First Monday

Computing within limits and ICTD by Jay Chen



Abstract
Computing research today is fixated on high performance and large scale, but computing can be tremendously powerful even at low power and small scale. In this article we present a perspective on promising directions for research on computing within limits, where concerns about limits overshadow performance and scale. Despite coming from different motivations, computing within limits has very similar considerations as Information Communication Technology for Development (ICTD). We discuss where the two research areas intersect and where they may diverge. We draw parallels between computing within limits and ICTD in terms of technical constraints, designing for context, and goals. We hope to help stimulate computing within limits with ideas from ICTD and highlight research synergies.

Contents

1. Introduction
2. ICTD
3. Computing within limits
4. Conclusion

 


 

1. Introduction

A modern smartphone gives anyone with an Internet connection access to billions of people around the world and petabytes of information in the palm of their hand. This is a miraculous technological achievement, and yet, computing with its potential to dramatically improve our lives rarely realizes this possibility. This unfortunate situation is the result of our recent innovations largely focusing on advancing consumerism. In a world with infinite resources, infinite growth could be sustainable, and plausibly good. However, we wonder whether it makes sense to continue in this direction when resources are dwindling and the marginal benefits are increasingly insignificant.

Information communication technology for development (ICTD) is one of the few sub-fields within computer science that attaches a moral value system to its agenda. ICTD attempts to confront some of the extant socio-economic inequities in developing regions through the design and deployment of information communication technologies (ICTs). The domain that ICTD researchers concern themselves with is defined by the socio-economic condition of poverty, which generally corresponds to some combination of low infrastructure, meager education, deficient healthcare, unreliable food supply, weak or corrupt government, etc. While it is unclear whether any or all of these conditions will be applicable to computing with limits, it is certainly true that limits on computation are imposed by these conditions. Therefore, ICTD can offer existing real-world examples of situations where limits on computing are forcibly enforced.

Given the overlap between computing within limits and ICTD, our goal in this paper is to borrow ideas incubated from within ICTD to frame the research agenda for computing within limits. In the remainder of this paper, we describe the relevant issues in ICTD, highlight the overlapping concerns with computing within limits, and distill research directions for computing within limits.

 

++++++++++

2. ICTD

ICTD first began in the 1940s when televisions were thought to have the potential for bringing education into the home. More recently, the introduction of networked computers in urban telecenters, high mobile phone penetration in developing countries, and large-scale data analytics have attracted computer scientists to ICTD. ICTD is highly interdisciplinary, involving computer scientists of many stripes and researchers from anthropology, sociology, economics, public policy, and design. Also, unlike purely academic fields, ICTD also includes practitioners and interventionists from government and NGOs who want to use ICTs to improve socio-economic outcomes. Here, we focus mainly on outlining computing-centric contributions to ICTD that are relevant to computing with limits [1].

2.1. Constraints

Even before dealing with individual constraints, simply measuring and understanding the technical challenges can often be a challenge in itself due to the lack of measurement infrastructure (Chetty, et al., 2013; Johnson, et al., 2010; Hartung, et al., 2010). Assuming that a problem has been successfully characterized, existing approaches to ICTD typically emphasize interventions that are designed to be contextually appropriate. From a technical standpoint, appropriate typically implies some combination of: low cost, low infrastructure, and high usability, while also targeting one or several development metrics (e.g., education, health, agriculture). This is difficult for at least three fundamental reasons. First, designing such technology interventions is hard; each design requirement by itself is challenging to achieve individually and they are extremely difficult to achieve in concert. Unfortunately many of the technical challenges are interrelated and it is often not possible to isolate and address them independently. Second, interventions (and ‘novel’ ICTs in particular) have high costs in terms of manufacturing, training, infrastructure support (e.g., Internet access for a mobile application), and maintenance. Since even the technology intervention itself is so challenging to design, implement, test, deploy, and evaluate, very little consideration (and design flexibility) remains to be given to how the intervention will sustain itself. Third, contexts are often different enough to often require different solutions, but ICT solutions are often brittle and highly optimized. As a result of these three factors, very few bottom of the pyramid interventions succeed in the initial pilot phase; even when pilots do succeed, they fail to sustain themselves and scale.

2.1.1. Low cost

Low cost ICTD typically emphasizes low equipment cost, but could also include low maintenance cost. Low equipment cost ICTD focuses on designing cheaper computing hardware (One Laptop per Child, 2009; Kraemer, et al., 2009; Heeks and Robinson, 2013; Anand, et al., 2012), replicating existing useful applications on top of cheaper computing platforms, e.g., mobile phones (Parikh, et al., 2006; Librero, et al., 2007; Chaudhri, et al., 2012; Smith, et al., 2011), or creating novel applications on cheap devices (Parikh, et al., 2006; Hartung, et al., 2010; Chaudhri, et al., 2012; Chen, et al., 2010). Low maintenance cost typically implies that it is within the means of the organization sponsoring the intervention or the users themselves to keep the system running. Technical innovations here include low-power equipment or cheap communications such as voice or SMS services that require very few or short messages (Zurovac, et al., 2012; Chen, et al., 2010).

