{"title":"Comparative Analysis of E-Governance Indices and Future Prospects for India","authors":"Poonam Malik, Kavita Chaudhary, Ruchira Bhargav, Anupama Munshi","doi":"10.2139/ssrn.3463660","DOIUrl":"https://doi.org/10.2139/ssrn.3463660","url":null,"abstract":"E-government in India now integrates a wide variety of online services and provides one-stop shop to the public for all kinds of e-government services. It makes India more efficient in providing services in social and environmental area. This research paper is an attempt to showcase the frequent variations of various judging parameters with respect to that of the world leaders. This paper also gives an insight regarding comparative analysis of Indian and regional, sub–regional leaders for implementation of E-governance in their country. The United Nation survey reveals the ranking of various initiatives of e-Government indices every two years. The paper also analyses the reasons for shortcomings that acts as a bottleneck in providing citizen centric services and suggests various measures that can be implemented to further improve the rankings of various parameters when it comes to delivering hassle free e-Governance to the last man out there. The fundamentals of the study are the growth and progress of ICT in general and growth of various relevant indices in providing e-Governance in particular.","PeriodicalId":361748,"journal":{"name":"Communication & Technology eJournal","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128818984","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cloud Computing - Issues and Threat","authors":"Shikha Dhankar, V. Tiwari","doi":"10.2139/ssrn.3463179","DOIUrl":"https://doi.org/10.2139/ssrn.3463179","url":null,"abstract":"Over the web, with more prominent adaptability in a financially savvy way the cloud computing uncovers an exceptional potential to give on-request administrations to purchasers. While moving towards the idea of on interest benefit, moving everything on the distributive condition, asset pooling, security is the significant deterrent for this new imagined vision of registering capacity. Here present a far reaching review of the security issues for various elements influencing distributed computing. Moreover, there is point by point discourse on a few key themes with respect to installed framework, application, stockpiling framework, grouping related issues and some more. This paper likewise examines some open cloud and private cloud just as related security concerns.","PeriodicalId":361748,"journal":{"name":"Communication & Technology eJournal","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121527220","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Information Assurance Into Research Level in India: The Case of Possible Research Based Degrees","authors":"P. Paul, Sreeramana Aithal","doi":"10.21013/jmss.v15.n4.p8","DOIUrl":"https://doi.org/10.21013/jmss.v15.n4.p8","url":null,"abstract":"Information Assurance, in short, is also called as IA. The field is concerned with the security of information. However, additionally, it is also responsible for the different kind of contents in a different form. The field Information Assurance is very close to Information Security; however, it also deals with manual contents security. According to the Information Scientist, Information Assurance talks about the rules, regulation, framework designing and development of security of the information or contents. The field Information Technology is growing rapidly and different fields have been incorporated into this viz. Database Technology, Web Technology, Network Technology, Software Technology, Multimedia Technology, etc. The applications of Information Technology into different fields, sectors, areas are called Information Science (IS). This branch is closest to the Society and Community and responsible for Social Development; additionally, it talks about manual information-related activities. Hence, Information Assurance as deals with both Computing and Manual content security, so it is considered as a branch of Information Assurance. Internationally many universities have started degree programs in the field. India also holds a large number of Higher Educational Institutes and offers a variety of UG, PG and Research Degrees. Even in recent past few universities have started some of the specialized PhD and research degrees. But still, there is an absence in Information Assurance academic program in India including PhD Degree. This paper is a kind of theoretical framework in response to the potentiality of PhD and research-based degrees in the field of Information Assurance and allied areas.","PeriodicalId":361748,"journal":{"name":"Communication & Technology eJournal","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127300276","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Who Owns the Future? Data Trusts, Data Commons, and the Future of Data Ownership","authors":"Stuart Mills","doi":"10.2139/ssrn.3437936","DOIUrl":"https://doi.org/10.2139/ssrn.3437936","url":null,"abstract":"Who owns your data? And why do they? In this article, I consider various stakeholder claims to data ownership and the value generated by data, through a political economy lens. Following a data value framework established by the Open Data Institute, I first consider how data generates value from the point of its creation, how data as a resource imbues various stewardship obligations onto data controllers, and finally how – given competing interests – decision-making authority is apportioned across stakeholders. \u0000 \u0000This framework is then applied to three emerging models of data ownership: Laissez Faire, Data Trusts and Data Commons. The structural qualities of each model are revealed by an in-depth critique, before a visualisation of the data flows between stakeholders is offered. \u0000 \u0000Finally, I compare these models across categoric issues that emerge from this analysis, considering how each model tackles issues such as incentives, competition, innovation and feasibility.","PeriodicalId":361748,"journal":{"name":"Communication & Technology eJournal","volume":"144 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115631547","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Net Neutrality and Its' Repeal: Small Firms' Shareholders Shrug While Large Firms' Shareholders Turn","authors":"David