Digital Policy, Regulation and Governance
- Emerald Group Publishing Limited
- Publication date:
- Nbr. 22-1, January 2020
- Nbr. 21-6, September 2019
- Nbr. 21-5, August 2019
- Nbr. 21-4, June 2019
- Nbr. 21-3, May 2019
- Nbr. 21-2, March 2019
- Nbr. 21-1, January 2019
- Nbr. 20-6, September 2018
- Nbr. 20-5, August 2018
- Nbr. 20-4, June 2018
- Nbr. 20-3, May 2018
- Nbr. 20-2, March 2018
- Nbr. 20-1, January 2018
- Nbr. 19-6, September 2017
- Nbr. 19-5, August 2017
- Nbr. 19-4, June 2017
- Nbr. 19-3, May 2017
- Nbr. 19-2, March 2017
- Nbr. 19-1, January 2017
- Huawei and goodbye. A regular column on the information industries
- Explaining the determinants of continual use of mobile financial services
Purpose: Information system continuance model has been used in a number of studies to explain information system continuance in different contexts. However, very little research attention has been given to continuous use of mobile financial services (MFS). The purpose of this study is to fill this research gap by identifying the main factors that influence the continual use of MFS. Design/methodology/approach: A sample was randomly taken from MFS registered accounts or mobile wallets. A five-point Likert scale survey was conducted in Ghana. Structural equation modelling was used to test the data. Constructs such as continual use, satisfaction, perceived usefulness and confirmation were adapted from information system continuance model to suit the requirement of MFS. A pilot study was then carried out after the questionnaire was developed to gauge the appropriateness of the survey questions. Findings: Results from the survey indicated that user satisfaction has the greatest impact on the continual use of mobile financial services. Good agent quality and satisfaction were the second most influential determinant. Satisfaction was, in turn, confirmed to be determined by perceived usefulness. Another important contributor to MFS continual use was found to be perceived ease of use (PEOU) with an impact surprisingly higher than that of perceived usefulness. There was a significant impact of good agent quality on satisfaction, which could be attributed to the characteristics of the technology for the study. Research limitations/implications: Although a relatively high R2 (71%) was indicated by the proposed model, there is need for additional factors to be identified to improve the ability to predict and explain the continual use of MFS. A longitudinal study would have enhanced the identification of determinants and the understanding of their inter-relationships to influence MFS continual use. Practical implications: To ensure continual use of MFS, PEOU as identified by the study is important to ensure that customers can use the service with little effort. Good agent quality can promote PEOU in the sense that competent agents can render relevant tutorials to customers’ right after the registration process. This will address a major barrier to continual use, which is the lack of understanding of how MFS operate. Social implications: This study contributes to ensuring financial inclusion such that the unbanked can have access to financial services and also improve digital inclusion. Originality/value: The study provides empirical evidence to support the substantive differences between acceptance and continual use behaviours, integrating the constructs of good agent quality and PEOU into our understanding of information system continual use literature. The authors also theorized and evaluated a model of MFS continual use.
- IT governance enablers in relation to IoT implementation: a systematic literature review
Purpose: The purpose of this paper is to obtain a list of recommendations addressed by the information technology (IT) governance enablers in relation to IoT implementation. The reason behind this it is the lack of information about these instances which could the organizations to be more effective when implementing IoT. Design/methodology/approach: The objectives will be obtained using the methodology – systematic literature review. Findings: During the research, a list of recommendations was created on each IT governance enabler in relation to IoT implementation, showing the flaws that exist at the literature level for each enabler. Originality/value: The state of art of this research is a creation of a list of recommendations according to IT governance enablers to be applied on an IoT implementation.
- The ontology of digital asset after death: policy complexities, suggestions and critique of digital platforms
Purpose: The digitization of the life has brought complexities associated with addressing digital life after one’s death. This paper aims to investigate the two related issues of the privacy and property of postlife digital assets. Design/methodology/approach: The understanding of digital assets has not been fully unpacked largely due to the current policy complexities in accessing and obtaining digital assets at death. This paper calls critical attention to the importance of respecting user rights in digital environments that currently favor service providers’ interests. Findings: It is argued that there are ethical blind spots when protecting users’ rights, given no ontological difference between a person’s digital beings and physical existence. These derive from the restrictive corporate terms and ambiguous conditions drafted by digital service providers. Originality/value: Fundamentally, the transition to the big data era, in which the collection, use and dissemination of digital activities became integral part of the ontology, poses new challenges to privacy and property rights after death.
