Ramesh SubramanianQuinnipiac University | QU · Department of Computer Information Systems
Ramesh Subramanian
About
20
Publications
3,080
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
166
Citations
Publications
Publications (20)
This paper examines India’s experience in developing national Internet policy by focusing on
interactions among stakeholders in the Internet governance process. The paper begins by tracing
the history of telecom policies in India along with the development of its IT sector as well as its
civil society. It identifies the tensions, opportunities and...
This paper examines India’s experience in developing national Internet policy by focusing on interactions among stakeholders in the Internet governance process. The paper begins by tracing the history of telecom policies in India along with the development of its IT sector as well as its civil society. It identifies the tensions, opportunities and...
The present study attempts to ascertain the relationship between inadequate sanitation facilities and two key measures of the economic well-being of women in India: literacy rates and labor force participation rates. A two-stage regression model and correlation analysis are employed. All data is district-level for the year 2011. Results from a simp...
This article looks at India's IT industry history in the 1970s and early 1980s by focusing on the development of an indigenous microcomputer by the Hindustan Computers Limited (HCL). After gaining independence in 1947, the Indian government embarked on a program that focused on economic development, albeit with a socialist theme and central plannin...
The United States federal government faces a major challenge as it attempts tosecure the nation’s resources and critical infrastructure: the politics and powerrelationships that form the essence of its very body. Implementing security in anyorganization will affect the power relationships within that organization (Lapke and Dhillon, 2008) and the f...
Starr Roxanne Hiltz, a sociologist, has carved for herself an important place in the history of computing. Starr Roxanne Hiltz was born on a US Army base in Little Rock, Arkansas, on 7 September 1942 to parents of German ancestry. She saw rural, urban, religious, and social classes and became acutely aware of the differences. This got her intereste...
Information systems permeate every aspect of society, requiring IS professionals to acquire a wide perspective on how information systems shape society and vice versa. This notion has ramifications for IS curricula in universities everywhere. We believe that collegiate IS curricula would enhance currency and relevance by broadening their coverage t...
In 1971 Murray Turoff, a computer scientist working in the Office of Emergency Preparedness, Executive Offices of the President of the United States, was tasked with developing an electronic information and communication system to aid the US government's response to emergencies. The resulting Emergency Management Information System and Reference In...
The Internet has, within a period of twenty years, become the primary medium of information exchange in the world. It is also arguably the primary source of information in the world. Search engines such as Google and Yahoo have made the vast trove of information available and accessible to everybody. Email and social network applications such as Fa...
After the September 11 terrorist attacks in New York, the impetus for guarding the United States against various types of future attacks gained momentum in the public consciousness and in the political spheres. Homeland Security laws were passed. A new department of Homeland Security (DHS) was created. Cyber security was one of the missions of the...
Much is discussed about privacy laws in developed economies such as The US, EU, Japan, Canada, and Australia. However, not many studies have focused on privacy laws that are evolving in emerging economies such as India. As the economy becomes global and companies resort to global outsourcing, much of the data of clients, customers and common citize...
The growth in the IT field has redefined the role of the IT manager. The furious pace of growth in global commerce facilitated by the Internet has led to greater governmental role in controlling and regulating E-commerce. Developments in technology have also led to a trend towards digitization of personal, commercial and governmental data. All of t...
The intersection of politics, law, privacy, and security in the context of computer technology is both sensitive and complex. Computer viruses, worms, Trojan horses, spy-ware, computer exploits, poorly designed software, inadequate technology laws, politics and terrorism-all of these have a profound effect on our daily computing operations and habi...
This paper looks at the nature and current state of evolution of privacy laws in India. India is an emerging economy, but
the Indian ITeS environment has already emerged into a mature and highly competitive destination to outsource a variety of
business processes from technically advanced nations. There is, however, a tension that exists between th...
This article uses a historical and critical perspective to analyze the growth of India's IT industry. India's quest for technology development in the pre- and post independent period of its history is analyzed. Its history, colonial past, culture, entrepreneurship climate, educational facilities and IT diffusion are all examined within this umbrell...
This paper describes a study of soft-skills training at a large Business Process Outsourcing Firm located in Bangalore, India. Soft-skills training pertains to social and customer handling skills in addition to cultural sensitization of Indians to other cultures. Soft-skills are very important for the success of BPO firms, yet there is not much in...
This paper analyzes the emergence and development of cyberlaws. In many countries around the world, cyberlaws are being enacted in order to curb or prosecute cybercriminals. Cybercriminals have very rapidly adapted to developments in technology, specifically Internet technology, and use its characteristics of transience, anonymity, speed and vast s...
In the IS 2002 model curriculum, course IS2002.9 is entitled "Physical Design and Implemen- tation in Emerging Environments." As academics who have worked in a high-tech environ- ments periodically for several years, we have experienced first-hand the disconnect that exists between IS education and practice. This paper looks at some of the "hot" is...
This paper traces the evolution of India's Telecommunications policies from its colonial days to the present time. The policies have undergone major shifts. During the British rule of India, the policies were strictly motivated by the colonizer's need to control the native population. After independence, the policies were dictated by the need for s...
Social Media and Web 2.0 technologies are enjoying tremendous popularity at the current time. The increasing bandwidth for networked communication, as well as increased computer processing power have enabled the introduction of smaller and smaller network communications devices aimed at the end user – be they smart mobile phones, or net-books, or t...