Digital Policy, Regulation and Governance

Emerald Group Publishing Limited
Publication date:

Latest documents

  • Huawei and goodbye. A regular column on the information industries
  • Explaining the determinants of continual use of mobile financial services

    Purpose: Information system continuance model has been used in a number of studies to explain information system continuance in different contexts. However, very little research attention has been given to continuous use of mobile financial services (MFS). The purpose of this study is to fill this research gap by identifying the main factors that influence the continual use of MFS. Design/methodology/approach: A sample was randomly taken from MFS registered accounts or mobile wallets. A five-point Likert scale survey was conducted in Ghana. Structural equation modelling was used to test the data. Constructs such as continual use, satisfaction, perceived usefulness and confirmation were adapted from information system continuance model to suit the requirement of MFS. A pilot study was then carried out after the questionnaire was developed to gauge the appropriateness of the survey questions. Findings: Results from the survey indicated that user satisfaction has the greatest impact on the continual use of mobile financial services. Good agent quality and satisfaction were the second most influential determinant. Satisfaction was, in turn, confirmed to be determined by perceived usefulness. Another important contributor to MFS continual use was found to be perceived ease of use (PEOU) with an impact surprisingly higher than that of perceived usefulness. There was a significant impact of good agent quality on satisfaction, which could be attributed to the characteristics of the technology for the study. Research limitations/implications: Although a relatively high R2 (71%) was indicated by the proposed model, there is need for additional factors to be identified to improve the ability to predict and explain the continual use of MFS. A longitudinal study would have enhanced the identification of determinants and the understanding of their inter-relationships to influence MFS continual use. Practical implications: To ensure continual use of MFS, PEOU as identified by the study is important to ensure that customers can use the service with little effort. Good agent quality can promote PEOU in the sense that competent agents can render relevant tutorials to customers’ right after the registration process. This will address a major barrier to continual use, which is the lack of understanding of how MFS operate. Social implications: This study contributes to ensuring financial inclusion such that the unbanked can have access to financial services and also improve digital inclusion. Originality/value: The study provides empirical evidence to support the substantive differences between acceptance and continual use behaviours, integrating the constructs of good agent quality and PEOU into our understanding of information system continual use literature. The authors also theorized and evaluated a model of MFS continual use.

  • IT governance enablers in relation to IoT implementation: a systematic literature review

    Purpose: The purpose of this paper is to obtain a list of recommendations addressed by the information technology (IT) governance enablers in relation to IoT implementation. The reason behind this it is the lack of information about these instances which could the organizations to be more effective when implementing IoT. Design/methodology/approach: The objectives will be obtained using the methodology – systematic literature review. Findings: During the research, a list of recommendations was created on each IT governance enabler in relation to IoT implementation, showing the flaws that exist at the literature level for each enabler. Originality/value: The state of art of this research is a creation of a list of recommendations according to IT governance enablers to be applied on an IoT implementation.

  • The ontology of digital asset after death: policy complexities, suggestions and critique of digital platforms

    Purpose: The digitization of the life has brought complexities associated with addressing digital life after one’s death. This paper aims to investigate the two related issues of the privacy and property of postlife digital assets. Design/methodology/approach: The understanding of digital assets has not been fully unpacked largely due to the current policy complexities in accessing and obtaining digital assets at death. This paper calls critical attention to the importance of respecting user rights in digital environments that currently favor service providers’ interests. Findings: It is argued that there are ethical blind spots when protecting users’ rights, given no ontological difference between a person’s digital beings and physical existence. These derive from the restrictive corporate terms and ambiguous conditions drafted by digital service providers. Originality/value: Fundamentally, the transition to the big data era, in which the collection, use and dissemination of digital activities became integral part of the ontology, poses new challenges to privacy and property rights after death.

  • Have we reached peak 4G?. A regular column on the information industries
  • New players in the music industry: lifeboats or killer whales? the role of streaming platforms
  • The strange case of US v. ZTE: a prosecution, a ban, a fine and a presidential intervention

    Purpose: The purpose of this paper is to review the prosecution by US authorities of Zhongxing Telecommunication Equipment (ZTE) Corporation for its violation of sanctions against the sale of systems to Iran and North Korea; the violation of the plea agreement; and, following presidential intervention, the imposition of a further fine and restructuring of its management. Design/methodology/approach: An analysis of the materials used in court proceedings and speeches by officials in the case against ZTE Findings: The US president intervened in a quasi-judicial matter in which a foreign firm had violated US sanctions that he had supported to lessen the penalties it faced. The firm had also violated its plea agreement. This personal intervention weakened enforcement of US sanctions on human rights and weapons of mass destruction (WMD). However, it revealed the excessive reliance of Chinese manufacturers on US-domiciled suppliers of semiconductors and software. Research limitations/implications: Neither was access to Chinese documents possible nor would it have been practicable to interview managers at ZTE. Practical implications: Enforcement of US sanctions on the sale of telecommunications equipment have now been moved from strict enforcement on matters of human rights and WMD into political, trade and even personal negotiations with the US president. Originality/value: A first analysis of a telecommunications sanctions case.