2.1.2. Low infrastructure

ICTD solutions that emphasize low (or unreliable) infrastructure requirements tend toward designing systems that function despite low power or low connectivity (Chandan, et al., 2014; Rey-Moreno, et al., 2013; Chen, et al., 2009; Thies, et al., 2002). Solutions that deal with low infrastructure typically emphasize graceful degradation or continued service, but some efforts deal with the deployability of infrastructure itself (Anand, et al., 2012). Sometimes the low cost solution also addresses low infrastructure problems, e.g., solar may be cheaper, more reliable, and more accessible than grid power (Rey-Moreno, et al., 2013). There are other interesting examples where high cost actually simulates low infrastructure (e.g., expensive Internet causes users to self-impose on-demand network connectivity). Intermittent Web systems cope with both expensive and unreliable connectivity without much distinction (Chen, et al., 2009; Thies, et al., 2002; Pentland, et al., 2004).

Crisis response — Crisis response is tangentially related to ICTD. Crisis response solutions are bifurcated into rapidly deployable low requirement infrastructures or real-time inferences based on large-scale data (Starbird and Palen, 2011). In contrast to ICTD, crisis response focuses on the immediate humanitarian crisis rather than sustainability concerns. In the context of limits, it could be interesting to consider crisis response systems that are easily deployable, arbitrarily extensible, externally compatible, and self-sustainable.

2.1.3. Usability

In many developing regions, users have very little experience with ICTs and less education than in rich countries. Research efforts to address these challenges include pictorial interfaces (Medhi, et al., 2007), speech-based interfaces (Vashistha and Thies, 2012; Raza, et al., 2012), and other simplified interfaces or interaction designs (Medhi, et al., 2011; Cross, et al., 2012; Li and Chen, 2013). Other works seek to preserve existing practices to leverage affordances of traditional technologies such as pen and pencil (Chen, et al., 2012; Dell, et al., 2012; Underwood, et al., 2013) and bring technology into workflows through less disruptive means. Low education may be less immediate of a problem in computing with limits depending on the kinds of scenarios considered, but certainly limitations imposed by user capabilities (e.g., attention) could be one class of limits.

2.2. Interventions

The general goal of ICTD is to introduce technology to facilitate improvement in a development metric (Gomez, et al., 2012; Dearden, 2012). However, when introducing an intervention there are many considerations beyond the purely technical.

2.2.1. Context

As technologists, we often presume that technology is the solution to problems when often it is not. Toyama (2011) observed that technology is just a tool that can be used to amplify human intent. While certain technologies can be targeted at amplifying only positive intents, interjecting a technology without consideration of the context is likely doomed to fail. Creating a cheap, infrastructureless, and easy to use technology is not sufficient to guarantee positive outcomes. Furthermore, it has been demonstrated that satisfying these technical requirements is sometimes not even necessary for adoption (Sambasivan and Smyth, 2010).

What then is it about context and what makes a technology appropriate for that context? We use ‘context’ here as an umbrella term that encompasses all of the not-necessarily-technical milieu surrounding a user, which may include social, political, economic, and psychological factors. We refer the reader to (Heeks, 2002; Brewer, et al., 2005) for more details. In terms of the non-technical contributions to ICTD, most have to do with the investigation and understanding of users and their concerns. Many researchers in ICTD have written about this (Pal, et al., 2013; Bajpai, et al., 2013; Natarajan and Parikh, 2013; Rangaswamy and Cutrell, 2012; Frias-Martinez and Virseda, 2012), but the common theme is that non-technical considerations play a critical part in the success of an intervention (Luk, et al., 2009). Also, beyond deployment, success means having users adopt the technology, the technology actually doing ‘good’, and eventually sustaining itself.

Given that the users in certain computing within limits scenarios do not exist yet, we do not have a clear target user and context to work with. Tomlinson, et al. (2012) make the observation that the designing for ‘collapse informatics’ is essentially a cross-cultural design problem of “designers in the present attempting to design systems for their future selves and families in a time of scarcity ... [and] it is impossible for a researcher or designer to engage with the anticipated users and seek to understand their needs and ways of viewing the world in which they live, or engage in action research.”

