Enter your keyword

2-s2.0-84919327181

[vc_empty_space][vc_empty_space]

Technological solution for vulnerable communities: Reverse engineering below the radar

Sianipar C.P.M.a,b, Yudoko G.a, Adhiutama A.a

a School of Business and Management (SBM), Institut Teknologi Bandung (ITB), West Java, 40132, Indonesia
b Department of Industrial Administration (IA), Tokyo University of Science (TUS), Chiba, 278-0027, Japan

[vc_row][vc_column][vc_row_inner][vc_column_inner][vc_separator css=”.vc_custom_1624529070653{padding-top: 30px !important;padding-bottom: 30px !important;}”][/vc_column_inner][/vc_row_inner][vc_row_inner layout=”boxed”][vc_column_inner width=”3/4″ css=”.vc_custom_1624695412187{border-right-width: 1px !important;border-right-color: #dddddd !important;border-right-style: solid !important;border-radius: 1px !important;}”][vc_empty_space][megatron_heading title=”Abstract” size=”size-sm” text_align=”text-left”][vc_column_text]© 2014 American Scientific Publishers All rights reserved.Both scholarly communities and practitioners have begun to emphasize vulnerability eradication as the fundamental purpose of their works to support the survivability of developing communities all over the world. In their missions, technology has become a complete solution to which they integrate scientific perspectives into a single package of interdisciplinary solution in achieving their purpose. In facts, approach to develop a technological solution for vulnerable community does matter; however, the precise research gap has not been investigated to be the foundation of future researches on developing the right approach in establishing such solution. This study is simply purposed to investigate the research gap. The gap is revealed by investigating scholarly discussions on related issues particularly on technological changes and technological appropriateness. This study concludes that reverse engineering is potential to be the right approach as it has the right design principles to conduct both technological adaptation and Appropriate Technology at the same time. The scope of research and positioning among related issues in doing research on reverse engineering for vulnerability eradication are also proposed. Then, in the end of this brief study research insights and potential paradigms are provided as the foundation of our future works.[/vc_column_text][vc_empty_space][vc_separator css=”.vc_custom_1624528584150{padding-top: 25px !important;padding-bottom: 25px !important;}”][vc_empty_space][megatron_heading title=”Author keywords” size=”size-sm” text_align=”text-left”][vc_column_text][/vc_column_text][vc_empty_space][vc_separator css=”.vc_custom_1624528584150{padding-top: 25px !important;padding-bottom: 25px !important;}”][vc_empty_space][megatron_heading title=”Indexed keywords” size=”size-sm” text_align=”text-left”][vc_column_text]Appropriate technology,Reverse engineering,Technological solution,Vulnerability eradication[/vc_column_text][vc_empty_space][vc_separator css=”.vc_custom_1624528584150{padding-top: 25px !important;padding-bottom: 25px !important;}”][vc_empty_space][megatron_heading title=”Funding details” size=”size-sm” text_align=”text-left”][vc_column_text][/vc_column_text][vc_empty_space][vc_separator css=”.vc_custom_1624528584150{padding-top: 25px !important;padding-bottom: 25px !important;}”][vc_empty_space][megatron_heading title=”DOI” size=”size-sm” text_align=”text-left”][vc_column_text]https://doi.org/10.1166/asl.2014.5726[/vc_column_text][/vc_column_inner][vc_column_inner width=”1/4″][vc_column_text]Widget Plumx[/vc_column_text][/vc_column_inner][/vc_row_inner][/vc_column][/vc_row][vc_row][vc_column][vc_separator css=”.vc_custom_1624528584150{padding-top: 25px !important;padding-bottom: 25px !important;}”][/vc_column][/vc_row]