J. Gabel, J. Nix, B. Mcnevin","doi":"10.2139/ssrn.3427573","DOIUrl":"https://doi.org/10.2139/ssrn.3427573","url":null,"abstract":"The FCCs decision to repeal Net Neutrality governance of Internet traffic has not ended the debate over whether such protections are needed. This paper investigates the effects of changes in Net Neutrality regulation through an event study that unlike previous studies, employs as a baseline model, the Fama/French Three-Factor model to capture differences in rm size. The results are striking: for the most part, investors in both small and large firms are indifferent to changes in Net Neutrality rules. However, the selection of Chairman Pai is a signifi cant negative event for the group of largest rms. One explanation consistent with this finding is that the appointment of Pai gave a green light not only for Net Neutrality's repeal but also signalled that the FCC would take a favorable stance towards merger activity. Large firms in a given industry are more likely to operate as acquirers and therefore, more likely to realize losses in shareholder value.","PeriodicalId":361748,"journal":{"name":"Communication & Technology eJournal","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129972160","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Marcela M. Gomez, Jacek Kibiłda, Martin Weiss, L. Dasilva
{"title":"Assessing the Sharing Potential in the 3.5 GHz Band: An Analytical Approach","authors":"Marcela M. Gomez, Jacek Kibiłda, Martin Weiss, L. Dasilva","doi":"10.2139/ssrn.3427511","DOIUrl":"https://doi.org/10.2139/ssrn.3427511","url":null,"abstract":"The three-tiered spectrum sharing proposal for the 3.5 GHz band appears as one of the most structured sharing guidelines developed by the FCC. This tiered-sharing proposal makes the 3.5 GHz band a flexible sharing framework; however, flexibility comes at the cost of increased complexity of the underlying physical network model, which inhibits the direct assessment of the quality levels available to incumbents or prospective service providers. Here we propose a stochastic framework that considers operation of multiple service providers that deploy radio infrastructure that will operate in the 3.5 GHz band. Using this framework, we can evaluate network performance, here represented as potential throughput, for a range of spectrum sharing scenarios involving the operation of a spectrum access service. Effectively, we can explore the conditions for optimal and fair allocation of spectrum channels between the priority access and generalized access tiers, and identify scenarios under which interested providers seek a priority access license, instead of opting for generalized access. The results produced by our framework are intended to help policy makers and prospective service providers make informed decisions, grounded in physical reality, on resource access and applicable regulation.","PeriodicalId":361748,"journal":{"name":"Communication & Technology eJournal","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128836814","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design of Institutions for Spectrum Governance: Lessons from Spectrum Trading in India","authors":"Rekha Jain","doi":"10.2139/ssrn.3427169","DOIUrl":"https://doi.org/10.2139/ssrn.3427169","url":null,"abstract":"Introduction: Since more than 80% of data usage and Internet access happens over mobiles in emerging economies, effective spectrum regulation is very critical for them. To facilitate spectrum availability, many developing countries are attempting to transition from a command and control mode to a more open approach by adopting instruments such as spectrum auctions, leasing and trading. The institutional environment in emerging economies is in its nascent stage, and is characterized by poor formalization of processes, institutional voids, and inadequate human resource capabilities. In this situation, adoption of new and flexible instruments associated with open regimes often leads to ineffective outcomes and poor spectrum governance (Jain and Dara, 2017; Minervini, 2014). In order to study the constituents for good institutional design, we select a case study of spectrum trading in India. This involved an incumbent operator RCom (seller) and a new disruptive player RJio (buyer). Despite the urgency and necessity for RCom and RJio to remain solvent and plan aggressive growth respectively, the deal did not go through. Not only did RCOM and RJio have to contend with the sectoral regulatory framework (through the Department of Telecommunications, Telecom Regulatory Authority of India), the suo moto cognizance of this transaction by the Competition Commission of India, led to the involvement of various appellate bodies and the Supreme Court causing delays. Subsequently, a modified spectrum regulatory regime emerged. Objectives: Our objective is to develop the framework for an effective institutional design for spectrum regulation, including trading. While there are many studies that cover developed economies (Anker, 2017, Jain and Dara, 2017), these are unable to account for the complexities in developing economies adequately. Our objective is to fill this gap. Methodology: We adopt the single case study approach ( Yin, 2009) exploring the spectrum trade deal between RCom and RJio in the context of spectrum regulation from 1994/95 to 2018. We use detailed available data from secondary sources. We shall adopt the theoretical lens of regulatory spaces, institutional environment, and regulatory capacity. We contextualize our study with examples from spectrum trading in other countries (USA, UK). Expected Outcomes: This paper identifies the underlying constituent elements of a robust institutional design using the lens of regulatory spaces. The paper extends it to an environment characterized by institutional voids, poor design/scope of the regulatory agencies and inadequate mechanism for harnessing dispersed regulatory resources. We show how an appropriate institutional design in the context of developing countries could support the public policy objectives and ensure harmonization between flexibility in instruments and coherence in institutional design, a useful contribution for policy makers.","PeriodicalId":361748,"journal":{"name":"Communication & Technology eJournal","volume":"252 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122719201","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Marcela M. Gomez, Pedro J. Bustamante, Martin Weiss, I. Murtazashvili, M. J. Madison, Wilson Law, Tymofiy Mylovanov, Herminio Bodon, Prashabnt Krishnamurthy
