nep-ict New Economics Papers
on Information and Communication Technologies
Issue of 2015‒12‒08
twelve papers chosen by
Walter Frisch
Universität Wien

  1. Structural Analysis of Value Creation in Software Service Platforms By Netsanet Haile; Jorn Altmann
  2. Intellectual Property and Innovation in Information and Communication Technology (ICT) By Stefano Comino; Fabio Maria Manenti
  3. Addressing fragmentation in EU mobile telecom markets By Mario Mariniello; Francesco Salemi
  4. The Internet, Cross-Border Data Flows and International Trade By Joshua Paul Meltzer
  5. Can credit cards with access to complimentary credit score information benefit consumers and lenders? By Mikhed, Vyacheslav
  6. What happens when evaluation goes online? exploring apparatuses of valuation in the travel sector By Wanda J. Orlikowski; Susan V. Scott
  7. Out of sight, out of mind: consumer reaction to news on data breaches and identity theft By Mikhed, Vyacheslav; Vogan, Michael
  9. Privacy, Trust and Social Network Formation By Alexia Gaudeul; Caterina Giannetti
  10. Challenges Emerging from Future Cloud Application Scenarios By Keith Jeferry; George Kousiouris; Dimosthenis Kyriazis; Jörn Altmann; Augusto Ciuffoletti; Ilias Maglogiannis; Paolo Nesi; Bojan Suzic; Zhiming Zhao
  11. Exploring the use of anonymized consumer credit information to estimate economic conditions: an application of big data By Wilshusen, Stephanie M.
  12. Classifying Non-banking Monetary Systems using Web Data By Ariane Tichit; Clément Mathonnat; Diego Sébastien Landivar

  1. By: Netsanet Haile (College of Engineering, Seoul National University); Jorn Altmann (College of Engineering, Seoul National University)
    Abstract: As software service platforms grow in number of users and variety of service offerings, it raises the question of how this phenomenon impacts the value obtained by users. This paper identifies system usability, service variety, and personal connectivity to be the major determinants that contribute to the value offered to users on mobile software service platforms. A structural equation model, which is based on utility theory, technology acceptance theory, and the theory of network externalities, has been constructed from seven observed constructs, reflecting the three determinants and the user value. The lower bound of user value is estimated through the user’s willingness-to-pay for services and the user’s willingness to spend time on using services. For the validation, a co-variance-based structural equation analysis has been conducted on online survey data of 210 users of mobile service platforms (e.g., Android, iOS). The results show that the number of services used and the number of active user connections were found to be the strongest constructs explaining user value. Perceived usefulness did not explain user value as much. In total, they can explain 49% of the value that the user receives from the platform. The implication of this result is that users’ value from a software service platform cannot be explained by the technology acceptance model itself. Instead, an approach that as used in this research of integrating network externality theory, utility theory, and technology acceptance theory is necessary.
    Keywords: Software Ecosystem, Network Effects, TAM, Utility Theory, Value Creation, Mobile Software Service Platforms.
    JEL: C13 C42 C51 C88 D46 L86 M15 M21 O32
    Date: 2015–11
  2. By: Stefano Comino (University of Udine); Fabio Maria Manenti (University of Padua)
    Abstract: The aim of this study is to provide a structured review of the role of IPR in fostering innovation and economic growth in the European ICT sector. Typically IPR analysis of industries focuses on patents. In practice, however, IPR strategies are developed combining the use of different IP rights. The scope of analysis considers this and looks at the joint use of patents, trademarks and industrial designs, each protecting a different type of knowledge-based asset. Based on these characteristics, the focus of the research is to provide an overview of the mechanisms typically employed in order to appropriate the returns from R&D investments. For each formal IPR, we briefly review the main contributions to the economic literature, both theoretical and empirical, on the rationale for its existence and the effects it generates on firms’ behaviour and market outcomes. We then highlight the most important emerging issues. In the final section of the study, we focus on the software industry.
    Keywords: Patents, copyright, trademarks, information and communication technologies, patent thickets, open source, software, mobile applications
    JEL: L11 L24 L96 O25 O31 O32 O34 O38 O52
    Date: 2015–11
  3. By: Mario Mariniello; Francesco Salemi
    Abstract: Highlights - Mobile telecommunications markets are an important part of the European Commission’s strategy for the completion of the European Union Digital Single. The use of mobile telecommunications – particularly mobile data access – is growing and becoming an increasingly important input for the economy. - The EU currently does not have a unified mobile telecommunications market. The EU compares favourably to the United States in terms of prices and connection speed, but lags behind in terms of coverage of high-speed 4G wireless connections. -Europe’s long-term goal should be to make data access easier by increasing highspeed wireless coverage while keeping prices down for users. An increase in cross-border competition could help to achieve that goal. - The Commission has two important levers to help stimulate cross-border supply - (a) ensuring competition in intra-country mobile markets in order to provide an incentive for operators to expand into other jurisdictions, and (b) reducing mobile operators’ costs of expansion into multiple EU countries. The further development of policies on international roaming and radio spectrum management will be central to this effort.
