Digital Policy, Regulation and Governance
- Emerald Group Publishing Limited
- Publication date:
- Nbr. 22-1, January 2020
- Nbr. 21-6, September 2019
- Nbr. 21-5, August 2019
- Nbr. 21-4, June 2019
- Nbr. 21-3, May 2019
- Nbr. 21-2, March 2019
- Nbr. 21-1, January 2019
- Nbr. 20-6, September 2018
- Nbr. 20-5, August 2018
- Nbr. 20-4, June 2018
- Nbr. 20-3, May 2018
- Nbr. 20-2, March 2018
- Nbr. 20-1, January 2018
- Nbr. 19-6, September 2017
- Nbr. 19-5, August 2017
- Nbr. 19-4, June 2017
- Nbr. 19-3, May 2017
- Nbr. 19-2, March 2017
- Nbr. 19-1, January 2017
- Huawei and goodbye. A regular column on the information industries
- Explaining the determinants of continual use of mobile financial services
Purpose: Information system continuance model has been used in a number of studies to explain information system continuance in different contexts. However, very little research attention has been given to continuous use of mobile financial services (MFS). The purpose of this study is to fill this research gap by identifying the main factors that influence the continual use of MFS. Design/methodology/approach: A sample was randomly taken from MFS registered accounts or mobile wallets. A five-point Likert scale survey was conducted in Ghana. Structural equation modelling was used to test the data. Constructs such as continual use, satisfaction, perceived usefulness and confirmation were adapted from information system continuance model to suit the requirement of MFS. A pilot study was then carried out after the questionnaire was developed to gauge the appropriateness of the survey questions. Findings: Results from the survey indicated that user satisfaction has the greatest impact on the continual use of mobile financial services. Good agent quality and satisfaction were the second most influential determinant. Satisfaction was, in turn, confirmed to be determined by perceived usefulness. Another important contributor to MFS continual use was found to be perceived ease of use (PEOU) with an impact surprisingly higher than that of perceived usefulness. There was a significant impact of good agent quality on satisfaction, which could be attributed to the characteristics of the technology for the study. Research limitations/implications: Although a relatively high R2 (71%) was indicated by the proposed model, there is need for additional factors to be identified to improve the ability to predict and explain the continual use of MFS. A longitudinal study would have enhanced the identification of determinants and the understanding of their inter-relationships to influence MFS continual use. Practical implications: To ensure continual use of MFS, PEOU as identified by the study is important to ensure that customers can use the service with little effort. Good agent quality can promote PEOU in the sense that competent agents can render relevant tutorials to customers’ right after the registration process. This will address a major barrier to continual use, which is the lack of understanding of how MFS operate. Social implications: This study contributes to ensuring financial inclusion such that the unbanked can have access to financial services and also improve digital inclusion. Originality/value: The study provides empirical evidence to support the substantive differences between acceptance and continual use behaviours, integrating the constructs of good agent quality and PEOU into our understanding of information system continual use literature. The authors also theorized and evaluated a model of MFS continual use.
- IT governance enablers in relation to IoT implementation: a systematic literature review
Purpose: The purpose of this paper is to obtain a list of recommendations addressed by the information technology (IT) governance enablers in relation to IoT implementation. The reason behind this it is the lack of information about these instances which could the organizations to be more effective when implementing IoT. Design/methodology/approach: The objectives will be obtained using the methodology – systematic literature review. Findings: During the research, a list of recommendations was created on each IT governance enabler in relation to IoT implementation, showing the flaws that exist at the literature level for each enabler. Originality/value: The state of art of this research is a creation of a list of recommendations according to IT governance enablers to be applied on an IoT implementation.
- The ontology of digital asset after death: policy complexities, suggestions and critique of digital platforms
Purpose: The digitization of the life has brought complexities associated with addressing digital life after one’s death. This paper aims to investigate the two related issues of the privacy and property of postlife digital assets. Design/methodology/approach: The understanding of digital assets has not been fully unpacked largely due to the current policy complexities in accessing and obtaining digital assets at death. This paper calls critical attention to the importance of respecting user rights in digital environments that currently favor service providers’ interests. Findings: It is argued that there are ethical blind spots when protecting users’ rights, given no ontological difference between a person’s digital beings and physical existence. These derive from the restrictive corporate terms and ambiguous conditions drafted by digital service providers. Originality/value: Fundamentally, the transition to the big data era, in which the collection, use and dissemination of digital activities became integral part of the ontology, poses new challenges to privacy and property rights after death.