To ameliorate this problem we borrow a (philosophical) notion from Ethics for a broken future world (Mulgan, 2011), that people in the future, who are impoverished because of environmental choices we make today, have the same relation to us as people today in other countries who are impoverished for other reasons (e.g., people in developing countries) [2]. In other words, since many challenges in ICTD involve limits and cross-cultural design, ICTD may naturally be considered as one practicable realm of computing within limits.

The bottom of the pyramid — In ICTD, efforts to design for the ‘bottom of the pyramid’ (the poorest of the poor) is difficult because these users and contexts have so many constraints. Successes in ICTD have largely been in the form of technologies that improve the capabilities of organizations that then help the poor directly. In the case of economic collapse it may be an ‘easier’ design problem depending on where in the timeline we choose to operate, e.g., people may be familiar with technology and be well-educated despite rapid impoverishment.

2.2.2. Adoption

Even if we develop a technology that is good enough to solve a problem outright (e.g., vaccinations), there are deployment and adoption challenges. Beyond the socio-economic situation, the core problems in development often have to do with people and their choices. Specifically, people have aspirational, motivational, and behavioral barriers that need to be addressed. For example, it is incredibly difficult to convince someone with very few resources to make changes in practices that involve even small amounts of risk (since the poor are extremely sensitive to risk). Another challenge is that people’s immediate goals are often not aligned with development goals. Providing Internet access to schools only to have most of the bandwidth being used for entertainment rather than education is one common example. Distributing bednets to prevent malaria from mosquitoes and having the bednets used for fishing is another known outcome (Gettleman, 2015).

2.2.3. Sustainability and scale

Many ICTD projects involve deployments, during which users adhere to the intervention. However, projects that lose or finish their funding may have no sustainability plan, exit strategy, or built-in self-obsolescence. After the project ends and the organization departs, the situation becomes just as bad as it was prior to the intervention (Kuriyan, et al., 2006; Dodson, et al., 2012). Part of the challenge is due to the multifarious constraints in ICTD that result in a lack of remaining design space for sustainability. In other words, it is so difficult to build something that is cheap and functional that sustainability becomes an afterthought. Further research is required to understand how to design technologies that gracefully degrade and also interventions that gradually make themselves obsolete.

Reuse — Bricolage, or the construction or creation from a diverse range of available things, is a relevant concept for constrained environments. In India, the local term for bricolage is “Jugaad”, and there are many documented examples where industrious individuals solve problems through Jugaad (Rangaswamy and Densmore, 2013). Bricolage is commonly practiced informally in developing regions and is a yet under-explored design idea that merits consideration (Jackson, et al., 2014). As a contributor to the definition of resilience, bricolage is a useful model for reuse and compellingly motivates modular systems design. Designing with bricolage as a goal could be useful for maintenance in the face of equipment failure, infrastructure failure, and knowledge failures.

 

++++++++++

3. Computing within limits

Before defining a research agenda of computing within limits, we must discuss the failure model we expect, end-goals or desired outcomes, and metrics for success. First, thus far we have used ICTD as a proxy for the conditions of eventual limits, but there is an indeterminable path of failure between the present and a future situation. What, therefore, is the failure model we are expecting or devoting our efforts toward? — peak oil, climate change, Moore’s Law, etc. Second, given the failure model, what are the goals of computation within limits? Do we wish to subsist in low-tech world forever or do we seek to recover from catastrophic failure and resume our descent toward the next catastrophe? Is there a middle ground? Third, what are our metrics for success? Unlike ICTD, where metrics are defined and experimental outputs are measured for evaluation, many failure models and design goals cannot be tested until after the fact. In this paper we briefly outline one failure model we think is likely and defer the discussion of other models and statement of values for future work. We conservatively assume that the goal is to design and deploy resilient computing technologies. Thus, simulated failures or deployments in failing regions may be sufficient evaluations.

3.1. Failure model

Failure models are outside of the scope of this paper, but defining failure models, goals, and metrics for computation within limits is critical to crystallizing a definitive research agenda [3].

If we assume that degrowth via catabolic collapse (Greer, 2005) will be the path toward eventual computing within limits rather than immediate catastrophic collapse, then we may consider focusing on technologies that bridge developing region conditions to first-world systems, e.g., intermittent aware/tolerant systems. Educational or financial systems that can work despite heterogeneous infrastructures. In the first stages of collapse, the general conditions may be similar to Greece today: high unemployment and austerity measures with increasing severity. It is unclear which technological solution might work since the problem is largely economic and political. Should people spend less and wait for the economy to eventually wind down or should the government or European Union infuse the economy with bailouts and loans?