    Date: 2015–08
  4. By: Joshua Paul Meltzer
    Abstract: The Internet and the free flow of data across borders is becoming a key platform for international trade. Digital products can be sold online and the Internet provides opportunities for business to use the Internet to manage global supply chains, communicate with customers and access IT in the cloud. At the same time, governments are restricting the Internet in ways that reduce the ability of businesses and entrepreneurs to use the Internet as a place for international commerce and limit the access of consumers to goods and services. This article discusses the importance of the Internet and cross-border data flows for international trade. It proposes steps that governments should take to apply existing international trade rules and norms and identifies where new trade rules are required to further support the Internet and cross-border data flows and drivers of international commerce and trade.
    Keywords: trade;Internet;data;investment;cross-border data flows;trade law;WTO;FTA
    Date: 2015–12–17
  5. By: Mikhed, Vyacheslav (Federal Reserve Bank of Philadelphia)
    Abstract: Barclaycard U.S. is one of a growing number of banks offering cardholders free access to their FICO® Credit Scores with credit card products. On November 19, 2014, Paul Wilmore of Barclaycard U.S. presented Barclays’ rationale for offering this feature and provided his perspective on its development. He also discussed how consumers responded to this feature in terms of their spending, repayment behavior, and lifespan and intensity of their relationship with the bank. According to Wilmore, program participation is correlated with increased card spending, decreased credit utilization and delinquency, increased digital engagement, and lower cardholder attrition.
    Keywords: Credit Reports; Risk Scores; Credit Cards; Consumer Lending; Information; Credit Performance
    JEL: D12 D14 G21
    Date: 2015–09–30
  6. By: Wanda J. Orlikowski; Susan V. Scott
    Abstract: Our research focuses on the fast-changing landscape of contemporary social media where user-generated content is increasingly being used to evaluate a wide range of products and services. The move to online valuations is raising important questions about how valuations change when they are produced online by consumers and what outcomes they generate for the organizations being evaluated. To address these questions, we investigate two prominent hotel valuation schemes currently at work in the hospitality industry, and we identify significant differences in their valuation practices and outcomes. We develop a practice-based lens for examining the materiality of valuations, providing a way of understanding the differences we observed in terms of performativity. This lens explains both how valuations are actively produced in on going practice and how their production is significantly reconfiguring everyday practices of the organizations being evaluated. We conclude by considering the implications of our findings for research on valuation and organizations.
    Keywords: valuation; social media; practice lens; materiality; apparatus; performativity
    JEL: Q15 L91 L96
    Date: 2014–05
  7. By: Mikhed, Vyacheslav (Federal Reserve Bank of Philadelphia); Vogan, Michael (Federal Reserve Bank of Philadelphia)
    Abstract: We use the 2012 South Carolina Department of Revenue data breach to study how data breaches and news coverage about them affect consumers’ take-up of fraud protections. In this instance, we find that a remarkably large share of consumers who were directly affected by the breach acquired fraud protection services immediately after the breach. In contrast, the response of consumers who were not directly exposed to the breach, but who were exposed to news about it, was negligible. Even among consumers directly exposed to the data breach, the incremental effect of additional news about the breach was small. We conclude that, in this instance, consumers primarily responded to clear and direct evidence of their own exposure to a breach. In the absence of a clear indication of their direct exposure, consumers did not appear to revise their beliefs about future expected losses associated with data breaches.
    Keywords: Identity theft; Fraud alert; Data breach; Consumer protection; Credit report
    JEL: D14 D18 G02
    Date: 2015–11–16
  8. By: Minzoni Angela (LGI - Laboratoire Génie Industriel - EA 2606 - Ecole Centrale Paris); Eléonore Mounoud (LGI - Laboratoire Génie Industriel - EA 2606 - Ecole Centrale Paris)
    Abstract: This paper presents a co-design process in which operations managers and researchers engage in designing within the aim of radically innovate the operations' management thinking focusing on the whole operation's environment and system, beyond operation's optimization. Organization's operating models have a key influence on the organization's governance and strategy. The design of operating models is thus pivotal for organizations and a key stake for those whose operations are based on high speed information and sophisticated knowledge, such as intangible services like banking, financial, insurance or internet services. A main challenge is to produce new knowledge and tools to address specific intangible services' operating models at a time where service systems' operations cannot any more be understood and planned under a mechanistic view of pre-established continuous chains of standardized micro tasks. The focus in this paper is specifically on the challenges related to pass from a static and mechanistic middle and back office operation's system view to a dynamic, living system like operation's model. The design process itself is designed as an iterative action-learning process.