- The strange case of US v. ZTE: a prosecution, a ban, a fine and a presidential intervention
Purpose: The purpose of this paper is to review the prosecution by US authorities of Zhongxing Telecommunication Equipment (ZTE) Corporation for its violation of sanctions against the sale of systems to Iran and North Korea; the violation of the plea agreement; and, following presidential intervention, the imposition of a further fine and restructuring of its management. Design/methodology/approach: An analysis of the materials used in court proceedings and speeches by officials in the case against ZTE Findings: The US president intervened in a quasi-judicial matter in which a foreign firm had violated US sanctions that he had supported to lessen the penalties it faced. The firm had also violated its plea agreement. This personal intervention weakened enforcement of US sanctions on human rights and weapons of mass destruction (WMD). However, it revealed the excessive reliance of Chinese manufacturers on US-domiciled suppliers of semiconductors and software. Research limitations/implications: Neither was access to Chinese documents possible nor would it have been practicable to interview managers at ZTE. Practical implications: Enforcement of US sanctions on the sale of telecommunications equipment have now been moved from strict enforcement on matters of human rights and WMD into political, trade and even personal negotiations with the US president. Originality/value: A first analysis of a telecommunications sanctions case.
- New players in the music industry: lifeboats or killer whales? the role of streaming platforms
- Have we reached peak 4G?. A regular column on the information industries
- “Soft law” and innovations: empirical analysis of ICO-related statements
Purpose: The purpose of the paper is to explore the initial coin offering (ICO) statements as “soft law” instrument used to regulate disruptive innovations. Design/methodology/approach: The research is based on the qualitative content analysis of 40 ICO statements issued by regulators in 37 countries by applying a custom-made coding table. Findings: The research shows that “soft law” is used predominantly by high-capacity jurisdictions. “Soft law” allows for more flexibility and less technological and business neutrality. The findings also show the contradiction between empirical evidence and public sentiment: it seems that the widespread notion that virtual currencies have connotations with money laundering/financing of terrorism (ML/FT) is not shared by the regulators, who are more concerned by the fraud. Finally, it was found that the standard-setting bodies are lagging behind in providing guidance on the emergence technologies. Research limitations/implications: The content analysis is based on 40 statements, which is a limited set of data. The method might be subject to interpersonal bias, although arrangements were made to ensure the uniformity of coding process. Practical implications: The findings imply that soft law is an attractive risk-mitigation tool when the object of regulation is still evolving but the risks are present. Soft law also might contradict with the “technology and business neutrality” principle which requires further research. Finally, the findings show the need for more active involvement of the standard setting bodies. Originality/value: This is the first in-depth research of the ICO-related statements as “soft law” instruments. It also offers a new perspective on the issue of financial innovations regulation.
- A model for assessing the impact of cloud computing on the success of customer relationship management systems (case study: agricultural companies)
Purpose: Nowadays, communications, products, services and costs are customized through the internet technology. The main theory to continue competitiveness in the organizations is customer relationship management (CRM). CRM enables organizations to efficiently interact with customers and gather, store and examine their data for providing a complete view of them. On the other hand, the subject of cloud computing has increasingly become the bridge for the success of the CRM implementation. Therefore, this study aims to investigate the impact of cloud computing (new cloud facility, knowledge of information technology (IT), cloud security and cost) on the success of CRM systems. Design/methodology/approach: The model and the questioners-based data are analyzed using the Smart PLS 3.0. The data were gathered based on 80 employees of three main agricultural companies in Iran. Findings: The obtained results have indicated that all of the considered factors, new cloud facilities, knowledge of IT, cloud security and cost, play an important role in CRM systems’ success. Also, the evaluation and examination of the consistency and validity of the model are performed through the structural equation model. Research limitations/implications: First, the authors have conducted a study in a single region. It cannot be guaranteed that the results can be generalized to other regions. Second, for this cross-sectional study, the research design was conducted that showed constant relationships between variables. The research done for this study is cross-sectional. Third, because of time and financial restrictions, the authors have gathered data using a sample from a single location. Originality/value: Proposing a new model for investigating of the impact of cloud computing (new cloud facility, knowledge of Information Technology (IT), cloud security and cost) on the success of CRM systems is the main originality of this paper.