Without some kind of intercession, maintenance of public infrastructure and services may deteriorate and finally fail until, over a long period of time, the country devolves into something akin to a developing country of the present day. Assuming this failure model, one could build technologies that slow down this process or build technologies that continue to function afterwards. Research on computing within limits appears to encompass both, but some calculus must be performed to ascertain where contributions could be made. At the degenerate endpoint of this trajectory, conditions would be similar in many ways to those of today’s poorest developing countries.

3.2. Design for resilience

Sustainability [4] and resilience are not areas where ICTD has traditionally succeeded. Given the current connotation of the term, ‘sustainability’ (i.e., green computing), it is unclear whether it should be promoted to a first-order goal of computing within limits. The focus of computing within limits is not so much that we should design systems to conserve energy use, but rather that the results of approaching fundamental physical limits imposes several constraints, of which, one is energy use. As in ICTD, constraints within which computation should be able to function include, but are not limited to: electricity, networking, transportation, replacement, and repair.

Assuming that the goal of computing within limits is resilience, the design opportunities as compared to ICTD are threefold. First, we are currently operating at a point in time prior to collapse so we have comparatively vast resources and a head start. Second, collapse will not mean the immediate reduction of human and infrastructural capacity, which, as we have noted is a central problem in ICTD. Third, the contexts of developed civilizations are substantially more homogenized than developing regions due to westernization. It may be premature to firmly establish the principles of computing within limits, but from the technology standpoint the design goals that intersect between ICTD and the expected conditions of computing within limits are the following:

  1. Simplicity. Limits computing should emphasize technologies that are simple. While user interfaces should be simple to satisfy usability requirements, the underlying technology needs to be simple to facilitate maintenance and independence from infrastructure.

  2. Infrastructure independence. Reliable electricity, network connectivity, transportation, and even government may be problems in limits situations. During initial decline these are likely to be soft limits, but may eventually deteriorate to the same levels as developing regions of today. Systems should be designed to gracefully degrade when infrastructures decay.

  3. Modularity. With heavy industry, large-scale manufacturing, and global shipping becoming limited, new technologies and replacement components will be less likely over time. Technology should be designed that is largely interoperable and modular so that components may be easily interchanged and replaced locally.

These design goals generally echo the doctrines proscribed by Raghavan and Ma (2011) in the context of networking design in the ‘long emergency.’

3.3. Context

Note that context, cost, and usability were not listed as requirements to computing within limits, but context is a critical consideration. Context is defined broadly (as it is in ICTD) by the socio-economic, geo-political, and physical environment of the target site. Context, therefore, dictates cost and usability constraints. While it is possible that challenges such as language localization exist in limits contexts, we posit that given the homogenization of developed countries limits contexts are initially similar (relative to the diversity of development contexts).

The notion of cost (transportation, energy, and labor) is folded into the constraints imposed by infrastructure and modularity given a particular limits context since those costs will drastically increase. Similarly, usability is implicitly considered as a part of simplicity, but usability itself is also less of a central concern in initial failure contexts due to pre-existing familiarity with technology and other individual capabilities.

3.4. Adoption

As with ICTD, the crux of the problem after technology design has to do with people themselves. Assuming the failure model of slow gradual or catabolic collapse, a more limits-aware technology may not be adopted solely because it is slightly less performant or more expensive. Since the problem is such an intangible tragedy of the commons with yet un-experienced future costs, people may not care enough to adopt solutions. People may use limits-based solutions if their mental models change or it becomes untenable to maintain old models because limits were somehow imposed.

In ICTD contexts are different and often require different solutions to facilitate adoption (Bajpai, et al., 2013; Corrigan-Gibbs and Chen, 2014). As with ICTD, adoption will likely face challenges, but unlike ICTD the barriers are lower since we currently have substantially more material wealth than the average poor person in a developing country. However, this present wealth is counterbalanced by correspondingly higher levels of consumerism and performance (or quality) expectations. As visible evidence of our unsustainable growth accumulates, people may change their behavior and adopt more sensible technology, but by then our available material resources will be lower than today. As with ICTD, awareness campaigns, psychological nudges, and goal aligned interventions are all interesting avenues to consider for encouraging people to embrace change.

 

++++++++++

4. Conclusion

In this paper we explored computing within limits from the perspective of the last decade of work in ICTD. We find many similar constraints between computing within limits and ICTD, but ultimately slightly different emphasis. While understanding context, users, and cost are still concerns in limits computing, the focus of designing for limits shift toward resilience and possibly sustainability. We find that the main requirements for achieving resilience include: simplicity, infrastructure independence, and modularity. While these ideas have been explored in ICTD literature, the design space across these axes has been largely unexplored in ICTD due to substantial contextual constraints imposed by cost and usability. Like ICTD, context, cost, and usability are all likely to be important considerations for designing for computing within limits and central determinants for adoption and sustainability. End of article

 

About the author

Jay Chen is Assistant Professor in the Department of Computer Science at New York University — Abu Dhabi.
E-mail: jchen [at] cs [dot] nyu [dot] edu

 

Notes

1. For a more detailed survey of ICTD, see Heeks, 2002, 2008; Patra, et al., 2009; Toyama and Dias, 2008; and, Gomez, et al., 2012.

