Digital Policy, Regulation and Governance

Emerald Group Publishing Limited
Publication date:

Latest documents

  • Huawei and goodbye. A regular column on the information industries
  • Explaining the determinants of continual use of mobile financial services

    Purpose: Information system continuance model has been used in a number of studies to explain information system continuance in different contexts. However, very little research attention has been given to continuous use of mobile financial services (MFS). The purpose of this study is to fill this research gap by identifying the main factors that influence the continual use of MFS. Design/methodology/approach: A sample was randomly taken from MFS registered accounts or mobile wallets. A five-point Likert scale survey was conducted in Ghana. Structural equation modelling was used to test the data. Constructs such as continual use, satisfaction, perceived usefulness and confirmation were adapted from information system continuance model to suit the requirement of MFS. A pilot study was then carried out after the questionnaire was developed to gauge the appropriateness of the survey questions. Findings: Results from the survey indicated that user satisfaction has the greatest impact on the continual use of mobile financial services. Good agent quality and satisfaction were the second most influential determinant. Satisfaction was, in turn, confirmed to be determined by perceived usefulness. Another important contributor to MFS continual use was found to be perceived ease of use (PEOU) with an impact surprisingly higher than that of perceived usefulness. There was a significant impact of good agent quality on satisfaction, which could be attributed to the characteristics of the technology for the study. Research limitations/implications: Although a relatively high R2 (71%) was indicated by the proposed model, there is need for additional factors to be identified to improve the ability to predict and explain the continual use of MFS. A longitudinal study would have enhanced the identification of determinants and the understanding of their inter-relationships to influence MFS continual use. Practical implications: To ensure continual use of MFS, PEOU as identified by the study is important to ensure that customers can use the service with little effort. Good agent quality can promote PEOU in the sense that competent agents can render relevant tutorials to customers’ right after the registration process. This will address a major barrier to continual use, which is the lack of understanding of how MFS operate. Social implications: This study contributes to ensuring financial inclusion such that the unbanked can have access to financial services and also improve digital inclusion. Originality/value: The study provides empirical evidence to support the substantive differences between acceptance and continual use behaviours, integrating the constructs of good agent quality and PEOU into our understanding of information system continual use literature. The authors also theorized and evaluated a model of MFS continual use.

  • IT governance enablers in relation to IoT implementation: a systematic literature review

    Purpose: The purpose of this paper is to obtain a list of recommendations addressed by the information technology (IT) governance enablers in relation to IoT implementation. The reason behind this it is the lack of information about these instances which could the organizations to be more effective when implementing IoT. Design/methodology/approach: The objectives will be obtained using the methodology – systematic literature review. Findings: During the research, a list of recommendations was created on each IT governance enabler in relation to IoT implementation, showing the flaws that exist at the literature level for each enabler. Originality/value: The state of art of this research is a creation of a list of recommendations according to IT governance enablers to be applied on an IoT implementation.

  • The ontology of digital asset after death: policy complexities, suggestions and critique of digital platforms

    Purpose: The digitization of the life has brought complexities associated with addressing digital life after one’s death. This paper aims to investigate the two related issues of the privacy and property of postlife digital assets. Design/methodology/approach: The understanding of digital assets has not been fully unpacked largely due to the current policy complexities in accessing and obtaining digital assets at death. This paper calls critical attention to the importance of respecting user rights in digital environments that currently favor service providers’ interests. Findings: It is argued that there are ethical blind spots when protecting users’ rights, given no ontological difference between a person’s digital beings and physical existence. These derive from the restrictive corporate terms and ambiguous conditions drafted by digital service providers. Originality/value: Fundamentally, the transition to the big data era, in which the collection, use and dissemination of digital activities became integral part of the ontology, poses new challenges to privacy and property rights after death.

  • The strange case of US v. ZTE: a prosecution, a ban, a fine and a presidential intervention

    Purpose: The purpose of this paper is to review the prosecution by US authorities of Zhongxing Telecommunication Equipment (ZTE) Corporation for its violation of sanctions against the sale of systems to Iran and North Korea; the violation of the plea agreement; and, following presidential intervention, the imposition of a further fine and restructuring of its management. Design/methodology/approach: An analysis of the materials used in court proceedings and speeches by officials in the case against ZTE Findings: The US president intervened in a quasi-judicial matter in which a foreign firm had violated US sanctions that he had supported to lessen the penalties it faced. The firm had also violated its plea agreement. This personal intervention weakened enforcement of US sanctions on human rights and weapons of mass destruction (WMD). However, it revealed the excessive reliance of Chinese manufacturers on US-domiciled suppliers of semiconductors and software. Research limitations/implications: Neither was access to Chinese documents possible nor would it have been practicable to interview managers at ZTE. Practical implications: Enforcement of US sanctions on the sale of telecommunications equipment have now been moved from strict enforcement on matters of human rights and WMD into political, trade and even personal negotiations with the US president. Originality/value: A first analysis of a telecommunications sanctions case.