  • The benefits and challenges of general data protection regulation for the information technology sector

    Purpose: The implementation of European data protection is a challenge for businesses and has imposed legal, technical and organizational changes for companies. This study aims to explore the benefits and challenges that companies operating in the information technology (IT) sector have experienced in applying the European data protection. Additionally, this study aims to explore whether the benefits and challenges faced by these companies were different considering their dimension and the state of implementation of the regulation. Design/methodology/approach: This study adopts a quantitative methodology, based on a survey conducted with Portuguese IT companies. The survey is composed of 30 questions divided into three sections, namely, control data; assessment; and benefits and challenges. The survey was created on Google Drive and distributed among Portuguese IT companies between March and April of 2019. The data were analyzed using the Stata software using descriptive and inferential analysis techniques using the ANOVA one-way test. Findings: A total of 286 responses were received. The main benefits identified by the application of European data protection include increased confidence and legal clarification. On the other hand, the main challenges include the execution of audits to systems and processes and the application of the right to erasure. The findings allow us to conclude that the state of implementation of the general data protection regulation (GDPR), and the type of company are discriminating factors in the perception of benefits and challenges. Research limitations/implications: This study has essentially practical implications. Based on the synthesis of the benefits and challenges posed by the adoption of European data protection, it is possible to assess the relative importance and impact of the benefits and challenges faced by companies in the IT sector. However, this study does not explore the type of challenges that are placed at each stage of the adoption of European data protection and does not take into account the specificities of the activities carried out by each of these companies. Originality/value: The implementation of the GDPR is still in an initial phase. This study is pioneering in synthesizing the main benefits and challenges of its adoption considering the companies operating in the IT sector. Furthermore, this study explores the impact of the size of the company and the status of implementation of the GDPR on the perception of the established benefits and challenges.

  • Regulating mediators of internet piracy: P2P websites and cyberlockers

    Purpose: Contemporary copyright infringement has significantly changed in the digital era, and because of the unique attributes of internet piracy and method of exchange, traditional regulatory approaches are ineffective. The characteristics of digital goods enable users to almost costlessly copy and exchange content. Much of the contemporary research fails to incorporate the necessary components of exchange that are central to digital piracy. This paper aims to examine the role of peer-to-peer network hosts and the often-omitted cyberlocker. Design/methodology/approach: A simple framework is constructed that describes how these entities how these entities facilitate digital piracy and operate financially. This framework illustrates the objectives of piracy mediators, highlighting the avenues by which regulation can craft policy. Additional examination of online piracy highlights the challenges of contemporary policy to combat digital piracy due to the secondary consequences. Findings: Recent policies, aimed at diminishing piracy, would infringe on consumers’ privacy, hurt business finances or strategically used by rivals to hurt the operations of legal entities. Trying to prevent illegal sources (or facilitators) of pirate goods from providing access to files continues to be challenging. In many instances, the blurry line between a legal platform for file exchange and a piracy haven creates significant regulatory problems. For known piracy promoters (host sites or cyberlockers), location and revenue streams continue to limit direct intervention. Originality/value: This paper discusses the necessary path for piracy to occur by including previously omitted agents necessary for communication and/or distribution. My analysis incorporates these entities that facilitate piracy and the unique features of digital exchange, which has industrial and regulatory implications. Furthermore, my results highlight why regulators have been ineffective in crafting meaningful anti-piracy policy.

  • A model for assessing the impact of cloud computing on the success of customer relationship management systems (case study: agricultural companies)

    Purpose: Nowadays, communications, products, services and costs are customized through the internet technology. The main theory to continue competitiveness in the organizations is customer relationship management (CRM). CRM enables organizations to efficiently interact with customers and gather, store and examine their data for providing a complete view of them. On the other hand, the subject of cloud computing has increasingly become the bridge for the success of the CRM implementation. Therefore, this study aims to investigate the impact of cloud computing (new cloud facility, knowledge of information technology (IT), cloud security and cost) on the success of CRM systems. Design/methodology/approach: The model and the questioners-based data are analyzed using the Smart PLS 3.0. The data were gathered based on 80 employees of three main agricultural companies in Iran. Findings: The obtained results have indicated that all of the considered factors, new cloud facilities, knowledge of IT, cloud security and cost, play an important role in CRM systems’ success. Also, the evaluation and examination of the consistency and validity of the model are performed through the structural equation model. Research limitations/implications: First, the authors have conducted a study in a single region. It cannot be guaranteed that the results can be generalized to other regions. Second, for this cross-sectional study, the research design was conducted that showed constant relationships between variables. The research done for this study is cross-sectional. Third, because of time and financial restrictions, the authors have gathered data using a sample from a single location. Originality/value: Proposing a new model for investigating of the impact of cloud computing (new cloud facility, knowledge of Information Technology (IT), cloud security and cost) on the success of CRM systems is the main originality of this paper.

Featured documents

VLEX uses login cookies to provide you with a better browsing experience. If you click on 'Accept' or continue browsing this site we consider that you accept our cookie policy. ACCEPT