2. Mulgan uses this idea to advance philosophical arguments, but we use it literally.

3. We refer readers interested in failure models and their potential consequences to Tomlinson, et al. (2012) and Raghavan and Ma (2011), which contain more detailed overviews.

4. Here we use the term sustainability to refer to ICTD intervention sustainability rather than the sustainable computing sense of low or green power. Elsewhere, we use the term more broadly to mean the general notion of a system sustaining itself in a context.

 

References

A. Anand, V. Pejovic, E.M. Belding, and D.L. Johnson, 2012. “VillageCell: Cost effective cellular connectivity in rural areas,” ICTD ’12: Proceedings of the Fifth International Conference on Information and Communication Technologies and Development, pp. 180–189.
doi: http://dx.doi.org/10.1145/2160673.2160698, accessed 23 July 2015.

K Bajpai, J.B. Larson, and K. Mehta, 2013. Like a hustler: Aligning intervention design with informal labor practices, ICTD ’13: Proceedings of the Sixth International Conference on Information and Communication Technologies and Development: Full papers, volume 1, pp. 177–184.
doi: http://dx.doi.org/10.1145/2516604.2516624, accessed 23 July 2015.

E. Brewer, M. Demmer, B. Du, M. Ho, M. Kam, S. Nedevschi, J. Pal, R. Patra, S. Surana, and K. Fall, 2005. “The case for technology in developing regions,” Computer, volume 38, number 6, pp. 25–38.
doi: http://dx.doi.org/10.1109/MC.2005.204, accessed 23 July 2015.

V. Chandan, M. Jain, H. Khadilkar, Z. Charbiwala, A. Jain, S. Ghai, R. Kunnath, and D. Seetharam, 2014. “UrJar: A lighting solution using discarded laptop batteries,” ACM DEV-5 ’14: Proceedings of the Fifth ACM Symposium on Computing for Development, pp. 21–30.
doi: http://dx.doi.org/10.1145/2674377.2674391, accessed 23 July 2015.

R. Chaudhri, W. Brunette, M. Goel, R. Sodt, J. VanOrden, M. Falcone, and G. Borriello, 2012. “Open data kit sensors: Mobile data collection with wired and wireless sensors,” ACM DEV ’12: Proceedings of the Second ACM Symposium on Computing for Development, article number 9.
doi: http://dx.doi.org/10.1145/2160601.2160614, accessed 23 July 2015.

J. Chen, L. Subramanian, and E. Brewer, 2010. “SMS-based Web search for low-end mobile devices,” MobiCom ’10: Proceedings of the Sixteenth Annual International Conference on Mobile Computing and Networking, pp. 125–136.
doi: http://dx.doi.org/10.1145/1859995.1860011, accessed 23 July 2015.

J. Chen, L. Subramanian, and J. Li, 2009. “RuralCafe: Web search in the rural developing world,” WWW ’09: Proceedings of the 18th International Conference on World Wide Web, pp. 411–420.
doi: http://dx.doi.org/10.1145/1526709.1526765, accessed 23 July 2015.

K. Chen, A. Kannan, Y. Yano, J.M. Hellerstein, and T.S. Parikh, 2012. “Shreddr: Pipelined paper digitization for low-resource organizations,” ACM DEV ’12: Proceedings of the Second ACM Symposium on Computing for Development, article number 3.
doi: http://dx.doi.org/10.1145/2160601.2160605, accessed 23 July 2015.

M. Chetty, S. Sundaresan, S. Muckaden, N. Feamster, and E. Calandro, 2013. “Measuring broadband performance in South Africa,” ACM DEV-4 ’13: Proceedings of the Fourth Annual Symposium on Computing for Development, article number 1.
doi: http://dx.doi.org/10.1145/2537052.2537053, accessed 23 July 2015.

H. Corrigan-Gibbs and J. Chen, 2014. “FlashPatch: Spreading software updates over flash drives in under-connected regions,” ACM DEV-5 ’14: Proceedings of the Fifth ACM Symposium on Computing for Development, pp. 1–10.
doi: http://dx.doi.org/10.1145/2674377.2674384, accessed 23 July 2015.

