|
on Information and Communication Technologies |
By: | Federici, Daniela; Saltari, Enrico; Wymer, Clifford |
Abstract: | In this paper we present a non-linear model where ICT sector is endogenized. In the model there are two intermediate goods: a traditional good produced by capital and labor and the ICT good produced by innovative capital and skilled labor. The final good is obtained combining the two intermediate goods. The model is specified and estimated as continuous-time general disequilibrium framework. Our main results are the following. We find that the elasticity of substitution of the aggregate sector has a value intermediate between that of the ICT sector and that of the traditional sector, since the input complementarity is tighter in the former than in the latter. Moreover, in all the sectors elasticities are well below 1. As for the traditional sector, whose share is predominant in the production of the final good, the input complementarity helps explain most of the labour share decline of Italian economy as a consequence of the slowdown in the growth of capital intensity. In the ICT sector, technological progress, both in the form of capital augmenting and capital bias, showed a decline over the sample period with an obvious negative consequence on the global evolution of the technical progress. The results about the dynamics of the two intermediate sectors allows to interpret the "Italian paradox" of an industrial structure marked by an increasing weight of the traditional sector. |
Keywords: | Nested CES production function; Elasticity of substitution; Endogenous technical progress and ICT technical change; Disequilibrium model; Continuous-time econometrics. |
JEL: | C51 E22 E23 O41 |
Date: | 2015–09–17 |
URL: | http://d.repec.org/n?u=RePEc:pra:mprapa:66723&r=all |
By: | Mihail Cocosila (Faculty of Business, Athabasca University); Houda Trabelsi (Faculty of Business, Athabasca University) |
Abstract: | This study investigates the adoption of contactless mobile payments from a user point of view. Near Field Communication (NFC) mobile payments that consist of credit card contactless payments with smartphones are believed to be on a rapid growth path due to expected advantages for all major parties involved: consumers, credit card companies, banks, smartphone manufacturers, and mobile operators. Despite this overall optimistic picture there may, however, be some potential user doubts that would slow adoption. Thus, NFC payments might be associated with both fears linked to credit card use (e.g., account security) and to smartphone use (e.g., privacy). To assess the contrasting, positive and negative, factors of contactless mobile payments adoption from a user perspective, a cross-sectional investigation was run with two samples of Canadian consumers, 150 participants each. While one of the samples was presented information emphasizing the advantages of NFC mobile payments, the other sample was presented information pointing to possible issues associated with this new form of mobile payments. Following that, an online survey was conducted simultaneously with all participants in the two samples. Outcomes indicate that, irrespective of the information offered a priori, consumers perceive both opportunities (e.g., utility and fun) and challenges (e.g., unnecessary complications or privacy threats) associated with the service provided. Major players on the NFC mobile payments market should address these salient consumer factors in order to increase consumer adoption and, hence, the overall success of contactless mobile payments with smartphones. |
Keywords: | mobile payment, credit card, smartphone, empirical investigation, Canada |
JEL: | M15 |
URL: | http://d.repec.org/n?u=RePEc:sek:iacpro:2703537&r=all |
By: | Ghaith Al Abdallah (Applied Science University) |
Abstract: | Banks all over the world are converting from traditional banking to branchless banking; the substantial advancement in technology facilitated the adoption of new remote services platforms. Mobile banking is one of the most important alternative channels, especially with the widespread of smart phones.Many factors contributed to the adoption of mobile banking and many models were developed to examine this adoption process. Delone and Mclean introduced their model based on system quality, information quality and service quality, leading to intention to use and satisfaction and then to the net benefit. However, this model was originally developed to examine information system in general. Other researchers modified the original Delone and Mclean model to be more specific to mobile systems. Lee and Chang added interference design quality to the original factors, leading to trust then satisfaction. In this research, the researcher modified the model to include system security (since security of financial information is a major concern to users) and found that satisfaction proceeds trust, and both (satisfaction and trust) will contribute to commitment. To test the newly modified model, 14 hypotheses were drafted from the model and tested over a stratified random sample. The sample was selected from local banks customers who use mobile banking services on regular basis. Since this research is a causal one and without any control on the conducts of the respondents, quantitative descriptive approach was found appropriate for this research. Survey technique and personally submitted questionnaires were used to collect the data. The questionnaire was developed based on literature review and previous studies and consisted of four parts; the first part collected the respondents’ demographics. The second part examined the independent variables of the model (system quality, information quality, interference design quality, system security). The third part examined the dependent variables (satisfaction and trust) and the fourth part examined the effect of satisfaction and trust on the users’ commitment to use mobile banking system (application). Statistical package for social sciences (SPSS) was used to describe and analyze the data of 418 filtered and screened questionnaires out of 500 originally distributed. Despite the fact that all hypotheses were accepted, the hypotheses testing revealed that system security has the main effect on satisfaction and trust followed by system quality. Both, satisfaction and trust significantly contributed to commitment. Although future examination is required, these findings indicate the primary success of the modified model. |
Keywords: | Mobile Banking, Adoption, Modified Delone and Mclean Model, Jordan. |
