The impact of mobile Internet on mobile voice usage: A two-level analysis of mobile communications customers in a GCC country

被引:6
|
作者
Gerpott, Torsten J. [1 ]
May, Sebastian [1 ]
Nas, Gokhan [2 ]
机构
[1] Univ Duisburg Essen, Mercator Sch Management, Chair Strateg & Telecommun Management, Lotharstr 65, D-47057 Duisburg, Germany
[2] 1224 Shakopee Ave E, Shakopee, MN 55379 USA
关键词
GCC countries; Mobile data; Mobile Internet use; Multilevel analysis; Short message service (SMS); Voice telephony; LINEAR MIXED MODELS; USE INTENSITY; EMPIRICAL-ANALYSIS; LONGITUDINAL DATA; USER ACCEPTANCE; SELF-REPORT; PHONE; TEXT; SERVICES; DETERMINANTS;
D O I
10.1016/j.im.2017.02.003
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper focuses on interdependencies between mobile Internet (MI) usage and mobile voice (MV) calling patterns among residential customers in one member country of the Arabian Gulf Cooperation Council (GCC). The analyzed data set contains usage data of 10,366 postpaid subscribers of a mobile network operator (MNO) in a GCC country over 25 months from July 2013 to July 2015. The results suggest a complementary MV-MI usage relationship. This relationship is more positive for users who (1) send fewer SMS, (2) are younger, (3) are foreign nationals, (4) use a smartphone, and (5) have a longer tariff tenure. The strength of MV-MI usage association in the GCC country sample is larger than relationships observed in earlier work, which analyzed MNO subscribers in Europe. This suggests that the development trajectory of a country's telecommunications service market moderates the relationship between MI and MV calling use intensity. (C) 2017 Elsevier B.V. All rights reserved.
引用
下载
收藏
页码:958 / 970
页数:13
相关论文
共 50 条
  • [11] Contextual usage-level analysis of mobile services
    Verkasalo, Hannu
    2007 FOURTH ANNUAL INTERNATIONAL CONFERENCE ON MOBILE AND UBIQUITOUS SYSTEMS: NETWORKING & SERVICES, 2007, : 265 - 272
  • [12] User tolerance of privacy abuse on mobile Internet and the country level of development
    Callanan, Cormac
    Jerman-Blazic, Borka
    Blazic, Andrej Jerman
    INFORMATION DEVELOPMENT, 2016, 32 (03) : 728 - 750
  • [13] Two-level signature delegation for mobile first responder authentication
    Aboudagga, Nidal
    Eltoweissy, Mohamed
    Quisquater, Jean-Jacques
    2007 INTERNATIONAL CONFERENCE ON COLLABORATIVE COMPUTING: NETWORKING, APPLICATIONS AND WORKSHARING, 2008, : 16 - +
  • [14] Empirical research on mobile Internet usage: A meta-analysis of the literature
    Gerpott, Torsten J.
    Thomas, Sandra
    TELECOMMUNICATIONS POLICY, 2014, 38 (03) : 293 - 312
  • [15] Two-level market solution for services composition optimization in mobile grid
    Li Chunlin
    Li Layuan
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2011, 34 (02) : 739 - 749
  • [16] An Empirical Analysis of User Content Generation and Usage Behavior on the Mobile Internet
    Ghose, Anindya
    Han, Sang Pil
    MANAGEMENT SCIENCE, 2011, 57 (09) : 1671 - 1691
  • [17] Knowledge-based two-level control of a group of mobile executors
    Józefczyk, J
    INTEGRATED COMPUTER-AIDED ENGINEERING, 2003, 10 (02) : 191 - 201
  • [18] Synthesis of the Two-Level Intelligent Hierarchical Control System of the Mobile Robot
    Zeynalov, E. R.
    Aliyeva, A. S.
    10TH INTERNATIONAL CONFERENCE ON THEORY AND APPLICATION OF SOFT COMPUTING, COMPUTING WITH WORDS AND PERCEPTIONS - ICSCCW-2019, 2020, 1095 : 720 - 727
  • [19] Location-independent communication for mobile agents: A two-level architecture
    Sewell, P
    Wojciechowski, PT
    Pierce, BC
    INTERNET PROGRAMMING LANGUAGES, PROCEEDINGS, 1999, 1686 : 1 - 31
  • [20] DeCache: A Decentralized Two-Level Cache for Mobile Location Privacy Protection
    Xiao, Chenyu
    Chen, Zhe
    Wang, Xin
    Zhao, Jin
    Chen, Chen
    2014 SIXTH INTERNATIONAL CONFERENCE ON UBIQUITOUS AND FUTURE NETWORKS (ICUFN 2014), 2014, : 81 - 86