    Keywords: Super-vision,Sustainability,Business models,Participatory design
    Date: 2015–07–27
  9. By: Alexia Gaudeul (Department of Economics, Georg-August-Universität Göttingen); Caterina Giannetti (Jena Graduate School Human Behaviour in Social and Economic Change)
    Abstract: We study in the laboratory the impact of private information revelation on the selection of partners when forming individual networks. Our experiment combines a "network game" and a "public-good game". In the network game, individuals decide with whom to form a link with, while in the public-good game they decide whether or not to contribute. The variations in our treatments allow us to identify the effect of revealing one's name on the probability of link formation. Our main result suggests that privacy mechanisms affect partner selection and the consequent structure of the network: when individuals reveal their real name, their individual networks are smaller but their profits are higher. This indicates that the privacy costs of revealing personal information are compensated by more productive links.
    Keywords: privacy, social networks, public goods, trust
    JEL: D12 D85
    Date: 2015–12–01
  10. By: Keith Jeferry (1euroCRIS); George Kousiouris (National Technical University of Athens); Dimosthenis Kyriazis (National Technical University of Athens); Jörn Altmann (College of Engineering, Seoul National University); Augusto Ciuffoletti (Department of Computer Science, University of Pisa); Ilias Maglogiannis (Department of Digital Systems, University of Piraeus); Paolo Nesi (Department of Information Engineering, University of Florence); Bojan Suzic (Institute for Applied Information Processing and Communications); Zhiming Zhao (University of Amsterdam)
    Abstract: The cloud computing paradigm encompasses several key differentiating elements and technologies, tackling a number of inefficiencies, limitations and problems that have been identified in the distributed and virtualized computing domain. Nonetheless, and as it is the case for all emerging technologies, their adoption led to the presentation of new challenges and new complexities. In this paper we present key application areas and capabilities of future scenarios, which are not tackled by current advancements and highlight specific requirements and goals for advancements in the cloud computing domain. We discuss these requirements and goals across different focus areas of cloud computing, ranging from cloud service and application integration, development environments and abstractions, to interoperability and relevant to it aspects such as legislation. The future application areas and their requirements are also mapped to the aforementioned areas in order to highlight their dependencies and potential for moving cloud technologies forward and contributing towards their wider adoption.
    Keywords: Cloud Computing, Future Application Scenarios, Challenges, Complete Computing.
    JEL: C88 L11 L15 L86 M15
    Date: 2015–09
  11. By: Wilshusen, Stephanie M. (Federal Reserve Bank of Philadelphia)
    Abstract: The emergence of high-frequency administrative data and other big data offers an opportunity for improvements to economic forecasting models. This paper considers the potential advantages and limitations of using information contained in anonymized consumer credit reports for improving estimates of current and future economic conditions for various geographic areas and demographic markets. Aggregate consumer credit information is found to be correlated with macroeconomic variables such as gross domestic product, retail sales, and employment and can serve as leading indicators such that lagged values of consumer credit variables can improve the accuracy of forecasts of these macro variables.
    Keywords: Consumer credit information; Administrative data; Big data; Real-time data; Nowcasting; Forecasting
    JEL: C53 D12 D14
    Date: 2015–11–06
  12. By: Ariane Tichit (CERDI - Centre d'études et de recherches sur le developpement international - Université d'Auvergne - Clermont-Ferrand I - CNRS - Centre National de la Recherche Scientifique); Clément Mathonnat (CERDI - Centre d'études et de recherches sur le developpement international - Université d'Auvergne - Clermont-Ferrand I - CNRS - Centre National de la Recherche Scientifique); Diego Sébastien Landivar (Business School Clermont - France Business School Clermont - France Business School [France Business School])
    Abstract: This paper develops a new classification of non-banking currencies projects based on a lexical analysis from web data. The advantage of this method is to derive an endogenous typology of monetary projects, based on how currencies are depicted on the internet. Therefore, it allows to by-pass issues face for now in the literature to uncover a clear classification of non-banking currencies projects from exogenous elements. Our textual corpus consists in 320 web pages, corresponding to 1210 text pages. We first applied to our data a downward hierarchical clustering, which enables us to endogenously derive five different classes, allowing us to operate distinctions not only between non-banking currencies projects, but also between these latter and the standard monetary system. Then, we resorted to a similarity analysis and according to our results; all non-banking currencies projects define themselves in relation to the standard monetary system, with the exception of Local Exchange Trading Systems (LETs).
    Keywords: Non-banking money , Text mining , Web data , Downward hierarchical clustering , Similarity analysis
    Date: 2015–11–18

This nep-ict issue is ©2015 by Walter Frisch. It is provided as is without any express or implied warranty. It may be freely redistributed in whole or in part for any purpose. If distributed in part, please include this notice.
General information on the NEP project can be found at For comments please write to the director of NEP, Marco Novarese at <>. Put “NEP” in the subject, otherwise your mail may be rejected.
NEP’s infrastructure is sponsored by the School of Economics and Finance of Massey University in New Zealand.