Empirical analysis of market boundaries in telecommunications

2019 ◽  
pp. 90-111 ◽  
Author(s):  
Natalia S. Pavlova ◽  
Andrey Е. Shastitko

The article deals with the problem of determining market boundaries for antitrust law enforcement in the field of telecommunications. An empirical approach has been proposed for determining the product boundaries of the market in the area of mass distribution of messages, taking into account the comparative characteristics of the types and methods of notification (informing) of end users; the possibilities of switching from one way of informing to another, including the evolution of such opportunities under the influence of technological changes; switching between different notification methods. Based on the use of surveys of customers of sending SMS messages, it is shown that the product boundaries should include not only sending messages via SMS, but also e-mail, instant messengers, Push notifications and voice information. The paper illustrates the possibilities of applying the method of critical loss analysis to determining the boundaries of markets based on a mixture of surveys and economic modeling.

2020 ◽  
Vol 1 (1) ◽  
pp. 59-81
Author(s):  
La Ode Muhammad Jefri Hamzah ◽  
Abdul Agis ◽  
Hamza Baharuddin

Tujuan penelitian ini adalah untuk: (1) Menganalisis efektivitas pertanggungjawaban pidana terhadap pelaku usaha yang memproduksi dan memperdagangkan kosmetik ilegal berbahaya ditinjau dari Undang-Undang No. 8 Tahun 1999 tentang Perlindungan Konsumen; dan (2) Menganalisis faktor-faktor yang mempengaruhi efektivitas pertanggungjawaban pidana terhadap pelaku usaha yang memproduksi dan memperdagangkan kosmetik ilegal berbahaya ditinjau dari Undang-Undang Nomor 8 Tahun 1999 tentang Perlindungan Konsumen. Penelitian ini adalah penelitian deskriptif dengan pendekatan yuridis-empiris. Hasil penelitian menunjukkan bahwa: Penegakan hukum terhadap pelaku usaha yang memproduksi dan memperdagangkan kosmetik ilegal yang berbahaya di Wilayah Polres Pelabuhan Makassar terlaksana kurang efektif. Meskipun demikian, proses penegakan hukum yang dilakukan tersebut sudah mengacu pada ketentuan perundang-undangan yang berlaku, seperti tersangka Sdr. ARFANDY alias ARFANDY BIN MUSTAFA yang terbukti melakukan tindak pidana mengedarkan sediaan farmasi/ kosmetika yang tidak memiliki izin edar, sehingga tersangka dijerat dengan Pasal 197 Jo pasal 106 ayat (1) UU R.I. No. 36 Tahun 2009 tentang Kesehatan, dan juga dijerat dengan Pasal 62 Ayat (1) Jo Pasal 8 ayat (1) UU R.I No. 8 Tahun 1999 tentang Perlindungan Konsumen. Faktor substansi hukum, struktur hukum, budaha hukum, sarana dan prasarana, dan pengetahuan hukum kurang berpengaruh terhadap penegakan hukum terhadap pelaku usaha kosmetik illegal yang berbahaya di Polres Pelabuhan Makassar. The purpose of this study is to: (1) Analyze the effectiveness of criminal liability against business actors who produce and trade dangerous illegal cosmetics in terms of Law No. 8 of 1999 concerning Consumer Protection; and (2) Analyzing the factors that influence the effectiveness of criminal liability against business actors producing and trading dangerous illegal cosmetics in terms of Law No. 8 of 1999 concerning Consumer Protection. This research is a descriptive study with a juridical-empirical approach. The results of the study show that: Law enforcement against businesses that produce and trade dangerous cosmetics that are dangerous in the Makassar Port Police Area is ineffective. Nevertheless, the law enforcement process carried out has referred to the applicable laws and regulations, such as the suspect Br. ARFANDY alias ARFANDY BIN MUSTAFA who was proven to have committed a crime of distributing pharmaceutical / cosmetic preparations that did not have a marketing authorization, so that the suspect was charged with Article 197 Jo article 106 paragraph (1) of Law R.I. No. 36 of 2009 concerning Health, and also snared with Article 62 Paragraph (1) Jo Article 8 Paragraph (1) of Law R.I No. 8 of 1999 concerning Consumer Protection. The factors of legal substance, legal structure, legal status, facilities and infrastructure, and legal knowledge have less influence on law enforcement against dangerous cosmetics business operators in Makassar Port Police


Author(s):  
Soraya Sedkaoui

This study is going to focus on the Algerian entrepreneurship ecosystem by adopting an investigation approach to explore the efficiency of the entrepreneurship process and actions. A proper survey has been conducted among several Algerian entrepreneurs to understand the national entrepreneurial ecosystem: environment, financial capacity, collaboration with the external environment, innovation capacity, etc. This chapter reports the findings of entrepreneurship ecosystem concerning the six entrepreneurship-related domains described by Isenberg to identify and develop. Results show that Algerian efforts still need a lot of enrichment due to the importance of the issue and the need for environmental and technological changes in the country. These changes should be substantially generated depending on the nature of entrepreneurship and should require the necessity of keeping up with these changes especially when shaping strategies and policies to address these challenges.


Cyber Crime ◽  
2013 ◽  
pp. 245-262
Author(s):  
Madhusudhanan Chandrasekaran ◽  
Shambhu Upadhyaya

Phishing scams pose a serious threat to end-users and commercial institutions alike. E-mail continues to be the favorite vehicle to perpetrate such scams, mainly due to its widespread use combined with the ability to easily spoof them. Several approaches, both generic and specialized, have been proposed to address this growing problem. However, phishing techniques, growing in ingenuity as well as sophistication, render these solutions weak. To overcome these limitations, we propose a multistage framework – the first stage aims at detecting phishing based on their semantic and structural properties, whereas in the second stage we propose a proactive technique based on a challenge-response technique to establish the authenticity of a Web site. Using live e-mail data, we demonstrate that our approach with these two stages is able to detect a wider range of phishing attacks than existing schemes. Also, our performance analysis study shows that the implementation overhead introduced by our tool is negligibly small.


Author(s):  
Cristina Bayona-Saez ◽  
Teresa Garcia-Marco

The aim of this chapter is to analyse what repercussion the adoption of certain types of information and communication technology (ICT), by firms, may have on collaborative innovation. It is our belief that tools such as Internet access, e-mail, and the presence of internal and inter-organisational communication networks, will promote and facilitate the signing of cooperative agreements. The empirical analysis performed on a sample of 1,649 firms partially confirms this intuition, since the existence of a network, bringing the firm into contact with its subcontractors, customers, and/or suppliers, increases the propensity of firms to cooperate in innovation.


2006 ◽  
Vol 10 (4) ◽  
pp. 143-170 ◽  
Author(s):  
Nigel Melville ◽  
Aaron Stevens ◽  
Robert K. Plice ◽  
Oleg V. Pavlov

Sign in / Sign up

Export Citation Format

Share Document