A. Cross, E. Cutrell, and W. Thies, 2012. “Low-cost audience polling using computer vision,” UIST ’12: Proceedings of the 25th Annual ACM Symposium on User Interface Software and Technology, pp. 45–54.
doi: http://dx.doi.org/10.1145/2380116.2380124, accessed 23 July 2015.

A. Dearden, 2012. “See no evil? Ethics in an interventionist ICTD,” ICTD ’12: Proceedings of the Fifth International Conference on Information and Communication Technologies and Development, pp. 46–55.
doi: http://dx.doi.org/10.1145/2160673.2160680, accessed 23 July 2015.

N. Dell, N. Breit, T. Chaluco, J. Crawford, and G. Borriello, 2012. “Digitizing paper forms with mobile imaging technologies,” ACM DEV ’12: Proceedings of the 2nd ACM Symposium on Computing for Development, article number 2.
doi: http://dx.doi.org/10.1145/2160601.2160604, accessed 23 July 2015.

L.L. Dodson, S.R. Sterling, and J.K. Bennett, 2012. “Considering failure: Eight years of ITID research,” ICTD ’12: Proceedings of the Fifth International Conference on Information and Communication Technologies and Development, pp. 56–64.
doi: http://dx.doi.org/10.1145/2160673.2160681, accessed 23 July 2015.

V. Frias-Martinez and J. Virseda, 2012. “On the relationship between socio-economic factors and cell phone usage,” PICTD ’12: Proceedings of the Fifth International Conference on Information and Communication Technologies and Development, pp. 76–84.
doi: http://dx.doi.org/10.1145/2160673.2160684, accessed 23 July 2015.

J. Gettleman, 2015. Meant to keep malaria out, mosquito nets are used to haul fish in, New York Times (24 January), at http://www.nytimes.com/2015/01/25/world/africa/mosquito-nets-for-malaria-spawn-new-epidemic-overfishing.html, accessed 23 July 2015.

R. Gomez, L.F. Baron, and B. Fiore-Silfvast, 2012. “The changing field of ICTD: Content analysis of research published in selected journals and conferences, 2000-2010,” ICTD ’ 12: Proceedings of the Fifth International Conference on Information and Communication Technologies and Development, pp. 65–74.
doi: http://dx.doi.org/10.1145/2160673.2160682, accessed 23 July 2015.

J.M. Greer, 2005. “How civilizations fall: A theory of catabolic collapse,” at http://ecoshock.org/transcripts/greer_on_collapse.pdf, accessed 23 July 2015.

C. Hartung, A. Lerer, Y. Anokwa, C. Tseng, W. Brunette, and G. Borriello, 2010. “Open data kit: Tools to build information services for developing regions,” ICTD ’10: Proceedings of the 4th ACM/IEEE International Conference on Information and Communication Technologies and Development, article number 18.
doi: http://dx.doi.org/10.1145/2369220.2369236, accessed 23 July 2015.

R. Heeks, 2008. “ICT4D 2.0: The next phase of applying ICT for international development,” Computer, volume 41, number 6, pp. 26–33.
doi: http://dx.doi.org/10.1109/MC.2008.192, accessed 23 July 2015.

R. Heeks, 2002. “Information systems and developing countries: Failure, success, and local improvisations,” Information Society volume 18, number 2, pp. 101–112.
doi: http://dx.doi.org/10.1080/01972240290075039, accessed 23 July 2015.

R. Heeks and A. Robinson, 2013. “Ultra-low-cost computing and developing countries,” Communications of the ACM, volume 56, number 8, pp. 22–24.
doi: http://dx.doi.org/10.1145/2492007.2492016, accessed 23 July 2015.

S.J. Jackson, S.I. Ahmed, and M.R. Rifat, 2014. “Learning, innovation, and sustainability among mobile phone repairers in Dhaka, Bangladesh,” DIS ’14: Proceedings of the 2014 Conference on Designing Interactive Systems, pp. 905–914.
doi: http://dx.doi.org/10.1145/2598510.2598576, accessed 23 July 2015.

D.L. Johnson, E.M. Belding, K. Almeroth, and G. van Stam, 2010. “Internet usage and performance analysis of a rural wireless network in Macha, Zambia,” Proceedings of the Fourth ACM Workshop on Networked Systems for Developing Regions, article number 7.
doi: http://dx.doi.org/10.1145/1836001.1836008, accessed 23 July 2015.

K.L. Kraemer, J. Dedrick, and P. Sharma, 2009. “One laptop per child: Vision vs. reality,” Communications of the ACM, volume 52, number 6, pp. 66–73.
doi: http://dx.doi.org/10.1145/1516046.1516063, accessed 23 July 2015.

