{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T11:07:26Z","timestamp":1773486446463,"version":"3.50.1"},"publisher-location":"Cham","reference-count":44,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783031156878","type":"print"},{"value":"9783031156885","type":"electronic"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-15688-5_15","type":"book-chapter","created":{"date-parts":[[2022,8,29]],"date-time":"2022-08-29T23:02:42Z","timestamp":1661814162000},"page":"170-185","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Regulatory Frameworks in Developing Countries: An Integrative Literature Review"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1172-5539","authenticated-orcid":false,"given":"Casper","family":"Chigwedere","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0845-0677","authenticated-orcid":false,"suffix":"Jr.","given":"Sam","family":"Takavarasha","sequence":"additional","affiliation":[]},{"given":"Bonface","family":"Chisaka","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,8,30]]},"reference":[{"key":"15_CR1","unstructured":"Adam, A.: Gender, emancipation and critical information systems. In: The 9th European Conference on Information Systems Bled, Slovenia, 27\u201329 June 2001 (2001). https:\/\/aisel.aisnet.org\/cgi\/viewcontent.cgi?article=1000&context=ecis2001"},{"key":"15_CR2","doi-asserted-by":"crossref","unstructured":"Benbasat, I., Zmud, R.W.: The identity crisis within the is discipline: defining and communicating the discipline\u2019s core properties. MIS Q. 27(2), 183\u2013194 (2003)","DOI":"10.2307\/30036527"},{"key":"15_CR3","doi-asserted-by":"crossref","unstructured":"Boell, S.K., Cecez-Kecmanovic, D.: A hermeneutic approach for conducting literature reviews and literature searches. Commun. Assoc. Inf. Syst. 34 (2014). Article 12. http:\/\/aisel.aisnet.org\/cais\/vol34\/iss1\/12","DOI":"10.17705\/1CAIS.03412"},{"key":"15_CR4","unstructured":"Brownn, A.C., Stern, J., Tenenbaum, B.: Handbook for Evaluating Infrastructure Regulatory Systems (2006). chrome-extension:\/\/efaidnbmnnnibpcajpcglclefindmkaj\/viewer.html?pdfurl= https%3A%2F%2Fppp.worldbank.org%2Fpublic-private-partnership%2Fsites%2Fppp.world bank.org%2Ffiles%2Fdocuments%2Fworld_bank-_ppiaf-_handbook_for_evaluating_ infrastructure_regulatory_systems_2006_english.pdf&chunk=true"},{"key":"15_CR5","doi-asserted-by":"publisher","unstructured":"Cheng, Z.A., Dimoka, A., Pavlou, P.A.: Context may be king, but generalizability is the Emperor! J. Inf. Technol. 31(3), 257\u2013264 (2016). https:\/\/doi.org\/10.1057\/s41265-016-0005-7","DOI":"10.1057\/s41265-016-0005-7"},{"issue":"1","key":"15_CR6","doi-asserted-by":"publisher","first-page":"205","DOI":"10.25300\/MISQ\/2016\/40.1.09","volume":"40","author":"Y Chen","year":"2016","unstructured":"Chen, Y., Zahedi, F.M.: Individuals\u2019 internet security perceptions and behaviors: polycontextual contrasts between the United States and China. MIS Q. 40(1), 205\u2013222 (2016)","journal-title":"MIS Q."},{"key":"15_CR7","unstructured":"Chiumbu, S.H.: Understanding the role and influence of external actors and ideas in African information, communication and technology policies: the African information society initiative. Ph.D. thesis. University of Oslo, Oslo, 1 February 2008"},{"issue":"3","key":"15_CR8","doi-asserted-by":"publisher","first-page":"241","DOI":"10.1057\/jit.2015.19","volume":"31","author":"RM Davison","year":"2018","unstructured":"Davison, R.M., Martinsons, M.G.: Context is king! Considering particularism in research design and reporting. J. Inf. Technol. 31(3), 241\u2013249 (2018)","journal-title":"J. Inf. Technol."},{"key":"15_CR9","unstructured":"Gadamer, H.