A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Sagar, Mahim
- Exploration of Product Centric Factors in Telecom Industry
Authors
1 India Office of Bain and Company, IN
2 IIM Calcutta, West Bengal, IN
3 Bharti School of Telecommunication Technology and Management, IIT Delhi, Delhi, IN
4 IIT Delhi, Delhi, IN
Source
Telecom Business Review, Vol 8, No 1 (2015), Pagination: 18-27Abstract
Purpose
Telecom industry is one of those industries which has changed dramatically during the past decade. With more and more players entering in this industry, competition is ever increasing. The war between these players is slowly shifting from the price to the augmentation. This paper aims at exploring such factors which influence a customer's preference of one telecom service provider (TSP) over the other. It is a descriptive research where study has been conducted among the consumers of different telecom service providers (TSPs).
Design/methodology/approach
By reviewing the existing literature in this domain, we explored different factors which affect the consumer's decision to prefer one telecom service provider over the other. A consumer targeted questionnaire was designed where consumers were asked about the factors they consider (with their relative importance quantified using Likert scale), before buying a new network connection to know the relative importance of the various factors. Factor Analysis was performed to club various variables into distinct factors. Statistical techniques then helped in identifying the relative importance.
Findings
From the Factor Loading matrix the following five factors were generated:- Overall service quality, Point of Purchase Differentiator, Promotion Measures, Tariff Plans and Size of the Network. Further study in the behavioural perceptions of consumer shows that the most important factor in influencing the customer buying behavior is Service Quality. The second most important factor is cost and various plans offered by the telecom service provider. Network connectivity was considered by almost all the respondents and consumers prefer the largest network player. The study also found that promotional measures don't influence the customers as expected.
Keywords
Customer Preference, Product Centric Factors, Telecom Industry, Buying Behaviour, Factor Analysis, Telecom Service Provider, Point of Purchase, Telecom Service Quality, Telecom Subscribers, Behavioral Perceptions.- Data Protection Framework for India
Authors
1 Research Scholar, IIT Delhi, IN
2 Professor, Department of Management Studies, IIT Delhi,, IN
Source
Telecom Business Review, Vol 13, No 1 (2020), Pagination: 36-46Abstract
Technology has rapidly altered the course of lives of the common people and has made life fundamentally connected. People are using the digitally connected world for a plethora of activities starting from Personal Communications to Business Transactions. Activities over the internet invariably involve exchange/sharing of Data/Information. The information exchanged can provide powerful insight into the user’s individual, social, political, economic interest and preferences (Nawrot et al., 2010). This information exchange resulting in collection of Data from Data Subjects is happening in a continuous manner across digital infrastructure and by almost all stake holders. This poses serious issues related to data protection and privacy of the users. Countries across the world have awakened to the need for protecting privacy and data of its citizens. India, an emerging economy, house to a sixth of global population and an aspiring Regional Power has also made numerous piecemeal efforts, mostly reactive, to address the issues of Digital Privacy and Data Protection. In this paper, the authors analyse the global practices on Data Protection with an aim to identify key ingredients which must essentially be incorporated in the Data Protection Framework formulated by India.Keywords
Data Protection, Digital Privacy, India, GDPRReferences
- Nawrot, F., Syska, K., & Świtalski, P. (2010). Horizontal application of fundamental rights: Right to privacy on the internet. Retrieved from http://en.zpc.wpia.uw.edu.pl/wp-content/uploads/2010/04/9_Horizontal_ Application_of_Fundamental_Rights.pdf
- IBM. (2016). 10 Key marketing trends for 2017. Ibm.Com, 18. Retrieved from ftp://ftp.www.ibm.com/software/in/pdf/10_Key_Marketing_Trends_for_2017.pdf
- Boldyreva, E. L., Grishina, N. Y., Duisembina, Y., & Peter, C. (2018). 18th PCSF 2018 professional culture of the specialist of the future Cambridge analytical: Ethics and online manipulation with decisionmaking process. The European Proceedings of Social & Behavioural Scienced. Retrieved from https://doi.