{"title":"Is Blockchain the Next Step in the Evolution Chain of [Market] Intermediaries?","authors":"Marcela M. Gomez, Pedro J. Bustamante, Martin Weiss, I. Murtazashvili, M. J. Madison, Wilson Law, Tymofiy Mylovanov, Herminio Bodon, Prashabnt Krishnamurthy","doi":"10.2139/ssrn.3427506","DOIUrl":"https://doi.org/10.2139/ssrn.3427506","url":null,"abstract":"The blockchain is a decentralized solution for handling transactions where we are concerned (among other aspects) with the accuracy and verification of transactions. One of its main promises is to eliminate the need for centralized entities or intermediaries and legal enforcement. Rather than trusting self-interested human intermediaries, the blockchain provides an alternative that relies on transparent computational protocols (Werbach 2018). \u0000 \u0000In this paper, we delve into this broker-less claim and analyze whether the blockchain needs an intermediary to allow for widespread access to its functionality and whether the blockchain itself is an intermediary. The latter would turn the blockchain into a new type of middleperson that constitutes a shift in trust from humans or traditional agents to computer code. In other words, the next step in the evolution chain of intermediaries from humans to machines. \u0000 \u0000The overall goal of this paper is to get the discussion started on the relationship between the blockchain and intermediaries so that we can think of plausible policy, governance, and regulatory measures to address the shortcomings and increase the opportunities for the widespread adoption of the blockchain technology in its different areas of impact. We begin by providing an overview of the workings of the blockchain before shifting our focus to an economic analysis of blockchain, where we argue that the economics literature has yet to explicitly consider blockchain as a transformative intermediary. We then explore situations in which the blockchain acts as a middleperson, as well as those where it requires an intermediary. We conclude by reflecting on the different issues that the blockchain-intermediary link entails in the policy domain.","PeriodicalId":361748,"journal":{"name":"Communication & Technology eJournal","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125846788","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Tale of Two Countries: Mobile Communications, the Internet and the Digital Economy in China and India","authors":"Rekha Jain, Krishna P. Jayakar, P. K. Neogi","doi":"10.2139/ssrn.3421696","DOIUrl":"https://doi.org/10.2139/ssrn.3421696","url":null,"abstract":"This paper focuses on the impact of the widespread penetration and use of intelligent mobile devices, particularly smartphones, married to broadband mobile networks, in China and India. China and India are the largest and second largest mobile markets in the world, with some 1.3 billion and 1.2 billion mobile subscriptions respectively. These two countries have leapfrogged directly into ubiquitous mobile communications networks, although an urban-rural gap remains in the deployment and use of broadband mobile networks. \u0000 \u0000As mobile Internet use, combined with electronic transactions and payments, becomes the new norm, policymakers will need to formulate new policies to address challenges related to the large-scale migration of mobile users to broadband networks and the use of Internet-based transactional services. The authors discuss and compare strategies being used in China and India, and how these are affected by their different economic and digital ecosystems. We analyze what has worked, what did not, the problems encountered and whether there are lessons to be learned that are of general applicability, as well as for these two particular countries.","PeriodicalId":361748,"journal":{"name":"Communication & Technology eJournal","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116917122","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Governance Turn in Information Privacy Law","authors":"J. Winn","doi":"10.2139/SSRN.3418286","DOIUrl":"https://doi.org/10.2139/SSRN.3418286","url":null,"abstract":"The governance turn in information privacy law is a turn away from a model of bureaucratic administration of individual control rights and toward a model of collaborative governance of shared interests in information. Collaborative information governance has roots in the American pragmatic philosophy of Peirce, James and Dewey and the 1973 HEW Report that rejected unilateral individual control rights, recognizing instead the essential characteristic of mutuality of shared purposes that are mediated through information governance. America’s current information privacy law regime consists of market mechanisms supplemented by sector-specific, risk-based laws designed to foster a culture of compliance. Prior to the GDPR, data protection law compliance in Europe was more honored in the breach than the observance, so the EU’s strengthening of its bureaucratic individual control rights model reveals more about the EU’s democratic deficit than a commitment to compliance. The conventional “Europe good, America bad” wisdom about information privacy law obscures a paradox: if the focus shifts from what “law in the books” says to what “law in action” does, it quickly becomes apparent that American businesses lead the world with their efforts to comply with information privacy law, so “America good, Europe bad” might be more accurate. Creating a federal legislative interface through which regulators and voluntary, consensus standards organizations can collaborate could break the current political stalemate triggered by California’s 2018 EU-style information privacy law. Such a pragmatic approach to information governance can safeguard Americans’ continued access to the benefits of innovation and economic growth as well as providing risk-based protection from harm. America can preserve its leadership of the global information economy by rejecting EU-style information privacy laws and building instead a flexible, dynamic framework of information governance capable of addressing both privacy and disclosure issues simultaneously.","PeriodicalId":361748,"journal":{"name":"Communication & Technology eJournal","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117093553","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}