  • New players in the music industry: lifeboats or killer whales? the role of streaming platforms
  • Have we reached peak 4G?. A regular column on the information industries
  • “Soft law” and innovations: empirical analysis of ICO-related statements

    Purpose: The purpose of the paper is to explore the initial coin offering (ICO) statements as “soft law” instrument used to regulate disruptive innovations. Design/methodology/approach: The research is based on the qualitative content analysis of 40 ICO statements issued by regulators in 37 countries by applying a custom-made coding table. Findings: The research shows that “soft law” is used predominantly by high-capacity jurisdictions. “Soft law” allows for more flexibility and less technological and business neutrality. The findings also show the contradiction between empirical evidence and public sentiment: it seems that the widespread notion that virtual currencies have connotations with money laundering/financing of terrorism (ML/FT) is not shared by the regulators, who are more concerned by the fraud. Finally, it was found that the standard-setting bodies are lagging behind in providing guidance on the emergence technologies. Research limitations/implications: The content analysis is based on 40 statements, which is a limited set of data. The method might be subject to interpersonal bias, although arrangements were made to ensure the uniformity of coding process. Practical implications: The findings imply that soft law is an attractive risk-mitigation tool when the object of regulation is still evolving but the risks are present. Soft law also might contradict with the “technology and business neutrality” principle which requires further research. Finally, the findings show the need for more active involvement of the standard setting bodies. Originality/value: This is the first in-depth research of the ICO-related statements as “soft law” instruments. It also offers a new perspective on the issue of financial innovations regulation.

  • A model for assessing the impact of cloud computing on the success of customer relationship management systems (case study: agricultural companies)

    Purpose: Nowadays, communications, products, services and costs are customized through the internet technology. The main theory to continue competitiveness in the organizations is customer relationship management (CRM). CRM enables organizations to efficiently interact with customers and gather, store and examine their data for providing a complete view of them. On the other hand, the subject of cloud computing has increasingly become the bridge for the success of the CRM implementation. Therefore, this study aims to investigate the impact of cloud computing (new cloud facility, knowledge of information technology (IT), cloud security and cost) on the success of CRM systems. Design/methodology/approach: The model and the questioners-based data are analyzed using the Smart PLS 3.0. The data were gathered based on 80 employees of three main agricultural companies in Iran. Findings: The obtained results have indicated that all of the considered factors, new cloud facilities, knowledge of IT, cloud security and cost, play an important role in CRM systems’ success. Also, the evaluation and examination of the consistency and validity of the model are performed through the structural equation model. Research limitations/implications: First, the authors have conducted a study in a single region. It cannot be guaranteed that the results can be generalized to other regions. Second, for this cross-sectional study, the research design was conducted that showed constant relationships between variables. The research done for this study is cross-sectional. Third, because of time and financial restrictions, the authors have gathered data using a sample from a single location. Originality/value: Proposing a new model for investigating of the impact of cloud computing (new cloud facility, knowledge of Information Technology (IT), cloud security and cost) on the success of CRM systems is the main originality of this paper.

  • Regulating mediators of internet piracy: P2P websites and cyberlockers

    Purpose: Contemporary copyright infringement has significantly changed in the digital era, and because of the unique attributes of internet piracy and method of exchange, traditional regulatory approaches are ineffective. The characteristics of digital goods enable users to almost costlessly copy and exchange content. Much of the contemporary research fails to incorporate the necessary components of exchange that are central to digital piracy. This paper aims to examine the role of peer-to-peer network hosts and the often-omitted cyberlocker. Design/methodology/approach: A simple framework is constructed that describes how these entities how these entities facilitate digital piracy and operate financially. This framework illustrates the objectives of piracy mediators, highlighting the avenues by which regulation can craft policy. Additional examination of online piracy highlights the challenges of contemporary policy to combat digital piracy due to the secondary consequences. Findings: Recent policies, aimed at diminishing piracy, would infringe on consumers’ privacy, hurt business finances or strategically used by rivals to hurt the operations of legal entities. Trying to prevent illegal sources (or facilitators) of pirate goods from providing access to files continues to be challenging. In many instances, the blurry line between a legal platform for file exchange and a piracy haven creates significant regulatory problems. For known piracy promoters (host sites or cyberlockers), location and revenue streams continue to limit direct intervention. Originality/value: This paper discusses the necessary path for piracy to occur by including previously omitted agents necessary for communication and/or distribution. My analysis incorporates these entities that facilitate piracy and the unique features of digital exchange, which has industrial and regulatory implications. Furthermore, my results highlight why regulators have been ineffective in crafting meaningful anti-piracy policy.

Featured documents