- Have we reached peak 4G?. A regular column on the information industries
- New players in the music industry: lifeboats or killer whales? the role of streaming platforms
- The strange case of US v. ZTE: a prosecution, a ban, a fine and a presidential intervention
Purpose: The purpose of this paper is to review the prosecution by US authorities of Zhongxing Telecommunication Equipment (ZTE) Corporation for its violation of sanctions against the sale of systems to Iran and North Korea; the violation of the plea agreement; and, following presidential intervention, the imposition of a further fine and restructuring of its management. Design/methodology/approach: An analysis of the materials used in court proceedings and speeches by officials in the case against ZTE Findings: The US president intervened in a quasi-judicial matter in which a foreign firm had violated US sanctions that he had supported to lessen the penalties it faced. The firm had also violated its plea agreement. This personal intervention weakened enforcement of US sanctions on human rights and weapons of mass destruction (WMD). However, it revealed the excessive reliance of Chinese manufacturers on US-domiciled suppliers of semiconductors and software. Research limitations/implications: Neither was access to Chinese documents possible nor would it have been practicable to interview managers at ZTE. Practical implications: Enforcement of US sanctions on the sale of telecommunications equipment have now been moved from strict enforcement on matters of human rights and WMD into political, trade and even personal negotiations with the US president. Originality/value: A first analysis of a telecommunications sanctions case.
- The benefits and challenges of general data protection regulation for the information technology sector
Purpose: The implementation of European data protection is a challenge for businesses and has imposed legal, technical and organizational changes for companies. This study aims to explore the benefits and challenges that companies operating in the information technology (IT) sector have experienced in applying the European data protection. Additionally, this study aims to explore whether the benefits and challenges faced by these companies were different considering their dimension and the state of implementation of the regulation. Design/methodology/approach: This study adopts a quantitative methodology, based on a survey conducted with Portuguese IT companies. The survey is composed of 30 questions divided into three sections, namely, control data; assessment; and benefits and challenges. The survey was created on Google Drive and distributed among Portuguese IT companies between March and April of 2019. The data were analyzed using the Stata software using descriptive and inferential analysis techniques using the ANOVA one-way test. Findings: A total of 286 responses were received. The main benefits identified by the application of European data protection include increased confidence and legal clarification. On the other hand, the main challenges include the execution of audits to systems and processes and the application of the right to erasure. The findings allow us to conclude that the state of implementation of the general data protection regulation (GDPR), and the type of company are discriminating factors in the perception of benefits and challenges. Research limitations/implications: This study has essentially practical implications. Based on the synthesis of the benefits and challenges posed by the adoption of European data protection, it is possible to assess the relative importance and impact of the benefits and challenges faced by companies in the IT sector. However, this study does not explore the type of challenges that are placed at each stage of the adoption of European data protection and does not take into account the specificities of the activities carried out by each of these companies. Originality/value: The implementation of the GDPR is still in an initial phase. This study is pioneering in synthesizing the main benefits and challenges of its adoption considering the companies operating in the IT sector. Furthermore, this study explores the impact of the size of the company and the status of implementation of the GDPR on the perception of the established benefits and challenges.
- Regulating mediators of internet piracy: P2P websites and cyberlockers
Purpose: Contemporary copyright infringement has significantly changed in the digital era, and because of the unique attributes of internet piracy and method of exchange, traditional regulatory approaches are ineffective. The characteristics of digital goods enable users to almost costlessly copy and exchange content. Much of the contemporary research fails to incorporate the necessary components of exchange that are central to digital piracy. This paper aims to examine the role of peer-to-peer network hosts and the often-omitted cyberlocker. Design/methodology/approach: A simple framework is constructed that describes how these entities how these entities facilitate digital piracy and operate financially. This framework illustrates the objectives of piracy mediators, highlighting the avenues by which regulation can craft policy. Additional examination of online piracy highlights the challenges of contemporary policy to combat digital piracy due to the secondary consequences. Findings: Recent policies, aimed at diminishing piracy, would infringe on consumers’ privacy, hurt business finances or strategically used by rivals to hurt the operations of legal entities. Trying to prevent illegal sources (or facilitators) of pirate goods from providing access to files continues to be challenging. In many instances, the blurry line between a legal platform for file exchange and a piracy haven creates significant regulatory problems. For known piracy promoters (host sites or cyberlockers), location and revenue streams continue to limit direct intervention. Originality/value: This paper discusses the necessary path for piracy to occur by including previously omitted agents necessary for communication and/or distribution. My analysis incorporates these entities that facilitate piracy and the unique features of digital exchange, which has industrial and regulatory implications. Furthermore, my results highlight why regulators have been ineffective in crafting meaningful anti-piracy policy.