-G.: Truth and Method. The Continuing Publishing Corporation, New York (1986)"},{"key":"15_CR10","doi-asserted-by":"crossref","unstructured":"Galhardo, J.A.G.: ICT regulation process in a civil law, peripheral, and multilevel administration country: Habermas\u2019 deliberative paradigm revisited. In: Kommers, P., Viana, A.B.N., Issa, T., Isa\u00edas, P., Issa, T. (eds.) IADIS International Conference Internet Technologies and Society 2020, pp. 105\u2013109. International Association for Development of the Information Society, S\u00e3o Paulo (2020). http:\/\/www.iadisportal.org\/digital-library\/ict-regulationprocess-in-a-civil-law-peripheral-and-multilevel-administration-country-habermas-deliberativeparadigm-revisited","DOI":"10.33965\/its_ste2020_202001D015"},{"key":"15_CR11","unstructured":"Galhardo, J.A.G., de Souza, C.A.: ICT regulation process: Habermas meets the multiple streams framework. In: AMCIS 2020 Proceedings, 16 (2020). https:\/\/aisel.aisnet.org\/amcis2020\/adv_info_systems_research\/adv_info_systems_research\/16"},{"key":"15_CR12","unstructured":"Geeling, S., Brown, I., Weimann, P.: Information systems and culture - a systematic hermeneutic literature review. In: CONF-IRM 2016 Proceedings, Paper 40 (2016). http:\/\/aisel.aisnet.org\/confirm2016\/40"},{"key":"15_CR13","unstructured":"G\u00fclen, G., Makaryan, R., Volkov, D., Foss, M.: Improving regulatory agency efficiency and effectiveness best practices, processes and organizational structures. In: Proceedings, 11th Annual Conference of the International Society for New Institutional Economics, Reykjavik, Iceland, vol. 23 (2007)"},{"key":"15_CR14","unstructured":"Habermas, J.: Knowledge and Human Interests. Beacon Press, Boston (1972a)"},{"key":"15_CR15","unstructured":"Habermas, J.: Toward a Rational Society: Student Protest, Science, and Politics. Shapiro, J.J. (Trans.). Heinemann, London (1972b)"},{"key":"15_CR16","volume-title":"The Theory of Communicative Action: Reasons and Rationalization of Society. Mccarthy, T. (Trans.)","author":"J Habermas","year":"1984","unstructured":"Habermas, J.: The Theory of Communicative Action: Reasons and Rationalization of Society. Mccarthy, T. (Trans.). Beacon Press, Boston (1984)"},{"key":"15_CR17","volume-title":"The Theory of Communicative Action: Lifewolrd and Social System. Mccarthy, T. (Trans.)","author":"J Habermas","year":"1987","unstructured":"Habermas, J.: The Theory of Communicative Action: Lifewolrd and Social System. Mccarthy, T. (Trans.). Beacon Press, Boston (1987)"},{"key":"15_CR18","unstructured":"Wadhwa, D., Hallur, G.: Comparative analysis of ICT regulation frameworks: a study of seven countries (2013)"},{"key":"15_CR19","doi-asserted-by":"publisher","unstructured":"Hallur, G.G., Sane, V.S.: Indian telecom regulatory framework in comparison with five countries: structure, role description and funding. Digit. Policy Regul. Gov. 20(1), 62\u201377 (2017). https:\/\/doi.org\/10.1108\/DPRG-06-2017-0035","DOI":"10.1108\/DPRG-06-2017-0035"},{"key":"15_CR20","unstructured":"Jos\u00e9 Antonio Gouv\u00eaa, G., de Souza, C.A.: ICT regulation process: Habermas meets the multiple streams framework. In: AMCIS 2020 Proceedings 16 (2020)"},{"issue":"1","key":"15_CR21","doi-asserted-by":"publisher","first-page":"67","DOI":"10.2307\/249410","volume":"23","author":"H Klein","year":"1999","unstructured":"Klein, H., Myers, M.A.: Set of principals for conducting and evaluating interpretive field studies in information systems. MIS Q. 23(1), 67\u201394 (1999)","journal-title":"MIS Q."},{"key":"15_CR22","unstructured":"Kunyenje, G., Chigona, W.: External actors\u2019 influence on national ICT policy in developing countries: a literature review. In: ACIST 2017, pp. 1\u201310. ACIST, Cape Town (2017)"},{"key":"15_CR23","doi-asserted-by":"publisher","unstructured":"Levi-Faur, D.: The odyssey of the regulatory state: from a \u2018Thin\u2019 monomorphic concept to a \u2018Thick\u2019 and polymorphic concept article in law & policy, April 2013. https:\/\/doi.org\/10.1111\/lapo.12000","DOI":"10.1111\/lapo.12000"},{"key":"15_CR24","doi-asserted-by":"publisher","unstructured":"Makoza, F., Chigona, W.: How gender is embedded in the national ICT policy of Malawi. In: Proceedings for CPRsouth8\/CPRafrica 2013 Conference, Mysore, India, 