R. Kuriyan, K. Toyama, and I. Ray, 2006. “Integrating social development and financial sustainability: The challenges of rural computer kiosks in Kerala,” ICTD ’06: International Conference on Information and Communication Technologies and Development, pp. 121–130.
doi: http://dx.doi.org/10.1109/ICTD.2006.301849, accessed 23 July 2015.

L.D. Li and J. Chen, 2013. “TroTro: Web browsing and user interfaces in rural Ghana,” ICTD ’13: Proceedings of the Sixth International Conference on Information and Communication Technologies and Development: Full Papers, volume 1, pp. 185–194.
doi: http://dx.doi.org/10.1145/2516604.2516609, accessed 23 July 2015.

F. Librero, A.J. Ramos, A. I. Ranga, J. Triñona, and D. Lambert, 2007. “Uses of the cell phone for education in the Philippines and Mongolia,” Distance Education, volume 28, number 2, pp. 231–244.
doi: http://dx.doi.org/10.1080/01587910701439266, accessed 23 July 2015.

R. Luk, M. Zaharia, M. Ho, B. Levine, and P.M. Aoki, 2009. “ICTD for healthcare in Ghana: Two parallel case studies,” ICTD ’09: Proceedings of the Third International Conference on Information and Communication Technologies and Development, pp. 118–128.

I. Medhi, S. Patnaik, E. Brunskill, S.N. Nagasena Gautama, W. Thies, and K. Toyama, 2011. “Designing mobile interfaces for novice and low-literacy users,” ACM Transactions on Computer-Human Interaction (TOCHI), volume 18, number 1, article number 2.
doi: http://dx.doi.org/10.1145/1959022.1959024, accessed 23 July 2015.

I. Medhi, A. Sagar, and K. Toyama, 2007. “Text-free user interfaces for illiterate and semi-literate users,” Information Technologies and International Development, volume 4, number 1, pp. 37–50, and at http://itidjournal.org/itid/article/viewFile/243/113, accessed 23 July 2015.

T. Mulgan, 2011. Ethics for a broken world: Imagining philosophy after catastrophe. Montreal: McGill-Queen’s University Press.

M. Natarajan and T. Parikh, 2013. “Understanding barriers to information access and disclosure for HIV+ women,” ICTD ’13: Proceedings of the Sixth International Conference on Information and Communication Technologies and Development: Full Papers, volume 1, pp. 143–152.
doi: http://dx.doi.org/10.1145/2516604.2516627, accessed 23 July 2015.

One Laptop per Child, 2009. “One laptop per child overview,” at http://www.olpcnews.com/files/One_Laptop_Per_Child_Overview_2009.pdf, accessed 23 July 2015.

J. Pal, T. Ammari, R. Mahalingam, A.M.H. Alfaro, and M. Lakshmanan, 2013. “Marginality, aspiration and accessibility in ICTD,” ICTD ’13: Proceedings of the Sixth International Conference on Information and Communication Technologies and Development: Full Papers, volume 1, pp. 68–78.
doi: http://dx.doi.org/10.1145/2516604.2516623, accessed 23 July 2015.

T.S. Parikh, P. Javid, K. Ghosh, and K. Toyama, 2006. “Mobile phones and paper documents: Evaluating a new approach for capturing microfinance data in rural india,” CHI ’06: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 551–560.
doi: http://dx.doi.org/10.1145/1124772.1124857, accessed 23 July 2015.

R. Patra, J. Pal, and S. Nedevschi, 2009. “ICTD state of the union: Where have we reached and where are we headed,” 2009 International Conference on Information and Communication Technologies and Development (ICTD), pp. 357–366.
doi: http://dx.doi.org/10.1109/ICTD.2009.5426693, accessed 23 July 2015.

A. Pentland, R. Fletcher, and A. Hasson, 2004. “DakNet: Rethinking connectivity in developing nations,” Computer, volume 37, number 1, pp. 78–83.
doi: http://dx.doi.org/10.1109/MC.2004.1260729, accessed 23 July 2015.

B. Raghavan and J. Ma, 2011. “Networking in the long emergency,” GreenNets ’11: Proceedings of the Second ACM SIGCOMM Workshop on Green Networking, pp. 37–42.
doi: http://dx.doi.org/10.1145/2018536.2018545, accessed 23 July 2015.

N. Rangaswamy and M. Densmore, 2013. “Understanding Jugaad: ICTD and the tensions of appropriation, innovation and utility,” ICTD ’13: Proceedings of the Sixth International Conference on Information and Communications Technologies and Development: Notes, volume 2, pp. 120–123.
doi: http://dx.doi.org/10.1145/2517899.2517938, accessed 23 July 2015.