- A model for assessing the impact of cloud computing on the success of customer relationship management systems (case study: agricultural companies)
Purpose: Nowadays, communications, products, services and costs are customized through the internet technology. The main theory to continue competitiveness in the organizations is customer relationship management (CRM). CRM enables organizations to efficiently interact with customers and gather, store and examine their data for providing a complete view of them. On the other hand, the subject of cloud computing has increasingly become the bridge for the success of the CRM implementation. Therefore, this study aims to investigate the impact of cloud computing (new cloud facility, knowledge of information technology (IT), cloud security and cost) on the success of CRM systems. Design/methodology/approach: The model and the questioners-based data are analyzed using the Smart PLS 3.0. The data were gathered based on 80 employees of three main agricultural companies in Iran. Findings: The obtained results have indicated that all of the considered factors, new cloud facilities, knowledge of IT, cloud security and cost, play an important role in CRM systems’ success. Also, the evaluation and examination of the consistency and validity of the model are performed through the structural equation model. Research limitations/implications: First, the authors have conducted a study in a single region. It cannot be guaranteed that the results can be generalized to other regions. Second, for this cross-sectional study, the research design was conducted that showed constant relationships between variables. The research done for this study is cross-sectional. Third, because of time and financial restrictions, the authors have gathered data using a sample from a single location. Originality/value: Proposing a new model for investigating of the impact of cloud computing (new cloud facility, knowledge of Information Technology (IT), cloud security and cost) on the success of CRM systems is the main originality of this paper.
- Altice: creating a complex and constantly evolving empire
Purpose: This paper aims to shed light on the development of Altice, a French-based but multinational operator of cable and mobile networks. Design/methodology/approach: A detailed longitudinal case study approach is adopted covering the period 2002 to 2018 (inclusive). Data are drawn from...
- Drivers and barriers to re-use Open Government Data (OGD): a case study of open data initiative in Philippines
Purpose: Given that the Open Government Data (OGD) initiatives of any country are founded on principles of transparency and accountability, it is important that the data sets permit a user-friendly interface for the data sets to be re-used. This paper aims to underline the major drivers and...
- Google search abuses dominant position to illegally favour Google Shopping: an economic review of the EU decision
Purpose: This paper is concerned with the current decision of the European Commission regarding Google’s comparison shopping service (Google Shopping). In 2017, the Commission has fined Google €2.42 billion for abusing its dominant position as a search engine by giving illegal advantage to Google...
- International spectrum management regime: is gridlock blocking flexible spectrum property rights?
Purpose: This paper aims to examine the influence of the international spectrum management regime on the introduction of flexibility in the national allocation of radiocommunication services. This is achieved through focusing on the main elements of the international regime. Design/methodology/appr...
- Perception of corruption in e-government services post-launch of “Digital India”: role of demographic variables
Purpose: The purpose of this paper is to underline the role of demographic variables as far as the perception of corruption among the Indian respondents is concerned. Design/methodology/approach: Hierarchical regression analysis is conducted to ascertain the role of demographic variables in line...
- Technology agnostic regulatory criteria for licence-exempt spectrum
Purpose: Spectrum regulations have major impact on the development and deployment of innovative technologies. Current regulations for license-exempt radio spectrum generally are given in terms of technology-related criteria. This paper aims to propose a set of metrics that can be used to define...
- The strategic national infrastructure assessment of digital communications
Purpose: Public policy requires effective identification of the current and emerging issues being faced in industry and beyond. This paper aims to identify a set of key issues currently facing digital communications and reviews their relevance for the strategic provision of infrastructure,...
- Are these unicorns ready to fly?. A regular column on the information industries
- Economic impact of data localization in five selected African countries
Purpose: The purpose of this study is to quantify the impact of laws and regulations that govern the cross-border flow of data on the economies of five selected African countries, namely, Egypt, Morocco, South Africa, Kenya and Mauritius. Moreover, this study addresses the state of cloud computing...
- Google. A regular column on the information industries