5\u20137 September, 2013, pp. 1\u201320 (2013). SSRN: https:\/\/ssrn.com\/abstract=2531859. https:\/\/doi.org\/10.2139\/ssrn.2531859","DOI":"10.2139\/ssrn.2531859"},{"key":"15_CR25","doi-asserted-by":"crossref","unstructured":"Mingers, J., Walsham, G.: Toward ethical information systems: the contribution of discourse ethics. MIS Q. 34(4), 833\u2013854 (2010). https:\/\/www.jstor.org\/stable\/25750707","DOI":"10.2307\/25750707"},{"key":"15_CR26","unstructured":"Mollel, A.: The legal and regulatory framework for ICT in developing countries: case study of ICT and the law of evidence in Tanzania. A paper delivered at IPID ICT4D PG\/PhD Symposium (2008)"},{"key":"15_CR27","unstructured":"Mollel, A.: The legal and regulatory framework for ICT in developing countries: case study of ICT and the law of evidence in Tanzania. A paper delivered at IPID ICT4D PG\/PhD Symposium, 7\u20139 September 2008 (2008)"},{"key":"15_CR28","doi-asserted-by":"publisher","first-page":"464","DOI":"10.1057\/cep.2016.24","volume":"16","author":"G Nesti","year":"2018","unstructured":"Nesti, G.: Strengthening the accountability of independent regulatory agencies: from performance back to democracy. Comp. Eur. Polit. 16, 464\u2013481 (2018). https:\/\/doi.org\/10.1057\/cep.2016.24","journal-title":"Comp. Eur. Polit."},{"issue":"3","key":"15_CR29","doi-asserted-by":"publisher","first-page":"433","DOI":"10.1007\/s10551-019-04143-6","volume":"167","author":"A North-Samardzic","year":"2019","unstructured":"North-Samardzic, A.: Biometric technology and ethics: beyond security applications. J. Bus. Ethics 167(3), 433\u2013450 (2019). https:\/\/doi.org\/10.1007\/s10551-019-04143-6","journal-title":"J. Bus. Ethics"},{"key":"15_CR30","first-page":"43","volume":"37","author":"C Okoli","year":"2015","unstructured":"Okoli, C.: A guide to conducting a standalone systematic literature review. Commun. Assoc. Inf. Syst. 37, 43 (2015)","journal-title":"Commun. Assoc. Inf. Syst."},{"key":"15_CR31","doi-asserted-by":"crossref","unstructured":"Palvia, P., Baqir, N., Nemati, H.: ICT policies in developing countries: an evaluation with the extended design-actuality gaps framework. Electron. J. Inf. Syst. Dev. Countries 71(1), 1\u201334 (2015)","DOI":"10.1002\/j.1681-4835.2015.tb00510.x"},{"issue":"2","key":"15_CR32","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1016\/j.im.2014.08.008","volume":"52","author":"G Par\u00e9","year":"2015","unstructured":"Par\u00e9, G., Trudel, M.C., Jaana, M., Kitsiou, S.: Synthesizing information systems knowledge: a typology of literature reviews. Inf. Manag. 52(2), 183\u2013199 (2015)","journal-title":"Inf. Manag."},{"issue":"6","key":"15_CR33","doi-asserted-by":"publisher","first-page":"493","DOI":"10.1057\/s41303-016-0020-3","volume":"25","author":"G Pare","year":"2016","unstructured":"Pare, G., Tate, M., Johnstone, D., Kitsiou, S.: Contextualizing the twin concepts of systematicity and transparency in information systems literature reviews. Eur. J. Inf. Syst. 25(6), 493\u2013508 (2016). https:\/\/doi.org\/10.1057\/s41303-016-0020-3","journal-title":"Eur. J. Inf. Syst."},{"issue":"1","key":"15_CR34","first-page":"1","volume":"5","author":"BT Pentland","year":"1995","unstructured":"Pentland, B.T.: Information systems and organizational learning: the social epistemology of organizational knowledge systems. Account. Manag. Inf. Technol. 5(1), 1\u201321 (1995)","journal-title":"Account. Manag. Inf. Technol."},{"key":"15_CR35","doi-asserted-by":"publisher","DOI":"10.1163\/156916273X00109","volume-title":"Contemporary Schools of Metascience","author":"G Radnitzky","year":"1973","unstructured":"Radnitzky, G.: Contemporary Schools of Metascience. Humanities Press\/Henry Regnery Company, Chicago (1973)"},{"key":"15_CR36","volume-title":"Hermeneutics and the Human Science","author":"P Ricoeur","year":"1981","unstructured":"Ricoeur, P.: Hermeneutics and the Human Science. Cambridge University Press, Cambridge (1981)"},{"issue":"4","key":"15_CR37","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1080\/07421222.2005.11045820","volume":"21","author":"T Ravichandran","year":"2005","unstructured":"Ravichandran, T., Lertwongsatien, C., Lertwongsatien, C.: Effect of information systems resources and capabilities on firm performance: a resource-based perspective. J. Manag. Inf. Syst. 21(4), 237\u2013276 (2005)","journal-title":"J. Manag. Inf. Syst."