URL: | http://d.repec.org/n?u=RePEc:sek:iacpro:2704902&r=all |
By: | Alexander Zlotnik (Department of Electronic Engineering. Technical University of Madrid) |
Abstract: | The integration of Stata with web applications can be of great use in some contexts. One such scenario is to make user-written Stata commands available directly through a webpage from any web-enabled device, such as a smartphone, tablet computer, personal digital assistant (PDA) or any personal computer with a web browser. This would allow reaching a large and diverse audience. Another scenario is the integration of subroutines written in Stata or Mata in web applications, which is desirable in organizations where statistical applications are developed by one team with Stata, while the rest of the business logic and front-end applications are developed by another team using different technologies. If Stata programs can be used directly, the often costly translation from Stata into other programming languages can be avoided, thus saving development resources, time and eliminating the errors and discrepancies due to translation mistakes and limitations of target languages. We demonstrate an approach for executing user-written commands on Stata IC, Stata SE and Stata MP through a web application based on the WAMP stack (Microsoft Windows, Apache, MySQL, PHP). Then, we introduce the adjustments needed for other operating systems, web servers and server-side scripting programming languages. We describe the requirements for Stata user-written commands accessible through web applications, their limitations, the bidirectional communication between Stata and generic web applications, possible solutions for concurrent execution scenarios, as well as the transformation of Stata dialog box (.dlg) files into web-ready HTML / CSS / JavaScript interfaces. Finally, we mention web application security principles, Stata-based web services and software licensing approaches. |
Date: | 2015–09–16 |
URL: | http://d.repec.org/n?u=RePEc:boc:usug15:16&r=all |
By: | Lana Plumanns (IMA/ZLW & IfU of RWTH Aachen University); Thorsten Sommer (IMA/ZLW & IfU of RWTH Aachen University); Katharina Schuster (IMA/ZLW & IfU of RWTH Aachen University); Anja Richert (IMA/ZLW & IfU of RWTH Aachen University); Sabina Jeschke (IMA/ZLW & IfU of RWTH Aachen University) |
Abstract: | The first three industrial revolutions were characterized by the invention of water and steam engine, centralized electric power infrastructure and mass production as well as digital computing and communications technology. The current developments caused by the fourth revolution, also known as “Industry 4.0”, pose major challenges to almost every kind of work, workplace, and the employees. Due to the concepts of cyber-physical systems, Internet of Things and the increasing globalization, remote work is a fast-growing trend in the workplace, and educational strategies within virtual worlds become more important. Especially methods as teaching and learning within virtual worlds are expected to have an enormous impact on advanced education in the future. However, it is not trivial to transfer a reliable educational method from real to the virtual worlds. Therefore, it is im-portant to adapt, check and change even small didactic elements to guarantee a sus-tainable learning success. As there is a lot of ongoing research about using virtual worlds for the training of hazardous situations, it has to be figured out which potential those environments bear for the everyday education of academic staff and which competencies and educational support trainers need to have respectively can give in those worlds. The used approach for this study was to investigate the trainers’ didactic perspective on mixed-reality teaching and learning. A total of ten trainers from different areas in Germa-ny took part in this study. Every participant pursued both roles: the teaching and the learning part in a virtual learning environment. In order to assess the learning success and important key factors the experiment yields data from the participants’ behavior, their answers to a semi-structured interview and video analysis, recorded from the virtual world. Resulting data were analyzed by using different qualitative as well as quantitative methods. The findings of this explorative research suggest the potential for learning in virtual worlds and give inside into influencing variables. The online gaming experience and the age of participants can be shown to be related to participants’ performance in the virtual world. It looks like the barriers for the affected trainers are low regarding utilization of virtual worlds. Together with the mentioned advantages and possible usages, the potential of these setups is shown. |
Keywords: | Education, Mixed-Reality, Teaching, Virtual World |
URL: | http://d.repec.org/n?u=RePEc:sek:iacpro:2704813&r=all |
By: | Sinta Dewi Rosadi (Faculty of Law, University of Padjadjaran, Bandung, Indonesia) |
Abstract: | ABSTRACTThe implementation of e-health programs and protection of data privacy: a comparative study between Indonesia, Australia and MalaysiaDr. Sinta Dewi RosadiThe application of e-health program refers to tools and services using information and communication technologies (ICTs) that can improve prevention, diagnosis, treatment, monitoring and management. The e-health program can benefit the entire community by improving access to care and quality of care and by making the health sector more efficient includes information and data sharing between patients and health service providers, hospitals, health professionals and health information networks; electronic health records; telemedicine services; portable patient-monitoring devices, operating room scheduling software. The e-health goals is to improve citizens' health by making life-saving information available and increase healthcare quality and access by making e-health as part of health policy and to provide health services more effective, user-friendly and widely accepted by involving professionals and patients in strategy, design and application. As one of the archipelago country with the total population estimated 255 million Indonesia has encounter many challenges in providing better health services so that the e-health program is one alternatives to provide better health services. However in the implementation of e-health program will facing legal challenges since the patients personal data is a sensitive data and its collection, use and storage needs legal protection and if the health care services provider does not keep the patients health data in confidential there will be a real risk that people will stop sharing their medical history with healthcare provider if they don’t have confidence that the right privacy controls are in place. This article is the result of preliminary study that analyze the legal framework of protection of e-health program relating data privacy protection is available and compare with Australia and Malaysia |