- Regulating mediators of internet piracy: P2P websites and cyberlockers
Purpose: Contemporary copyright infringement has significantly changed in the digital era, and because of the unique attributes of internet piracy and method of exchange, traditional regulatory approaches are ineffective. The characteristics of digital goods enable users to almost costlessly copy and exchange content. Much of the contemporary research fails to incorporate the necessary components of exchange that are central to digital piracy. This paper aims to examine the role of peer-to-peer network hosts and the often-omitted cyberlocker. Design/methodology/approach: A simple framework is constructed that describes how these entities how these entities facilitate digital piracy and operate financially. This framework illustrates the objectives of piracy mediators, highlighting the avenues by which regulation can craft policy. Additional examination of online piracy highlights the challenges of contemporary policy to combat digital piracy due to the secondary consequences. Findings: Recent policies, aimed at diminishing piracy, would infringe on consumers’ privacy, hurt business finances or strategically used by rivals to hurt the operations of legal entities. Trying to prevent illegal sources (or facilitators) of pirate goods from providing access to files continues to be challenging. In many instances, the blurry line between a legal platform for file exchange and a piracy haven creates significant regulatory problems. For known piracy promoters (host sites or cyberlockers), location and revenue streams continue to limit direct intervention. Originality/value: This paper discusses the necessary path for piracy to occur by including previously omitted agents necessary for communication and/or distribution. My analysis incorporates these entities that facilitate piracy and the unique features of digital exchange, which has industrial and regulatory implications. Furthermore, my results highlight why regulators have been ineffective in crafting meaningful anti-piracy policy.
- AI’s path to the present and the painful transitions along the way
Purpose: Artificial intelligence (AI) is likely to have a significant impact on work. It will enhance, but also displace, some professions. This paper aims to look retrospectively at the impact that previous revolutionary computing technologies have had and the institutional values that have shaped ...
- Bribery and corruption in telecommunications – the case of Nigeria
Purpose: This paper aims to examine issues of bribery, cronyism and nepotism in one of the most corrupt countries in Africa. Design/methodology/approach: This is a single-country case study, drawing on material dating from the mid-1970s, including court cases. Findings: The corruption is...
- Degrees of separation: the case of BT. A regular column on the information industries
- Economic impact of data localization in five selected African countries
Purpose: The purpose of this study is to quantify the impact of laws and regulations that govern the cross-border flow of data on the economies of five selected African countries, namely, Egypt, Morocco, South Africa, Kenya and Mauritius. Moreover, this study addresses the state of cloud computing...
- Exploring the dimensions of individual privacy concerns in relation to the Internet of Things use situations
Purpose: The integration of internet of things (IoT) devices into daily life introduces challenges for the privacy of their users and those who are affected by these devices. This paper explores the factors that affect individual concerns regarding IoT use and how those factors affect the dynamics...
- From headline to lifeline: does news set agenda for policy?
Purpose: This paper is an investigation of the volume, nature and tone of news media coverage of the federal Lifeline Program from its inception to 2018. It aims to examine whether news media coverage is correlated with significant episodes of reform in the program. Design/methodology/approach:...
- Growth prospects, market challenges and policy measures: evolution of mobile broadband in Pakistan
Purpose: The paper aims to explore the long-term prospects of mobile broadband adoption in a developing country. The supply-side and demand-side policy measures are recommended to counter the challenges to broadband adoption. Design/methodology/approach: Methodologically, this study uses document...
- High-speed data in Africa: an assessment of provision via mobile networks
Purpose: The purpose of this paper is to examine the current provision of high-speed data networks in the African continent, in particular taking into account both licences and launches related to long-term evolution (LTE). Design/methodology/approach: An up-to-date underlying database of licences ...
- Indian telecom regulatory framework in comparison with five countries: structure, role description and funding
Purpose: The purpose of this paper is to present a cross-country qualitative comparative analysis of telecom regulatory frameworks of five countries with that of India. Adopting an institutionalist approach, this paper contributes to understanding of how institutional frameworks in these five...
- ITU cost model and methodology to assist national regulatory authorities to engage with international mobile roaming
Purpose: Tariffs for international mobile roaming (IMR) are often viewed by governments as an additional tax on international trade and on tourism. IMR customer bills may appear to be arbitrary and sometimes excessive. The purpose of this paper is therefore to set out a pragmatic approach to...