},{"issue":"3","key":"15_CR38","doi-asserted-by":"publisher","first-page":"241","DOI":"10.1057\/ejis.2014.7","volume":"23","author":"F Rowe","year":"2014","unstructured":"Rowe, F.: What literature review is not: diversity, boundaries and recommendations. Eur. J. Inf. Syst. 23(3), 241\u2013255 (2014)","journal-title":"Eur. J. Inf. Syst."},{"issue":"4","key":"15_CR39","doi-asserted-by":"publisher","first-page":"404","DOI":"10.1177\/1534484316671606","volume":"15","author":"RJ Torraco","year":"2016","unstructured":"Torraco, R.J.: Writing integrative literature reviews: using the past and present to explore the future. Hum. Resour. Dev. Rev. 15(4), 404\u2013428 (2016)","journal-title":"Hum. Resour. Dev. Rev."},{"key":"15_CR40","doi-asserted-by":"publisher","unstructured":"Walden, I., Christou, T.A.: Legal and regulatory implications of disruptive technologies in emerging market economies. SSRN Electron. J. 2018. https:\/\/doi.org\/10.2139\/ssrn.3230674","DOI":"10.2139\/ssrn.3230674"},{"key":"15_CR41","doi-asserted-by":"publisher","unstructured":"Wall, J.D., Stahl, B.C., Salam, A.F.: Critical discourse analysis as a review methodology: an empirical example. Commun. Assoc. Inf. Syst. 37 (2015). Article 11. https:\/\/doi.org\/10.17705\/1CAIS.03711","DOI":"10.17705\/1CAIS.03711"},{"issue":"2","key":"15_CR42","first-page":"75","volume":"88","author":"OE Williamson","year":"1998","unstructured":"Williamson, O.E.: The institutions of governance. Am. Econ. Rev. 88(2), 75\u201379 (1998)","journal-title":"Am. Econ. Rev."},{"key":"15_CR43","unstructured":"Ziaie, P.: Challenges and issue of ICT industries in developing countries. In: International Conference on Computer Applications Technology, Sousse, Tunisiam 20\u201322 January 2013. IEEE Xplore (2013)"},{"key":"15_CR44","unstructured":"Zwahr, T., Rossel, P., Finger, M.: Towards electronic governance: a case study of ICT in local government governance. In: The National Conference on Digital Government Research (dg. o2005) (No. CONF) (2005)"}],"container-title":["IFIP Advances in Information and Communication Technology","Human Choice and Digital by Default: Autonomy vs Digital Determination"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-15688-5_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,2]],"date-time":"2024-10-02T19:57:27Z","timestamp":1727899047000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-15688-5_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031156878","9783031156885"],"references-count":44,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-15688-5_15","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"value":"1868-4238","type":"print"},{"value":"1868-422X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"30 August 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"HCC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"IFIP International Conference on Human Choice and Computers","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Tokyo","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Japan","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 September 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 September 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"hcc2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/hcc15.net\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"OCS","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"32","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"17","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"53% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}