Keywords: | ( Key words: e-health program, legal protection, data privacy) |
JEL: | K29 |
URL: | http://d.repec.org/n?u=RePEc:sek:iacpro:2704977&r=all |
By: | Sinta Dewi Rosadi (Faculty of Law, University of Padjadjaran, Bandung, Indonesia) |
Abstract: | ABSTRACTThe implementation of e-health programs and protection of data privacy: a comparative study between Indonesia, Australia and MalaysiaDr. Sinta Dewi RosadiThe application of e-health program refers to tools and services using information and communication technologies (ICTs) that can improve prevention, diagnosis, treatment, monitoring and management. The e-health program can benefit the entire community by improving access to care and quality of care and by making the health sector more efficient includes information and data sharing between patients and health service providers, hospitals, health professionals and health information networks; electronic health records; telemedicine services; portable patient-monitoring devices, operating room scheduling software. The e-health goals is to improve citizens' health by making life-saving information available and increase healthcare quality and access by making e-health as part of health policy and to provide health services more effective, user-friendly and widely accepted by involving professionals and patients in strategy, design and application. As one of the archipelago country with the total population estimated 255 million Indonesia has encounter many challenges in providing better health services so that the e-health program is one alternatives to provide better health services. However in the implementation of e-health program will facing legal challenges since the patients personal data is a sensitive data and its collection, use and storage needs legal protection and if the health care services provider does not keep the patients health data in confidential there will be a real risk that people will stop sharing their medical history with healthcare provider if they don’t have confidence that the right privacy controls are in place. This article is the result of preliminary study that analyze the legal framework of protection of e-health program relating data privacy protection is available and compare with Australia and Malaysia |
Keywords: | Key words: e-health program, legal protection, data privacy) |
JEL: | K19 |
URL: | http://d.repec.org/n?u=RePEc:sek:iacpro:2705181&r=all |
By: | Shara Monteleone (European Commission – JRC - IPTS); Rene van Bavel (European Commission – JRC - IPTS); Nuria Rodríguez-Priego (European Commission – JRC - IPTS); Gabriele Esposito (European Commission – JRC - IPTS) |
Abstract: | The report seeks to bring behavioural research methods for privacy to the attention of EU policy-makers. It argues that changes in web interface design can be a useful policy alternative to the traditional 'privacy notice' approach. Specifically, it examines whether web interface design has effect on people's online privacy behaviour through an online experiment (n=3229) in four European countries. Results show that the presence of an anthropomorphic character leads to greater disclosure of personal information, both directly and passively; the presence of a privacy notice leads to greater direct information disclosure. Additional psychological constructs (such as subjects' awareness that they were revealing personal information) were also recorded, and a demographic analysis according to gender, age, education and country of residence carried out. |
Keywords: | ICT |
Date: | 2015–09 |
URL: | http://d.repec.org/n?u=RePEc:ipt:iptwpa:jrc96695&r=all |
By: | Dejan Trifunovic (University of Belgrade, Faculty of Economics); Djordje Mitrovic (University of Belgrade, Faculty of Economics); Bojan Ristic (University of Belgrade, Faculty of Economics) |
Abstract: | Telecommunication industry has probably the highest level of direct network effects. Direct externalities are related to the number of consumers using the same service, and indirect externalities stem from the availability of supporting services. Apart from network externalities, in telecommunication call externalities also exist when user of one network benefits from receiving free calls from users of other networks. Serbian mobile phone telecommunication market was first a duopoly market with majority state- owned Telecom Serbia and privately owned Telenor. After that a third license was sold to VIP mobile. The two incumbents were well established in the market and have long time ago reached the critical mass of users. At the beginning, users of VIP mobile benefited mainly from call externalities and incumbents reacted by price discriminating between on-net and off-net calls aiming to deter entry of new rival in the market. The entrant succeeded in obtaining new users mainly by offering lower prices than incumbents. The subsequent decision of regulatory agency to permit changing operator without changing user’s number levelled the playing field, reduced user’s switching costs and the extent of user’s lock-in. The purpose of the paper is to analyse the current level of network and call externalities in Serbia using data from the Serbian mobile telephone market for the period 2003–2013 (number of subscribers, providers’ market shares and mobile call prices per minute). We show that the number of subscribers that changed their operator increased with the growing size of the new comer’s network installed base. Also, we have found that implicit price discrimination between on-net and off-net calls could be identified both in pre-paid and post-paid packages. In the former case, all operators offer cheap additional packages with large number of minutes for on-net calls. In the latter case, post-paid users can use additional large number of free minutes for on-net calls after they spent all the minutes available for calls to all networks from their existing subscription packages. |
Keywords: | Network externalities, Call externalities, Price discrimination |
JEL: | L14 L96 |
URL: | http://d.repec.org/n?u=RePEc:sek:iacpro:2704575&r=all |