- org/10.15405/epsbs.2018.12.02.10
- Moniodis, C. P. (2013). Moving from Nixon to NASA: Privacy’ s second strand-a right to informational privacy. Yale Journal of Law and Technology Article, 15.Retrieved from https://digitalcommons.law.yale.edu/ cgi/viewcontent.cgi?article=1080&context=yjolt
- TRAI. (2017). Privacy, security and ownership of the data in the telecom sector. Retrieved from https://www.trai.gov.in/sites/default/files/Consultation_Paper%20_on_Privacy_Security_ownership_of_data_09082017.pdf
- Bhandari, V., & Sane, R. (2016). Towards a privacy framework for India in the age of the internet.Retrieved from https://macrofinance.nipfp.org.in/PDF/BhandariSane2016_privacy.pdf
- Radinsky, K. (2015, March). Data monopolists like google are threatening the economy.HBR. Retrieved from https://hbr.org/2015/03/data-monopolists-likegoogle-are-threatening-the-economy
- Graham, G. (2017, January 30). Global Data Privacy Laws 2017: 120 National Data Privacy Laws, Including Indonesia and Turkey. 145 Privacy Laws & Business International Report, 10-13, UNSW Law Research Paper No. 17-45. Retrieved from https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2993035
- MeitY. (2015). Digital India. Retrieved from https://digitalindia.gov.in/
- We are Social. (2018). Digital in 2018 in Southern Asia.Slide 69. Retrieved from https://www.slideshare.net/ weare social/digital-in-2018-in-southern-asia-86866282
- Department of Telecommunications. (2000). Information technology act, 2000. Retrieved from https://dot.gov.in/sites/default/files/itbill2000_0.pdf?download=1
- MeitY. (2011). IT Rules 2011. Retrieved from https:// www.wipo.int/edocs/lexdocs/laws/en/in/in099en.pdf
- Planning Commission-Government of India. (2012).Report of the group of experts on privacy government of India planning commission. Retrieved from https:// www.dsci.in/sites/default/files/documents/resource_ centre/Report of the Group of Experts on Privacy constituted by Planning Commission of India.pdf
- MeitY. (2017). Constitution of a committee of experts to deliberate on a data protection framework for India. Retrieved from https://www.meity.gov.in/writereaddata/files/MeitY_constitution_Expert_ Committee_31.07.2017.pdf
- MeitY. (2017). White paper of the committee of experts on a data protection framework for India. Retrieved from https://innovate.mygov.in/wp-content/uploads/2017/ 11/Final_Draft_White_Paper_on_Data_Protection_in_ India.pdf
- Publications of the Permanent Court of International Justice. (1927). Case of S.S. Lotus (France v. Turkey). Retrieved from https://www.icj-cij.org/files/permanent-court-of-international-justice/serie_A/A_10/30_Lotus_Arret.pdf
- Reidenberg, J. R., Russel, N. C., Callen, A. J., Qasir, S.,& Norton, T. B. (2014). Privacy harms and the effectiveness of the notice and choice framework. A Journalof Law and Policy for the Information Society, 11(2).Retrieved from https://kb.osu.edu/bitstream/handle/1811/75473/ISJLP_V11N2_485.pdf?sequence=1
- European Commission. (2011). Article 29 data protection working party opinion 15/2011 on the definition of consent. Retrieved from https://ec.europa.eu/justice/article-29/documentation/opinion-recommendation/files/2011/wp187_en.pdf
- European Commission. (2014). Article 29 data protection working party. Retrieved from https://ec.europa.eu/justice/article-29/documentation/opinion-recommendation/files/2014/wp217_en.pdf
- European Commission. (2013). Article 29 data protection working party opinion 03/2013 on purpose limitation. Retrieved from https://ec.europa.eu/justice/article-29/documentation/opinion-recommendation/files/2013/ wp203_en.pdf
- OECD. (2013). OECD guidelines on the protection of privacy and transborder flows of personal data. Retrieved from http://www.oecd.org/sti/ieconomy/oecdguidelinesontheprotectionofprivacyandtransborderflowsofpersonaldata.htm
- The Guardian. (2011). Why we must remember to delete –and forget – in the digital age. The Guardian. Retrieved from https://www.theguardian.com/technology/2011/ jun/30/remember-delete-forget-digital-age
- MeitY. (2018). A free and fair digital economy protecting privacy, empowering Indians. Retrieved from
- https://www.meity.gov.in/writereaddata/files/Data_ Protection_Committee_Report.pdf
- Intersoft Consulting. (2016). General data protection regulation (GDPR). Retrieved from https://gdpr-info.eu/
- Chamber of Deputies. (2014). Brazilian civil framework for the internet. Retrieved from https://bd.camara.leg. br/bd/bitstream/handle/bdcamara/26819/bazilian_
- framework_ internet.pdf? sequence=1&isAllowed=y
- Russian Federation. (2006). Russian federation legislation in the field of personal data. Retrieved from https:// iapp.org/media/pdf/knowledge_center/Russian_Federal_Law_on_Personal_Data.pdf
- Republic of South Africa. (2013). Government gazette. Retrieved from https://www.gov.za/sites/default/files/
- gcis_document/201409/3706726-11act4of2013protectionofpersonalinforcorrect.pdf
- KPMG. (2017). Overview of China’s cybersecurity law. Retrieved from https://assets.kpmg/content/dam/kpmg/ cn/pdf/en/2017/02/overview-of-cybersecurity-law.pdf