Nir B. Kshetri

There are 167 included publications by Nir B. Kshetri :

TitleDateViewsBrief Description
The 2018 Winter Olympics: A Showcase of Technological Advancement 2018 2220 The 2018 Olympic Winter Games in Pyeongchang was a showcase of South Korea’s technological advancements and sophistication. Sponsors such as Intel, KT, and Samsung demonstrated some record-breaking achievements during the games, and viewers and athle...
2021 State of the Practice in Data Privacy and Security 2021 301 The data privacy and security landscape is changing drastically due to new laws and regulations, the COVID-19 pandemic, and other emerging trends. This article looks at the current state of these issues.
5G in E-Commerce Activities 2018 3339 5G services, on their own or in combination with other technologies, are likely to have a transformative impact on e-commerce activities.
5G, Security, and You 2021 647 As the increased capacity of 5G has changed the process of viewing, managing, and controlling data security, it also brings added security concerns.
The Adoption of E-Business by Organizations in China: An Institutional Perspective 2007 4306 The Chinese e-business industry has a number of unusual features. Institutional factors such as strong nationalism, the state's entrenchment in the economy, political cognitive and political normative factors, regulative uncertainty, the role of prof...
Artificial intelligence in developing countries 2020 7482 Al applications are tackling economic and social challenges facing developing countries. Economically speaking, Al possesses unique mechanisms that allow it to have significant impacts on economic productivity. While developing countries may experien...
Banking on Availability 2017 847 Combating the growing threat to banks of distributed denial-of-service attacks will demand more than keeping pace in a technological arms race; it will also require greater information sharing among banks and other cybersecurity entities.
Barriers to e-commerce and competitive business models in developing countries: A case study 2007 25386 This paper integrates and extends research on e-commerce in the developing world. We use three categories of feedback systems–economic, sociopolitical and cognitive—to offer a simple model of e-commerce barriers in the developing world. We also exami...
Big Data’s Role in Expanding Access to Financial Services in China 2016 3219 General consumer and business finance companies have had limited success in serving the needs of economically active low-income families and micro-enterprises cost-effectively and sustainably in emerging economies such as China. Recent advances in co...
Big Data's Impact on Privacy, Security and Consumer Welfare 2014 23889 The purpose of this paper is to highlight the costs, benefits, and externalities associated with organizations? use of big data. Specifically, it investigates how various inherent characteristics of big data are related to privacy, security and consu...
Big Data as A Tool to Monitor and Deter Environmental Offenders in the Global South: A Multiple Case Study 2020 616 While prior research has looked at big data’s role in strengthening the environmental justice movement, scholars rarely examine the contexts, mechanisms and processes associated with the use of big data in monitoring and deterring environmental offen...
Big data solutions for micro-, small- and medium-sized enterprises in developing countries 2019 793 In recent years, micro-, small-, and medium-sized enterprises (MSMEs) in developing countries are increasingly benefiting from big data solutions. Such solutions have helped developing world -based MSMEs to improve business processes and market intel...
Blockchain adoption in supply chain networks in Asia 2019 4185 Reports on how blockchain can impact industries. IN 2009, Toyota announced a recall of four million vehicles due to faulty gas pedals.1 The recall cost an estimated US$2 billion. The company had received pedals from many suppliers. It lacked mechanis...
Blockchain and The Economics of Customer Satisfaction 2019 2058 Companies can satisfy their customers' by delivering high value. They can do so by reducing product costs or by improving customers perception of benefits of the products. Blockchain can help achieve these goals.
Blockchain and the Economics of Food Safety 2019 1666 Blockchain technology has a potential to address many of the food safety challenges facing the world today. Some of the most promising blockchain applications developed to data have been in the food supply chains.
Blockchain and Electronic Healthcare Records 2018 1153 There is a growing need to both secure patient health data from unauthorized breaches and at the same time make access to such data easier for patients. Blockchain may provide a solution.
Blockchain and sustainable supply chain management in developing countries 2021 1485 Theoretical, empirical and anecdotal evidence suggests that there are more violations of sustainability principles in supply chains in developing countries than in developed countries. Recent research has demonstrated that blockchain can play an impo...
Blockchain as a tool to facilitate property rights protection in the Global South: lessons from India’s Andhra Pradesh state 2021 958 The lack of a comprehensive property rights system is an issue of pressing concern in most economies in the Global South. Property rights-related issues have important social, economic and environmental consequences. This paper argues that one of the...
Blockchain in Developing Countries 2018 5778 A large proportion of the population in the developing world can benefit from blockchain. In this article, the authors discuss key concerns that have been raised regarding institutions in the developing world and evaluate the potential role of blockc...
Blockchain systems and ethical sourcing in the mineral and metal industry: a multiple case study 2022 2069 Purpose: The purpose of this paper is to examine blockchain's roles in promoting ethical sourcing in the mineral and metal industry. Design/methodology/approach: It analyzes multiple case studies of blockchain projects in the mineral and metal indust...
Blockchain-Based Financial Technologies and Cryptocurrencies for Low-Income People: Technical potential versus practical reality 2021 855 Several blockchain-based financial technologies and cryptocurrencies have been launched for low-income people. Blockchain’s technical potential can be used to serve the needs of unbanked and underbanked populations, but there is no evidence that thes...
Blockchain-Enabled E-voting 2018 10972 Blockchain-enabled e-voting (BEV) could reduce voter fraud and increase voter access. Eligible voters cast a ballot anonymously using a computer or smartphone. BEV uses an encrypted key and tamper-proof personal IDs. This article highlights some BEV ...
Blockchain’s Roles in Meeting Key Supply Chain Management Objectives 2018 11016 Arrival of blockchain is set to transform supply chain activities. Scholars have barely begun to systematically assess the effects of blockchain on various organizational activities. This paper examines how blockchain is likely to affect key supply c...
Blockchain’s roles in strengthening cybersecurity and protecting privacy 2017 6821 This paper evaluates blockchain's roles in strengthening cybersecurity and protecting privacy. Since most of the data is currently stored in cloud data centers, it also compares how blockchain performs vis-vis the cloud in various aspects of security...
Blockchains and International Business 2019 932 Discusses how blockchain is transforming international business practices and relatioships. Blockchain and smart contracts are transforming international trade activities. Proof-of-concepts (PoCs), prototypes, pilot projects, and actual deployments i...
Business perceptions of regulative institutions in Central and Eastern Europe 2010 2772 Purpose – The purpose of this paper is to investigate, theoretically and empirically, how entrepreneurial firms' perceptions of formal institutions differ across Central and Eastern European (CEE) economies. Design/methodology/approach – The paper us...
Can Blockchain Strengthen the Internet of Things? 2017 23013 Blockchain—a kind of distributed ledger technology—has been described in the popular press as the next big thing. Put simply, a blockchain is a data structure that makes it possible to create a tamper-proof digital ledger of transactions and share th...
China’s Data Privacy Regulations: A Tricky Trade-Off between ICT’s Productive Utilization and Cyber-Control 2014 2011 China's data privacy laws and regulations reflect the tension it faces between using modern information and communications technologies (ICTs) to maintain unity and stability via cybercontrol and using them to stimulate economic growth and productivi...
China’s digital yuan: Motivations of the Chinese government and potential global effects 2022 438 This article highlights the key motivations behind China’s plan to launch the digital yuan and reviews the potential impacts on China and abroad. The article analyzes the digital yuan’s benefits to consumers, such as a reliable low-risk, low cost, an...
China’s Social Credit System: Data, Algorithms and Implications 2020 4084 Data and algorithms for China's social credit system (SCS) are a topic of great current interest. Nonetheless, few details regarding China’s SCS have been officially released. What is clear, however, is that China's social credit system uses broader ...
Chinese and Indian Trade and Investment Links with Sub-Saharan Africa: Institutions, Capabilities and Competitive Advantage 2013 3358 Because of cultural, historical and geopolitical differences, Chinese and Indian businesses have exhibited noteworthy differences in their operations in the economies in the Sub-Saharan Africa SSA. Drawing on theories related to institutions and dyna...
Chinese institutions and standardization: The case of government support to domestic third generation cellular standard 2011 3573 There are unique and distinct institutional processes associated with the Chinese government's support of the domestically developed third generation (3G) cellular standard, TD-SCDMA. After postponing several times, China awarded three third generati...
Cloud Computing and EU Data Privacy Regulations 2013 3705 The European Union’s Data Protection Directive has been its major legislative instrument for handling consumer data. While the Directive hasn’t been revised since its passage in 1995, there have been dramatic changes in the ways personal data...
Cloud Computing in Developing Economies 2010 9923 The developing world must exploit the opportunities afforded by cloud computing while minimizing the associated risks to allow access to advanced IT infrastructure, data centers, and applications and protect sensitive information.
Cloud Computing in the Global South: Drivers, Effects and Policy Measures 2011 2234 Cloud computing has started to transform economic activities in the global South. Many businesses are taking advantage of the pay-as-you-go model of the technology, and its scalability and flexibility features, and government agencies in the South ha...
Cloud Computing in India 2012 2512 Cloud computing is still in its infancy in India, but as economic and institutional factors improve, it could greatly accelerate India's digitization and transform how cell phones are used. If appropriate measures are adopted at various levels, the c...
Cloud Computing in Sub-Saharan Africa 2013 1694 Cloud-related innovations and services are becoming fundamental sources of economic and societal change in Sub-Saharan African economies, which are embracing cloud computing. This analysis of the cloud market examines both driving and constraining fa...
Complementary and Synergistic Properties of Blockchain and Artificial Intelligence 2019 765 Artificial intelligence (AI) and blockchain are likely to bring powerful economic and social effects. Blockchain's ability to cryptographically validate identities and transactions and create immutable records can enhance trust, transparency, and acc...
Computing and Socio-Economic Transformations 2021 754 This year marks the 75th anniversary of the IEEE Computer Society. Join us as we commemorate some of the historic milestones in computing technology from that period.
COVID-19 Meets Big Tech 2021 725 In summary, there are various effects of COVID-19 on big tech that clearly cannot be lumped together as a single category. The pandemic has led to a heavy cut in discretionary expenditure, which has hit businesses such as Twitter and Facebook severel...
Creation, Deployment, Diffusion and Export of Sub-Saharan Africa-originated Information Technology-Related Innovations 2016 1464 A number of high profile innovations have been created in Sub-Saharan Africa. In this paper, we examine the mechanisms associated with the development, deployment, diffusion, and export of SSA-originated innovations. The paper gives special considera...
Cross-National Heterogeneity in Retail Spending: Evidence from Longitudinal Country-Level Data 2012 1440 Economies worldwide vary greatly in terms of how much their consumers spend on various types of retail activities. The purpose of this paper is to examine how the regulatory characteristics as well as the natures and strategies of businesses are rela...
Cryptocurrencies: Transparency vs. Privacy 2018 1813 Cryptocurrencies can have significant privacy costs. A motivated adversary has available a range of actions to identify the actual user associated with a cryptocurrency account. By taking appropriate measures, cryptocurrency users can minimize privac...
Cryptojacking 2022 28 The cybersecurity community never ceases to amaze or disappoint; it continually adds words to the English dictionary. Here’s another: “cryptojacking.” It’s not carjacking or hijacking, but similar. It is a word that you might wish to know more about....
Cyber-threats and cybersecurity challenges: A cross-cultural perspective 2015 4940 As is the case of any economic activity, cultural factors are tightly linked to cybercrimes, cyberattacks and cybersecurity. Just like any other activities, some forms of cybercrime may be more acceptable in some cultures than in others. For some cat...
Cyber-victimization and Cybersecurity in China 2013 1741 Seeking insights into cyberattacks associated with China.
Cybercrime and Cyber-security Issues Associated with China: Some Economic and Institutional Considerations 2013 15024 China is linked to cybercrimes of diverse types, scales, motivations and objectives. The Chinese cyberspace thus provides an interesting setting for the study of cybercrimes. In this paper, we first develop typology, classification and characterizati...
Cybercrime and Cybersecurity in Africa 2019 3103 Africa has been among the fastest growing regions in terms of cybercrime activities. The continent is also a source of significant cyberattacks targeting the rest of the world. However, a number of measures have been taken to address cyber-threats an...
Cybercrime and Cybersecurity in India: Causes, Consequences and Implications for the Future 2016 13493 Cybercrime is rising rapidly in India. Developing economies such as India face unique cybercrime risks. This paper examines cybercrime and cybersecurity in India. The literature on which this paper draws is diverse, encompassing the work of economist...
Cybercrime and Cybersecurity Issues in the BRICS Economies [Editorial] 2015 2000 Cybercrime and cybersecurity issues in the BRICS countries have important global implications, both politically and economically. All of the fast-growing BRICS economies are members of the Group of Twenty. These economies’ cybersecurity frameworks ha...
Cybercrimes in the Former Soviet Union and Central and Eastern Europe: Current Status and Key Drivers 2013 8562 Some economies in the Former Soviet Union and Central and Eastern Europe (FSU&CEE) are known as cybercrime hotspots. FSU&CEE economies have shown complex and varied responses to cybercrimes due partly to the differential incentives and pressures they...
Cybersecurity and Development 2016 2387 While scholars and policymakers have realized the importance of information and communication technologies in economic development, relatively less attention has been given to the role of cybersecurity. This research sheds light on issues associated ...
Cybersecurity in India: Regulations, governance, institutional capacity and market mechanisms 2017 4515 The meteoric rise in cybercrime has been an issue of pressing concern to businesses and consumers in India. Among the Indian organizations, which responded to KPMG’s (2014) Cybercrime Survey report 2014, 89% considered cybercrime as a “major threat” ...
Cybersecurity Strategies of Gulf Cooperation Council Economies 2016 366 The countries that comprise the Cooperation Council for the Arab States of the Gulf (GCC)—Bahrain, Kuwait, Oman, Qatar, Saudi Arabia, and the United Arab Emirates (UAE)—have become attractive cyber-attack targets thanks to their oil-fueled prosperity...
Cyberthreats under the Bed 2018 436 Internet-connected toys provide an often-overlooked avenue for breaching personal data, especially of those most vulnerable. Government and private measures can minimize the risks, but responsibility for monitoring smart toy usage ultimately lies wit...
Cyberwarfare in the Korean Peninsula: Asymmetries and Strategic Responses 2014 5756 In this paper, we argue that the two Koreas’ intentions and actions on the cyber front point toward the possibility that they have engaged in cyber warfare against each other. From South Korea’s standpoint, a key concern has been North Korea’s advanc...
Cyberwarfare: Western and Chinese Allegations 2014 1753 A large proportion of China-originated cyberattacks are allegedly aimed at extracting high-value intellectual property such as trade secrets. Senior government officials from China and the US have made frequent verbal and written allegations that the...
Data labeling for the artificial intelligence industry: Economic impacts in developing countries 2021 1626 Artificial intelligence (AI) applications, although at a nascent stage of development, are already having considerable economic and social impacts in developing countries.1 An equally fascinating and important aspect of the development of the global ...
Data Privacy Considerations for Central Bank Digital Currencies in Asia–Pacific Countries 2022 6 Central bank digital currencies (CBDCs) raise various data privacy concerns. This article analyses regulatory frameworks for data privacy related to CBDCs in the Asia–Pacific region.
Design of Blockchain-based Precision Health-Care Using Soft Systems Methodology 2020 207 Purpose: The purpose of this paper is to describe the application of soft systems methodology (SSM) to address the problematic situation of low opt-in rates for Precision Health-Care (PHC). Design/methodology/approach: The design logic is that when t...
Determinants of the Global Diffusion of B2B E-Commerce 2002 6030 Compared to business-to-consumer (B2C) e-commerce, business-to-business (B2B) e-commerce is larger, growing faster and has less unequal geographical distribution globally. In this paper, we examine the current stage of B2B e-commerce development acro...
Determinants of the Locus of Global E-commerce 2001 3944 Internet and e-commerce are experiencing hyperbolic growth rates and highly asymmetric global distribution. There is also a significant variation worldwide in the means used to access the Internet and the e-commerce models adopted. This paper attempt...
Developing Successful Entrepreneurial Ecosystems: Lessons from a Comparison of an Asian Tiger and a Baltic Tiger 2014 2460 Purpose– There are strong similarities and striking differences in Estonia's and South Korea's entrepreneurial ecosystems. The purpose of this paper is to seek to compare and contrast these two economies in terms of key indicators related to impacts,...
The development of market orientation: a consideration of institutional influence in China 2009 3899 Purpose – China has followed an unique transition from central planning to a market economy. The purpose of this paper is to examine how China's unique blend of capitalism and socialism has influenced Chinese firms? market orientation. Design/methodo...
Development of a Smart City and its Adoption and Acceptance: the Case of New Songdo 2014 2133 South Korea's new Songdo city provides a spectacular example of a smart city, which is developed as an aerotropolis, and a ubiquitous city (U-City). An intriguing aspect of the development of the new Songdo city is that supportive formal and informal...
The Diaspora as a Change Agent in Entrepreneurship-Related Institutions in Sub-Saharan Africa 2013 2150 Diaspora networks' role in supporting and stimulating entrepreneurial activities in Sub-Saharan African (SSA) economies need hardly be elaborated. For instance, some SSA countries have established government agencies to encourage diasporas to help lo...
Diaspora Networks, Non-Economic Remittances and Entrepreneurship Development: Evidence from Some Economies in Latin America 2015 2710 Diaspora networks' non-economic remittances in the forms of social, political, cultural and technical contributions to their homeland play important roles in entrepreneurship and economic development. In this paper, we examine the effects of such rem...
Diffusion and Effects of Cyber-Crime in Developing Economies 2010 15441 Cyber-crime's footprints across the developing world are getting bigger. The aim of this article is to examine the structure of cyber-crimes in developing economies. Its central idea is that economic and institutional factors facing cyber-criminals a...
Diffusion pattern of Linux: An assessment on major technology dimensions 2005 1856 This paper attempts to gain an understanding of the diffusion dynamics of Linux by assessing it on Rogers’ technology dimensions — relative advantage, compatibility, complexity, observability, and trialability. The analysis makes clear that Linux pos...
Digital healthcare: Historical development, applications, and future research directions 2020 3601 It has been forecasted by the World Economic Forum that by 2040, annual global healthcare spending will be about US$25 trillion (Akpakwu & Seidman, 2018). Technological developments in diverse areas such as the Internet of Things, big data analytics,...
Do Crypto-Currencies Fuel Ransomware? 2017 4965 As ransomware spreads, victimization rates escalate. A Finnish cybersecurity firm’s F-Secure State of Cyber Security 2017 report stated that there was only one ransomware “variant” in 2012. This increased to 35 in 2015 and 193 in 2016.(1) Individuals...
Drivers of Cross-national Variation in Advertising Spending: A Longitudinal Analysis of the Effects of Freedom and Foreign Direct Investment 2016 1321 We examine the effects of freedom and foreign direct investment on ad spending. We also assess possible differential effects of foreign direct investment (FDI) on ad spending across economies with different income levels. We employed random effect ti...
E-Commerce Patterns in South Asia: A Look Beyond Economics 2005 2496 Conflicting and complex forces are shaping the diffusion patterns of the Internet and e-commerce in South Asia. Drawing upon the literature on institutional theory, we explore the drivers and inhibitors of the Internet in South Asian countries. We ex...
Economics and politics of advertising: Evidence from the enlarging European Union 2007 2923 Purpose – The purpose of this paper is to investigate the impacts of economic and political factors on advertising industry in the enlarging EU. Design/methodology/approach – The paper employed random effect time series cross-section (TSCS) models an...
The Economics Behind Food Supply Blockchains 2020 1066 The use of blockchain in food and beverage supply chains may offer benefits by improving food safety, supplier reputation, the visibility of small farmers, efficiency in tracing food contamination sources, transparency, and accountability.
Economics of artificial intelligence in the Gulf Cooperation Council countries 2021 163 This article reviews how artificial intelligence is being developed and used in key economic sectors in the Gulf Cooperation Council economies.
The Economics of Blockchain-Based Supply Chain Traceability in Developing Countries 2021 287 Shirking, cheating, and other misbehaviors are pervasive in many developing countries, increasing the costs of economic exchanges. Blockchain-based solutions may address these problems and help developing world-based economic actors to engage in exch...
The Economics of Central Bank Digital Currency 2021 2678 Central bank digital currency (CBDC) is emerging as the future of banking and payments. We analyze CBDCs’ benefits to consumers and the economy and some concerns associated with their use.
The Economics of Click Fraud 2010 6259 Click fraud is a substantial threat in the cyberworld. Here, the author examines the contexts, mechanisms, and processes associated with the click-fraud industry from an economics viewpoint. The nature of electronic channels, characterized by asymmet...
The Economics of Cyber-Insurance 2018 2355 The cyber-insurance market currently is at a nascent stage. According to the German reinsurance company Munich Re, worldwide spending on cyber-insurance was US3.4-US4 billion in 2017, which is estimated to increase to US8-US9 billion by 2020 (https:/...
The Economics of Cyberattacks on Brazil 2020 1347 Cyberattacks have significant economic, political, and privacy-related impacts in Brazil. Regulatory and enforcement measures have been insufficient to prevent these attacks. The authors analyze these trends and assess some recent measures to address...
The Economics of Digital Twins 2021 2550 Digital twins provide a number of economic, health, social, and environmental benefits. Their value can be amplified by combining them with other technologies and tools.
The Economics of “Fake News” 2017 5791 False information has economic, political, and social consequences. The authors analyze the real and perceived costs and benefits to those that engage in the creation and platform support of false information. Special consideration is given here to d...
The Economics of the Fifth Generation Cellular Network 2019 1590 Fifth generation cellular services are expected to rapidly take off in the next few years. In combination with other advanced technologies, they are likely to transform key economic activities.
The Economics of the Internet of Things in the Global South 2016 2905 While the Internet of Things (IoT) is not new, its key components are becoming increasingly affordable now, which makes the technology extremely attractive for the Global South. By collecting data from various IoT sources, combining them with data fr...
Economics of Linux Adoption in Developing Countries 2004 4159 There was once a time when developing software required only three main ingredients: a user with a need, a computer, and a programmer. Once these three ingredients came together, the resulting team could largely ignore everything in the outside wo...
Emerging Economies and the Global Financial Crisis: Evidence from China and India 2011 2490 The global financial crisis (GFC) spread from the US and the EU economies to the developing world. In this article, we seek to gain a better understanding of clear contexts, attendant mechanisms, and processes associated with the GFC in China and Ind...
The Emerging Role of Big Data in Key Development Issues: Opportunities, Challenges, and Concerns 2014 2018 This paper presents a review of academic literature, policy documents from government organizations and international agencies, and reports from industries and popular media on the trends in Big Data utilization in key development issues and its wort...
Entrepreneurship in post-socialist economies: A typology and institutional contexts for market entrepreneurship 2009 4622 There is growing recognition among post-socialist (PS) economies that free-market entrepreneurship is essential for ultimately improving their economic future. The promotion of market entrepreneurship, however, has been a challenging experience for t...
EU and US Cybersecurity Strategies and Their Impact on Businesses and Consumers 2013 1820 To secure information systems and protect vital national and global infrastructure, IT professionals need to understand key elements of national cybersecurity strategies and their impact and coordinate their efforts at local, national, and global lev...
The evolution of the Chinese online gaming industry 2009 15501 Purpose – This paper seeks to examine the growth of the Chinese online gaming industry and disentangle the mechanisms behind the emergence of unique online gaming culture in China. Design/methodology/approach – This is a review paper that provides a ...
The Evolution of Cyber-Insurance Industry and Market: An Institutional Analysis 2020 1133 The cyber-insurance (CI) market is at a nascent stage. This paper investigates how the contexts provided by formal and informal institutions affect the development of the CI industry. It highlights the nature, origin, and implications of CI-related i...
The Evolution of the Internet of Things Industry and Market in China: An Interplay of Institutions, Demands and Supply 2017 2375 This paper seeks to provide some explanation as to how demand-, supply- and institutions-related factors in China have affected the creation and diffusion of Internet of Things (IoT)-related products and services. Concerning demand side factors the p...
The Evolution Of The Offshore Outsourcing Industry: Brazil Versus Other BRIC Economies 2012 398 Brazil has expressed an intention to compete with India in offshoring. This paper examines the outsourcing industry in Brazil. First, we analyze how Brazil’s well-developed domestic IT market, its manufacturing prowess and export orientation have gen...
Evolving uses of artificial intelligence in human resource management in emerging economies in the global South: some preliminary evidence 2021 5131 Purpose: The purpose of this paper is to examine the use of artificial intelligence (AI) in human resource management (HRM) in the Global South. Design/methodology/approach: Multiple case studies of AI tools used in HRM in these countries in recruiti...
An Exploratory Study of the Functional Forms of Export Market Identification Variables 2006 2964 Exploratory research demonstrates that the import market potential, import market competitiveness, and "barriers-to-imports" variables can be successfully integrated into a shift-share framework for identifying export markets. The authors present man...
Factors Impacting the Adoption of the Internet among SMEs 2004 8372 The Internet can extend market reach and operational efficiency of small and medium enterprises (SMEs) and enhance their contributions to the U.S. economy. This paper reports an empirical study conducted to identify the factors that impact SMEs' invo...
Financial Technology in Latin America 2021 753 Latin America has a large unbanked or underbanked population that owns smartphones. This population is in a position to benefit from the rapid growth in Fintech companies such as neobanks in the region. New regulatory frameworks have also evolved in ...
Foreign Firms’ Access to the Japanese Market 2014 948 This paper examines interrelationships among foreign firms' perceptions of market barriers related to the access, quality of inter-organisational institutions and their market commitment and performance in Japan. Our findings suggest that foreign fir...
Fostering Startup Ecosystems in India 2016 4070 Because of India’s improving entrepreneurial performance, some analysts consider the country as the next Asian miracle (Huang, 2008). The State's domination over the economy is gradually declining and there are some signs that the country is moving t...
Gambling with Source Code 2016 778 Tech companies required to comply with controversial regulations in foreign countries as a cost of doing business there must trade off the potential economic benefits with the risk of long-term harm.
Gender asymmetry in cybersecurity: Socioeconomic causes and consequences 2022 39 This article reviews the causes of gender asymmetry in cybersecurity and argues that women’s increased participation can strengthen the industry and improve business outcomes. It also discusses ways to attract and retain women in the field.
Global Cybersecurity: Issues and Concerns [Editorial] 2013 777 By all accounts, the global cybercrime industry is significantly bigger than most of the major and well-known underground and underworld industries. The most often cited figure for the annual worldwide loss to cybercrime is US$1 trillion (Kshetri, 20...
Government Policy, Continental Collaboration and the Diffusion of Open Source Software in China, Japan, and South Korea 2007 3077 The scale of development and deployment of open source software (OSS) in the three Northeast Asian countries–China, Japan, and South Korea–is large enough to be noticed at the global level. OSS has redefined the dynamics of software markets in the th...
Hacking Power Grids: A Current Problem 2017 3310 Cyberattacks against power grids and other critical infrastructures are increasing in frequency and severity. Government and industry stakeholders must take more active steps to address the problem before a major catastrophe occurs.
Hacking’s Brand-Equity Nexus 2018 1312 Cyberattacks can significantly affect brand reputation, but companies can take measures to repair the damage.
The Healthcare Off-Shoring Industry In Developing Economies – Institutional and Economic Foundations: An Indian Case 2011 330 Purpose– Industrialized world-based healthcare providers are increasingly off-shoring low-end healthcare services such as medical transcription, billing and insurance claims. High-skill medical jobs such as tele-imaging and tele-pathology are also be...
Homework 2021 162 One can call it working at home or living at work; 2020 will be remembered for it. Here, the author offers a few data points associated with this recent lifestyle change based on recent survey results.
Human tagging 2017 2326 Several technologies—some new, some familiar—are being used to identify, authenticate, and track people on the go. Human tagging offers many novel benefits but also raises serious privacy concerns, and the laws, regulations, and policy guidelines reg...
Improving Open Source Software Maintenance 2010 1801 Maintenance is inevitable for almost any software. Software maintenance is required to fix bugs, to add new features, to improve performance, and/or to adapt to a changed environment. In this article, we examine change in cognitive complexity and ...
In Focus: An Opinion on the Report on Securing and Growing the Digital Economy 2017 592 On 1 December 2016, the US Commission on Enhancing National Cybersecurity (the Commission)—charged with developing recommendations to ensure the digital economy’s growth and security—released the “Report on Securing and Growing the Digital Economy” (...
Increasing Returns and the Diffusion of Linux in China 2007 2240 China's unique combination of institutions, industries, and markets has fostered the generation and use of Linux-related innovations. Analyzing increasing returns provides key insight into this proliferation.
India’s Cybersecurity Landscape: The Roles of the Private Sector and Public-Private Partnership 2015 2457 Are public–private partnerships an appropriate means of dealing with underdeveloped cybersecurity-related institutions in India? Whereas the government lacks the resources and expertise to develop new templates, monitor industry behaviors, and enforc...
The Indian Blockchain Landscape: Regulations and Policy Measures 2018 1867 Blockchain is considered to be a technology that has the potential to bring major political, social and economic benefits to developing economies such as India (Kshetri, 2017a). According to the National Association of Software and Services Companies...
The Indian Environment for Entrepreneurship and Small Business Development 2011 995 India is touted as a new entrepreneurship powerhouse and the next Asian miracle. There have been some successful and many unsuccessful attempts to promote entrepreneurship and small business development in India. There are also some well-founded rati...
Informal institutions and Internet-based equity crowdfunding 2018 1254 Equity-based crowdfunding is emerging as an increasingly important source of entrepreneurial financing. This paper examines the effects of informal institutions on entrepreneurs' ability and willingness to engage in efforts to raise equity crowdfundi...
Information and communications technologies, strategic asymmetry and national security 2005 12001 In the history of warfare, there are a number of examples of strategic uses of asymmetric technologies. Consistent with history and theory, individuals, organizations and nations have spotted opportunities to employ information and communications tec...
Institutional and Economic Factors Affecting the Development of the Chinese Cloud Computing Industry and Market 2016 2495 Due to the Chinese government ?s mobilization of massive resources and entrepreneurialactivities of foreign and local firms, the Chinese cloud computing industry and market are growing rapidly. A number of contradictory, conflicting, and paradoxical ...
Institutional and Economic Foundation of Entrepreneurship in Africa: An Overview 2011 979 Africa is arguably the richest continent in terms of minerals and natural resources. Prior research has also shown that Africa has an abundance of entrepreneurs who possess the ability to identify business opportunities and exploit them. However, the...
Institutional Changes Affecting Entrepreneurship in China 2007 5969 Institutions influencing entrepreneurship are undergoing significant transformation in China. During the Mao era, private entrepreneurship was virtually eradicated and was a political taboo. As reflected in the macro-level economic data, there has be...
Institutional factors affecting offshore business process and information technology outsourcing 2007 6438 Micro and macro level impacts of offshore outsourcing are far from clear. Thus there are some well-founded rationales for and against offshore outsourcing as well as a number of misinformed and ill guided viewpoints. Using institutional theory as a l...
Institutional reforms in the Gulf Cooperation Council economies: A conceptual framework 2008 3659 Institutions are slow to change in the Gulf Cooperation Council (GCC) economies. More to the point, institutions promoting free enterprise economy are lacking in the region. Concepts and theory building are lacking on the dynamics and forces related ...
Institutionalization of intellectual property rights in China 2009 3750 Institutional field Summary Following the 1978 political and economic reforms, China has undergone a sig-nificant transformation on the intellectual property rights (IPR) front. In this paper, we use neo-institutional theory to examine the institutio...
An Interview with Dr. Taro Komukai, Executive Director and Senior Consultant, InfoCom Research, Japan 2014 1096 Japan is undergoing a significant transformation in its approach to data privacy and security protection. Dr. Komukai explains the key elements of the framework for personal data protection in Japan, recent developments on this front, similarity and ...
Introducing the IT Economics Department 2018 1048 The new IT Economics department seeks to advance the understanding of various microeconomic and macroeconomic issues that IT managers need to examine in their decisions to adopt and implement information and communications technology-related systems,...
Is Privacy Dead? 2020 925 People value their privacy. According to a survey conducted in the U.S., 90% of respondents viewed it important to control the information about them collected. Yet, it seems very little control is possible. With the many advances in technology, coll...
IT in the Chinese Healthcare Industry 2013 3653 China is leveraging the cloud and mobile computing to enable doctors and other healthcare professionals to collaborate, share information, and more easily access reports, scans, EMRs, lab reports, prescriptions, and medical histories. China is also g...
Japan's Changing Cybersecurity Landscape 2014 3979 Japan's cybersecurity efforts have been lacking compared to other advanced economies, but the country is now taking more aggressive steps to address this deficiency.
Kaspersky Lab: From Russia with Anti-virus 2011 3389 Kaspersky Lab is a provider of information technology (IT) security products such as anti-virus, anti-spam and network security software. It is Russia's largest software company and the only Russian firm that ranked among the world's top 100 software...
Les activités d’espionnage électronique et de contrôle d’Internet à l’ère de l’infonuagique : le cas de la Chine 2012 2697 Meme si environ quarante gouvernements controlent leur environnement virtuel, peu ont reussi a le faire aussi bien que la Chine. Au cours des dernieres annees, cette realite est devenue preoccupante en raison de la diffusion et du developpement rapid...
The Link between Societal Motivation and New Venture Performance: Evidence from Entrepreneurs in Japan 2014 1338 Although there has been an increase in the popularity of social entrepreneurship, previous studies have paid little attention to for-profit entrepreneurs’ motive of making a contribution to the society, that is, societal motivation. In this study, we...
Major Computing Technologies of the Past 75 Years 2021 1004 This article is the second in a series of four articles that Computer is publishing to celebrate the 75th anniversary of the IEEE Computer Society (CS) this year. The first article published in the February 2021 issue gave an overview of socioeconomi...
Mobile Payment in Emerging Markets 2012 4038 Mobile payments have been a key driver of socio-economic development in emerging markets. Factors such as advancements in technology, socioeconomic conditions, and the high penetration rate of mobile devices are driving m-payment development in certa...
Monetizing You 2021 133 Presents the introductory editorial for this issue of the publication.
Offshoring of healthcare services: the case of US-India trade in medical transcription services 2011 9178 Purpose – The issue of offshore outsourcing of healthcare services is a critical but little-examined problem in healthcare research. The purpose of this study is to contribute to filling this void. Design/methodology/approach – A library-based study ...
Offshoring of High-Value Functions: A Case Study of U.S.-India Trade in Medical Transcription Services 2010 579 The offshoring industry in the developing world is rapidly moving into a higher gear. It started with relatively low-end works such as back-office support, customer service, and data entry. In recent years, developed-world-based firms are increasingl...
Online Advertising Fraud 2019 2756 Fraud is a trust issue. Online fraud is a cybertrust issue. Juniper Research estimated that advertising frauds cost online advertisers US$19 billion worldwide in 2018. A recent survey found that 78% of respondents were concerned about ad fraud and bo...
Online eats ‘food courts' 2021 218 Presents the introductory editorial for this issue of the publication.
Open banking: Definition and description 2021 243 Open banking is diffusing rapidly in some economies. This article provides a definition of and some requirements for open banking and looks at some of its key enablers and inhibitors.
Pattern of global cyber war and crime: A conceptual framework 2005 38874 The flourishing synergy arising between organized crimes and the Internet has increased the insecurity of the digital world. How hackers frame their actions? What factors encourage and energize their behavior? These are very important but highly unde...
Positive Externality, Increasing Returns, and the Rise in Cybercrimes 2009 5388 The meteoric rise in cybercrime has been an issue of pressing concern to our society. According to Federal Bureau of Investigation (FBI), nine out of 10 U.S. companies experienced computer security incidents in 2005 which led to a loss of $67.2 billi...
Potential Roles of Blockchain in Fighting Poverty and Reducing Financial Exclusion in the Global South 2017 979 The visible effects of blockchain are already being noted in the Global South. This editorial presents early evidence linking the use of blockchain in overcoming economic, social, and political challenges facing economies in the Global South. Highlig...
Privacy and Security Aspects of Social Media: Institutional and Technological Environment 2011 1249 Legitimate as well as illegitimate organizations and entities are gaining access to information about social media (SM) users through illegal, extralegal, and quasi-legal means. Worse still, many organizations and individuals using SM have become tar...
Privacy and Security Aspects of Social Media: Institutional and Technological Environment 2012 3247 Legitimate as well as illegitimate organizations and entities are gaining access to information about social media (SM) users through illegal, extralegal, and quasi-legal means. Worse still, many organizations and individuals using SM have become tar...
Privacy and Security Issues in Cloud Computing: The Role of Institutions and Institutional Evolution 2013 8498 Cloud computing is likened and equated to the Industrial Revolution. Its transformational nature is, however, associated with significant security and privacy risks. This paper investigates how the contexts provided by formal and informal institution...
Professional and trade associations in a nascent and formative sector of a developing economy: A case study of the NASSCOM effect on the Indian offshoring industry 2009 2876 As important sources that shape institutional structures in an economy, professional and trade associations play significant roles in bringing and legitimating institutional changes. This paper examines the roles of professional and trade association...
The Profile and Motivation of Golf Tournament Attendees: An Empirical Study 2009 1116 We conducted surveys at the 2006 Chrysler Classic of Greensboro and the 2007 Wyndham Championship to determine a spectator golf profile and motivation. We performed regression analysis. Our explanatory variables were past attendance, motivations to a...
Ransomware: Pay to Play? 2022 6 Ransomware is fairly new, and many folks don’t realize that it will affect them. Just as with shoplifting, we all pay.
Rearchitecting the Malls: The Shifting U.S. Retail Landscape 2021 484 Retail shopping is being revolutionized by the Internet and e-commerce. Big data analytics, artificial intelligence, and Internet of Things devices have further fueled the transformation.
Recent Trends in Export Promotions in the United States 2011 2468 There is significant variation in opinion regarding benefits stemming from the use of export promotion. While promotional strategies are frequently condemned in the press as violations of global trade rules and are sharply criticized by some anti-pov...
Recent U.S. Cybersecurity Policy Initiatives: Challenges and Implications 2015 1828 In recent years, the US government has introduced several policy measures aimed at tackling the growing cyberthreats facing the country, but many challenges and concerns could arise as a result of their implementation.
Regulative institutions supporting entrepreneurship in emerging economies: A comparison of China and India 2011 4275 China and India are touted as new entrepreneurship powerhouses. The two countries’ different institutional history and characteristics have led to differences in environments related to entrepreneurship. There are some well-founded rationales as well...
Reliability, Validity, Comparability and Practical Utility of Cybercrime-related Data, Metrics, and Information 2013 1881 With an increasing pervasiveness, prevalence and severity of cybercrimes, various metrics, measures and statistics have been developed and used to measure various aspects of this phenomenon. Cybercrime-related data, metrics, and information, however,...
Revisiting Turing’s imitation game: a commentary on replacing teachers with Internet devices 2018 316 Researchers have long studied the prevalence of poverty and inequality throughout the world. Much of this poverty has resulted from a lack of opportunities for socio-economic growth and development. In this commentary, we conjecture that bridging kno...
The role of artificial intelligence in promoting financial inclusion in developing countries 2021 1591 According to the World Bank’s Global Findex database, about 1.7 billion adults were unbanked in 2017, which means that they lacked an account with a formal financial institution or a mobile money provider. Most of the unbanked population is in develo...
Rural e-Commerce in Developing Countries 2018 4684 In recent years, there has been increased participation in e-commerce activities among rural communities in developing countries. Despite this progress, e-commerce in developing countries has been a highly urban-oriented phenomenon. The author analyz...
Scarcity 2021 277 Here, the authors examine the scarcity of PCs during the COVID-19 pandemic. How likely is it to reoccur? They reinforce and highlight the fragility of global computing supply chains and the impact that a lack of computing resources can have on countr...
The Simple Economics of Cybercrimes 2006 4987 The characteristics of cybercriminals, cybercrime victims, and law enforcement agencies have a reinforcing effect on each other, leading to a vicious circle of cybercrime. The author builds on key elements of this circle to assess a hacker's cost-ben...
Structural Shifts in the Chinese Software Industry 2005 3284 Following the post-1978 economic and political reforms that provided incentives for private and foreign investments, China has left India behind in terms of almost all economic and technological indicators. Between 1980 and 2002, China’s per capit...
Success of Crowd-Based Online Technology in Fundraising: An Institutional Perspective 2015 2844 The use of crowd-based online technology for raising funds is gaining popularity and credibility. This paper seeks to provide a better understanding of the effects of formal and informal institutions on the success of a crowdfunding project. It also ...
Supply Chain Trust 2019 1203 Reports on supply chains as major sources of cybersecurity threats. Companies and organizations increasingly share data, credentials, software code, applications, networks, and infrastructures with “trusted” supply chain partners. Supply chains can b...
Thoughts on Cyberbullying 2019 3613 Cyberbullying is a cybertrust issue that does not get much attention until after an incident occurs. It is hard to tie it directly to security or privacy. It is its own threat category, fitting between security, safety, and privacy. It is a social an...
Thoughts on General Data Protection Regulation and Online Human Surveillance 2020 1136 The European Union General Data Protection Regulation (GDPR) has introduced online privacy and transparency for consumers as well as legal considerations that companies must address.
Trusting Pirated Software 2019 1147 What is the life span for a fixed version of a software product? Is it a day, a week, a month, a year, or more? There is no single answer. Each product is unique, based on what it does. The point is that all software has a life span for each unique v...
What Factors are Driving China’s Mobile Diffusion? 2002 2984 This paper identifies and analyses the forces influencing the rapid mobile diffusion in China. The analysis indicates that major factors influencing the hyperbolic growth rate of mobile technology penetration in China include the influence of Marxist...
Where’s the silicon? 2021 51 Presents the introductory editorial for this issue of the publication.
Will blockchain emerge as a tool to break the poverty chain in the Global South? 2017 5549 Just like its recent predecessors, blockchain – also known as the distributed ledger technology – is considered to have the potential to cause major economic, political and social transformations in the Global South. The visible effects of this techn...