N. Rangaswamy and E. Cutrell, 2012. “Anthropology, development and ICTs: Slums, youth and the mobile Internet in urban India,” ICTD ’12: Proceedings of the Fifth International Conference on Information and Communication Technologies and Development, pp. 85–93.
doi: http://dx.doi.org/10.1145/2160673.2160685, accessed 23 July 2015.

A.A. Raza, M. Pervaiz, C. Milo, S. Razaq, G. Alster, J. Sherwani, U. Saif, and R. Rosenfeld, 2012. “Viral entertainment as a vehicle for disseminating speech-based services to low-literate users,” ICTD ’12: Proceedings of the Fifth International Conference on Information and Communication Technologies and Development, pp. 350–359.
doi: http://dx.doi.org/10.1145/2160673.2160715, accessed 23 July 2015.

C. Rey-Moreno, Z. Roro, W.D. Tucker, and M.J. Siya, 2013. “Community-based solar power revenue alternative to improve sustainability of a rural wireless mesh network,” ICTD ’13: Proceedings of the Sixth International Conference on Information and Communications Technologies and Development: Notes , volume 2, pp. 132–135.
doi: http://dx.doi.org/10.1145/2517899.2517912, accessed 23 July 2015.

N. Sambasivan and T. Smyth, 2010. “The human infrastructure of ICTD,” ICTD ’10: Proceedings of the Fourth ACM/IEEE International Conference on Information and Communication Technologies and Development, article number 40.
doi: http://dx.doi.org/10.1145/2369220.2369258, accessed 23 July 2015.

Z.J. Smith, K. Chu, A.R. Espenson, M. Rahimzadeh, A. Gryshuk, M. Molinaro, D.M. Dwyre, S. Lane, D. Matthews, and S. Wachsmann-Hogiu, 2011. “Cell-phone-based platform for biomedical device development and education applications,” PLoS One, volume 6, number 3, e17150.
doi: http://dx.doi.org/10.1371/journal.pone.0017150, accessed 23 July 2015.

K. Starbird and L. Palen, 2011. “‘Voluntweeters’: Self-organizing by digital volunteers in times of crisis,” CHI ’11: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 1,071–1,080.
doi: http://dx.doi.org/10.1145/1978942.1979102, accessed 23 July 2015.

W. Thies, J. Prevost, T. Mahtab, G.T. Cuevas, S. Shakhshir, A. Artola, B.D. Vo, Y. Litvak, S. Chan, S. Henderson, M. Halsey, L. Levison, and S. Amarasinghe, 2002. “Searching the World Wide Web in low-connectivity communities,” Proceedings of the Eleventh International World Wide Web Conference, at http://wwwconference.org/proceedings/www2002/alternate/714/index.html, accessed 23 July 2015.

B. Tomlinson, M. Silberman, D. Patterson, Y. Pan, and E. Blevis, 2012. “Collapse informatics: Augmenting the sustainability & ICT4D discourse in HCI,” CHI ’12: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 655–664.
doi: http://dx.doi.org/10.1145/2207676.2207770, accessed 23 July 2015.

K. Toyama, 2011. “Technology as amplifier in international development,” iConference ’11: Proceedings of the 2011 iConference, pp. 75–82.
doi: http://dx.doi.org/10.1145/1940761.1940772, accessed 23 July 2015.

K. Toyama and M.B. Dias, 2008. “Information and communication technologies for development,” Computer, volume 41, number 6, pp. 22–25.
doi: http://dx.doi.org/10.1109/MC.2008.193, accessed 23 July 2015.

H. Underwood, S.R. Sterling, and J.K. Bennett, 2013. “The design and implementation of the PartoPen maternal health monitoring system,” ACM DEV ’13: Proceedings of the Third ACM Symposium on Computing for Development, article number 8.
doi: http://dx.doi.org/10.1145/2442882.2442893, accessed 23 July 2015.

A. Vashistha and W. Thies, 2012. “IVR junction: Building scalable and distributed voice forums in the developing world,” Sixth USENIX/ACM Workshop on Networked Systems for Developing Regions, at https://www.usenix.org/node/181017, accessed 23 July 2015.

D. Zurovac, A.O. Talisuna, and R.W. Snow, 2012. “Mobile phone text messaging: Tool for malaria control in Africa,” PLoS medicine, volume 9, number 2, e1001176.
doi: http://dx.doi.org/10.1371/journal.pmed.1001176, accessed 23 July 2015.

 


Editorial history

Received 15 July 2015; accepted 23 July 2015.


Creative Commons License
This paper is in the Public Domain.

Computing within limits and ICTD
by Jay Chen.
First Monday, Volume 20, Number 8 - 3 August 2015
https://firstmonday.org/ojs/index.php/fm/article/download/6124/4843
doi: http://dx.doi.org/10.5210/fm.v20i8.6124