” – people must be able to trust that governments and all other industries (including the science sector), adequately handle and protect their data. This requires accountability on a global level, and digital industries must embrace the change and go for a higher standard of protection. “This will reassure consumers and citizens, benefitting the whole digital economy”, says Marcus. A stable and secure information and communication technologies (ICT) infrastructure – currently provided by the National Research and Education Networks (NRENs) – is key to advance collaboration in science. The AfricaConnect2 project (AfricaConnect (2012–2014) and AfricaConnect2 (2016–2018)) through establishing connectivity between National Research and Education Networks (NRENs), is planning to roll out AfricaConnect3 by the end of 2019. The concern however is that selected African governments (with the exception of a few countries such as South Africa, Mozambique, Ethiopia and others) have low awareness of the impact the Internet has today on all societal levels, how much ICT (and the 4th Industrial Revolution) have affected research, and the added value an NREN can bring to higher education and research in addressing the respective needs, which is far more complex than simply providing connectivity. Apart from more commitment and investment in R&D, African governments – to become and remain part of the 4th Industrial Revolution – have no option other than to acknowledge and commit to the role NRENs play in advancing science towards addressing the SDG (Sustainable Development Goals). For successful collaboration and direction, it is fundamental that policies within one country are aligned with one another. Alignment on continental level is crucial for the future Pan-African African Open Science Platform to be successful. Both the HIPSSA ((Harmonization of ICT Policies in Sub-Saharan Africa)3 project and WATRA (the West Africa Telecommunications Regulators Assembly)4, have made progress towards the regulation of the telecom sector, and in particular of bottlenecks which curb the development of competition among ISPs. A study under HIPSSA identified potential bottlenecks in access at an affordable price to the international capacity of submarine cables and suggested means and tools used by regulators to remedy them. Work on the recommended measures and making them operational continues in collaboration with WATRA. In addition to sufficient bandwidth and connectivity, high-performance computing facilities and services in support of data sharing are also required. The South African National Integrated Cyberinfrastructure System5 (NICIS) has made great progress in planning and setting up a cyberinfrastructure ecosystem in support of collaborative science and data sharing. The regional Southern African Development Community6 (SADC) Cyber-infrastructure Framework provides a valuable roadmap towards high-speed Internet, developing human capacity and skills in ICT technologies, high- performance computing and more. The following countries have been identified as having high-performance computing facilities, some as a result of the Square Kilometre Array7 (SKA) partnership: Botswana, Ghana, Kenya, Madagascar, Mozambique, Mauritius, Namibia, South Africa, Tunisia, and Zambia. More and more NRENs – especially the Level 6 NRENs 8 (Algeria, Egypt, Kenya, South Africa, and recently Zambia) – are exploring offering additional services; also in support of data sharing and transfer. The following NRENs already allow for running data-intensive applications and sharing of high-end computing assets, bio-modelling and computation on high-performance/ supercomputers: KENET (Kenya), TENET (South Africa), RENU (Uganda), ZAMREN (Zambia), EUN (Egypt) and ARN (Algeria). Fifteen higher education training institutions from eight African countries (Botswana, Benin, Kenya, Nigeria, Rwanda, South Africa, Sudan, and Tanzania) have been identified as offering formal courses on data science. In addition to formal degrees, a number of international short courses have been developed and free international online courses are also available as an option to build capacity and integrate as part of curricula. The small number of higher education or research intensive institutions offering data science is however insufficient, and there is a desperate need for more training in data science. The CODATA-RDA Schools of Research Data Science aim at addressing the continental need for foundational data skills across all disciplines, along with training conducted by The Carpentries 9 programme (specifically Data Carpentry 10 ). Thus far, CODATA-RDA schools in collaboration with AOSP, integrating content from Data Carpentry, were presented in Rwanda (in 2018), and during17-29 June 2019, in Ethiopia. Awareness regarding Open Science (including Open Data) is evident through the 12 Open Science-related Open Access/Open Data/Open Science declarations and agreements endorsed or signed by African governments; 200 Open Access journals from Africa registered on the Directory of Open Access Journals (DOAJ); 174 Open Access institutional research repositories registered on openDOAR (Directory of Open Access Repositories); 33 Open Access/Open Science policies registered on ROARMAP (Registry of Open Access Repository Mandates and Policies); 24 data repositories registered with the Registry of Data Repositories (re3data.org) (although the pilot project identified 66 research data repositories); and one data repository assigned the CoreTrustSeal. Although this is a start, far more needs to be done to align African data curation and research practices with global standards. Funding to conduct research remains a challenge. African researchers mostly fund their own research, and there are little incentives for them to make their research and accompanying data sets openly accessible. Funding and peer recognition, along with an enabling research environment conducive for research, are regarded as major incentives. The landscape report concludes with a number of concerns towards sharing research data openly, as well as challenges in terms of Open Data policy, ICT infrastructure supportive of data sharing, capacity building, lack of skills, and the need for incentives. Although great progress has been made in terms of Open Science and Open Data practices, more awareness needs to be created and further advocacy efforts are required for buy-in from African governments. A federated African Open Science Platform (AOSP) will not only encourage more collaboration among researchers in addressing the SDGs, but it will also benefit the many stakeholders identified as part of the pilot phase. The time is now, for governments in Africa, to acknowledge the important role of science in general, but specifically Open Science and Open Data, through developing and aligning the relevant policies, investing in an ICT infrastructure conducive for data sharing through committing funding to making NRENs financially sustainable, incentivising open research practices by scientists, and creating opportunities for more scientists and stakeholders across all disciplines to be trained in data management.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography