Digital Policy, Regulation and Governance
- Emerald Group Publishing Limited
- Publication date:
- Nbr. 22-1, January 2020
- Nbr. 21-6, September 2019
- Nbr. 21-5, August 2019
- Nbr. 21-4, June 2019
- Nbr. 21-3, May 2019
- Nbr. 21-2, March 2019
- Nbr. 21-1, January 2019
- Nbr. 20-6, September 2018
- Nbr. 20-5, August 2018
- Nbr. 20-4, June 2018
- Nbr. 20-3, May 2018
- Nbr. 20-2, March 2018
- Nbr. 20-1, January 2018
- Nbr. 19-6, September 2017
- Nbr. 19-5, August 2017
- Nbr. 19-4, June 2017
- Nbr. 19-3, May 2017
- Nbr. 19-2, March 2017
- Nbr. 19-1, January 2017
- Huawei and goodbye. A regular column on the information industries
- Explaining the determinants of continual use of mobile financial services
Purpose: Information system continuance model has been used in a number of studies to explain information system continuance in different contexts. However, very little research attention has been given to continuous use of mobile financial services (MFS). The purpose of this study is to fill this research gap by identifying the main factors that influence the continual use of MFS. Design/methodology/approach: A sample was randomly taken from MFS registered accounts or mobile wallets. A five-point Likert scale survey was conducted in Ghana. Structural equation modelling was used to test the data. Constructs such as continual use, satisfaction, perceived usefulness and confirmation were adapted from information system continuance model to suit the requirement of MFS. A pilot study was then carried out after the questionnaire was developed to gauge the appropriateness of the survey questions. Findings: Results from the survey indicated that user satisfaction has the greatest impact on the continual use of mobile financial services. Good agent quality and satisfaction were the second most influential determinant. Satisfaction was, in turn, confirmed to be determined by perceived usefulness. Another important contributor to MFS continual use was found to be perceived ease of use (PEOU) with an impact surprisingly higher than that of perceived usefulness. There was a significant impact of good agent quality on satisfaction, which could be attributed to the characteristics of the technology for the study. Research limitations/implications: Although a relatively high R2 (71%) was indicated by the proposed model, there is need for additional factors to be identified to improve the ability to predict and explain the continual use of MFS. A longitudinal study would have enhanced the identification of determinants and the understanding of their inter-relationships to influence MFS continual use. Practical implications: To ensure continual use of MFS, PEOU as identified by the study is important to ensure that customers can use the service with little effort. Good agent quality can promote PEOU in the sense that competent agents can render relevant tutorials to customers’ right after the registration process. This will address a major barrier to continual use, which is the lack of understanding of how MFS operate. Social implications: This study contributes to ensuring financial inclusion such that the unbanked can have access to financial services and also improve digital inclusion. Originality/value: The study provides empirical evidence to support the substantive differences between acceptance and continual use behaviours, integrating the constructs of good agent quality and PEOU into our understanding of information system continual use literature. The authors also theorized and evaluated a model of MFS continual use.
- IT governance enablers in relation to IoT implementation: a systematic literature review
Purpose: The purpose of this paper is to obtain a list of recommendations addressed by the information technology (IT) governance enablers in relation to IoT implementation. The reason behind this it is the lack of information about these instances which could the organizations to be more effective when implementing IoT. Design/methodology/approach: The objectives will be obtained using the methodology – systematic literature review. Findings: During the research, a list of recommendations was created on each IT governance enabler in relation to IoT implementation, showing the flaws that exist at the literature level for each enabler. Originality/value: The state of art of this research is a creation of a list of recommendations according to IT governance enablers to be applied on an IoT implementation.
- The ontology of digital asset after death: policy complexities, suggestions and critique of digital platforms
Purpose: The digitization of the life has brought complexities associated with addressing digital life after one’s death. This paper aims to investigate the two related issues of the privacy and property of postlife digital assets. Design/methodology/approach: The understanding of digital assets has not been fully unpacked largely due to the current policy complexities in accessing and obtaining digital assets at death. This paper calls critical attention to the importance of respecting user rights in digital environments that currently favor service providers’ interests. Findings: It is argued that there are ethical blind spots when protecting users’ rights, given no ontological difference between a person’s digital beings and physical existence. These derive from the restrictive corporate terms and ambiguous conditions drafted by digital service providers. Originality/value: Fundamentally, the transition to the big data era, in which the collection, use and dissemination of digital activities became integral part of the ontology, poses new challenges to privacy and property rights after death.
- New players in the music industry: lifeboats or killer whales? the role of streaming platforms
- The strange case of US v. ZTE: a prosecution, a ban, a fine and a presidential intervention
Purpose: The purpose of this paper is to review the prosecution by US authorities of Zhongxing Telecommunication Equipment (ZTE) Corporation for its violation of sanctions against the sale of systems to Iran and North Korea; the violation of the plea agreement; and, following presidential intervention, the imposition of a further fine and restructuring of its management. Design/methodology/approach: An analysis of the materials used in court proceedings and speeches by officials in the case against ZTE Findings: The US president intervened in a quasi-judicial matter in which a foreign firm had violated US sanctions that he had supported to lessen the penalties it faced. The firm had also violated its plea agreement. This personal intervention weakened enforcement of US sanctions on human rights and weapons of mass destruction (WMD). However, it revealed the excessive reliance of Chinese manufacturers on US-domiciled suppliers of semiconductors and software. Research limitations/implications: Neither was access to Chinese documents possible nor would it have been practicable to interview managers at ZTE. Practical implications: Enforcement of US sanctions on the sale of telecommunications equipment have now been moved from strict enforcement on matters of human rights and WMD into political, trade and even personal negotiations with the US president. Originality/value: A first analysis of a telecommunications sanctions case.
- Have we reached peak 4G?. A regular column on the information industries
- A model for assessing the impact of cloud computing on the success of customer relationship management systems (case study: agricultural companies)
Purpose: Nowadays, communications, products, services and costs are customized through the internet technology. The main theory to continue competitiveness in the organizations is customer relationship management (CRM). CRM enables organizations to efficiently interact with customers and gather, store and examine their data for providing a complete view of them. On the other hand, the subject of cloud computing has increasingly become the bridge for the success of the CRM implementation. Therefore, this study aims to investigate the impact of cloud computing (new cloud facility, knowledge of information technology (IT), cloud security and cost) on the success of CRM systems. Design/methodology/approach: The model and the questioners-based data are analyzed using the Smart PLS 3.0. The data were gathered based on 80 employees of three main agricultural companies in Iran. Findings: The obtained results have indicated that all of the considered factors, new cloud facilities, knowledge of IT, cloud security and cost, play an important role in CRM systems’ success. Also, the evaluation and examination of the consistency and validity of the model are performed through the structural equation model. Research limitations/implications: First, the authors have conducted a study in a single region. It cannot be guaranteed that the results can be generalized to other regions. Second, for this cross-sectional study, the research design was conducted that showed constant relationships between variables. The research done for this study is cross-sectional. Third, because of time and financial restrictions, the authors have gathered data using a sample from a single location. Originality/value: Proposing a new model for investigating of the impact of cloud computing (new cloud facility, knowledge of Information Technology (IT), cloud security and cost) on the success of CRM systems is the main originality of this paper.
- “Soft law” and innovations: empirical analysis of ICO-related statements
Purpose: The purpose of the paper is to explore the initial coin offering (ICO) statements as “soft law” instrument used to regulate disruptive innovations. Design/methodology/approach: The research is based on the qualitative content analysis of 40 ICO statements issued by regulators in 37 countries by applying a custom-made coding table. Findings: The research shows that “soft law” is used predominantly by high-capacity jurisdictions. “Soft law” allows for more flexibility and less technological and business neutrality. The findings also show the contradiction between empirical evidence and public sentiment: it seems that the widespread notion that virtual currencies have connotations with money laundering/financing of terrorism (ML/FT) is not shared by the regulators, who are more concerned by the fraud. Finally, it was found that the standard-setting bodies are lagging behind in providing guidance on the emergence technologies. Research limitations/implications: The content analysis is based on 40 statements, which is a limited set of data. The method might be subject to interpersonal bias, although arrangements were made to ensure the uniformity of coding process. Practical implications: The findings imply that soft law is an attractive risk-mitigation tool when the object of regulation is still evolving but the risks are present. Soft law also might contradict with the “technology and business neutrality” principle which requires further research. Finally, the findings show the need for more active involvement of the standard setting bodies. Originality/value: This is the first in-depth research of the ICO-related statements as “soft law” instruments. It also offers a new perspective on the issue of financial innovations regulation.
- The benefits and challenges of general data protection regulation for the information technology sector
Purpose: The implementation of European data protection is a challenge for businesses and has imposed legal, technical and organizational changes for companies. This study aims to explore the benefits and challenges that companies operating in the information technology (IT) sector have experienced in applying the European data protection. Additionally, this study aims to explore whether the benefits and challenges faced by these companies were different considering their dimension and the state of implementation of the regulation. Design/methodology/approach: This study adopts a quantitative methodology, based on a survey conducted with Portuguese IT companies. The survey is composed of 30 questions divided into three sections, namely, control data; assessment; and benefits and challenges. The survey was created on Google Drive and distributed among Portuguese IT companies between March and April of 2019. The data were analyzed using the Stata software using descriptive and inferential analysis techniques using the ANOVA one-way test. Findings: A total of 286 responses were received. The main benefits identified by the application of European data protection include increased confidence and legal clarification. On the other hand, the main challenges include the execution of audits to systems and processes and the application of the right to erasure. The findings allow us to conclude that the state of implementation of the general data protection regulation (GDPR), and the type of company are discriminating factors in the perception of benefits and challenges. Research limitations/implications: This study has essentially practical implications. Based on the synthesis of the benefits and challenges posed by the adoption of European data protection, it is possible to assess the relative importance and impact of the benefits and challenges faced by companies in the IT sector. However, this study does not explore the type of challenges that are placed at each stage of the adoption of European data protection and does not take into account the specificities of the activities carried out by each of these companies. Originality/value: The implementation of the GDPR is still in an initial phase. This study is pioneering in synthesizing the main benefits and challenges of its adoption considering the companies operating in the IT sector. Furthermore, this study explores the impact of the size of the company and the status of implementation of the GDPR on the perception of the established benefits and challenges.
- Data flows and the digital economy: information as a mobile factor of production
Purpose: This paper aims to analyze the direction and balance of transnational information flows and look at how nonpriced digital information exchanges related to international trade in goods and services. Design/methodology/approach: The authors obtained quantitative data about Web-related data...
- Factors influencing e-government adoption in India: a qualitative approach
Purpose: The purpose of this study is to explore the factors that enable citizens to adopt e-government services in India. Design/methodology/approach: The study uses a qualitative approach by conducting semi-structured interviews. Findings: The study reveals novel e-government adoption factors,...
- High-speed data provision by mobile networks in the Asia-Pacific region
Purpose: The purpose of this paper is to examine in a fully up-to-date manner the position in respect to the licensing and launch of long-term evolution (LTE) in a region that attracts relatively little attention when treated as a whole because the emphasis is usually upon the very large individual ...
- Modelling small cell deployments within a macrocell
Purpose: Small cells, or microcells, are often seen as a way to substantially enhance the capacity of cellular networks. Previous assumptions have been that by deploying a dense layer of small cells within a macrocell, capacity can be improved by an order of magnitude or more. However, there are...
- Restrained by design: the political economy of cybersecurity
Purpose: The empirical record of cyberattacks features much computer crime, espionage and hacktivism, but none of the major damage feared in prevalent threat narratives. The purpose of this article is to explain the absence of serious adverse consequences to date and the durability of this trend. D...
- The mystery of 5G for network operators. A regular column on the information industries
- Wireless technologies and policies for connecting rural areas in emerging countries: a case study in rural Peru
Purpose: This paper aims to compare the costs of deploying different wireless terrestrial broadband technologies in the Andes and Amazon Regions of Peru. These areas are representatives of different and challenging geographic regions throughout the globe that currently are severely underserved or...
- 600 MHz auction leaves FCC red-faced. A regular column on the information industries
- Degrees of separation: the case of BT. A regular column on the information industries
- Factors inhibiting the internet adoption by base of the pyramid in India
Purpose: This paper aims to explore the factors inhibiting the internet adoption among base of pyramid (BoP) and to develop further insights of such factors. Design/methodology/approach: Researchers used a mixed-method study with QUAL/QUAN sequence in this research. Given the dearth of research on ...