New Regulatory Framework for Telecommunications in Jordan
Jordan Telecommunications
QUANTITATIVE RESULTS AND ANALYSIS
Chapter X presented the pre-test results of the pilot study that used qualitative data collected from the interviews with Jordanian dignitaries. This chapter presents the quantitative results from the survey administered to the larger representative sample of respondents from Jordanian businesses.
The interviews conducted for the pilot study and a review of the literature supported the development of questions used in the survey. The interview process was used to ensure that the questions used in the research would have content validity and, thus, would accurately reflect the primary issues concerning telecommunications law. Further, the pilot study served to verify that terminology used in the survey questions showed consistent usage in the respondent sample.
Sample and Response Rate (Questionnaire)
The random stratified sample is representative of the population at large for persons affiliated with or interested in telecommunications regulation. The sample was developed to assist in making comparisons between the different categories of respondents, and to enable discrete analysis of the categorical point-of-view of the respondents concerning the telecommunications interception and access law application in Jordan.
The number of subjects contacted to participate in the questionnaire was 500. From this group, 368 completed the questionnaire bringing the response rate to 73.6, as shown in Table 8.1. This is a relatively high response rate for a survey of this type.
Table 8.1
Sample Size
Number
Percentage
Contacted Stakeholders
Respondents (Questionnaire)
73.6
The sample demographics are shown by respondent title in Table. 8.2. Respondents in the Jordanian Bar Association and Judiciary (JBA) numbered 250 out of a possible 300. This group made up 68% of the total sample. The next largest group by respondent title was 60 government officials from various agencies that consisted of 16.3% of the sample. The remaining sample groups by respondent title were Telecommunications Regulatory Commission at 7.3%, parties interested in human rights at 5.4%, and Jordanian business leaders at 3%.
Table 8.2
Sample Demographics by Respondent Title
Respondent Title
Number
# of Respondents
Percentage (%) of Sample
Jordanian Bar Association and Judiciary (JBA)
68
Telecommunication Regulatory Commission (TRC)
50
27
7.3
Parties interested in human rights in Jordan (HR)
30
20
5.4
Government officials from agencies such as the General Intelligence Department, Public Security Directorate (GID), and the Independent Anti-corruption Commission
60
16.3
Jordanian business leaders (JBL)
20
11
3
Total
*68=250/300 7.3=27/50 5.4=20/30-16.3=60/100 3=11/20
The sample demographics for non-responders are shown by respondent title in Table. 8.3. The percentage of non-responders overall was 26.6%, a satisfactorily low number. None of the respondent title groups show an inordinate number or percentage of non-responders. The highest percentage of non-respondents occurred in the respondent title group with the largest total number of respondents. Representation of respondents in all the other respondent title groups remains strong, with the percentage of non-respondents less than 10% within each group.
Table 8.3
Non-Responders by Respondent Title
Respondent Title
# of Non-Respondents
# of Respondents
% of Non-Respondents
Jordanian Bar Association and Judiciary (JBA)
50
10
Telecommunication Regulatory Commission (TRC)
23
27
4.6
Parties interested in human rights in Jordan (HR)
10
20
2
Government officials from agencies such as the General Intelligence Department, Public Security Directorate (GID), and the Independent Anti-corruption Commission
40
60
8
Jordanian Business Leaders (JBL)
9
11
1.8
Total
26.6
8.3 Data Analysis
The questionnaire was developed to gain information about designing a new regulatory framework for telecommunications interception and access in Jordan. The questionnaire consisted of three parts. The first section of the questionnaire consisted of data collected about the experience of the subjects related to telecommunications interception and access. The second section was used to gather data on the subjects' opinions about obstacles that apply to telecommunications interception and access law in Jordan. The third section was used to gather data about the possibility of designing a new regulatory framework for telecommunications interception and access in Jordan as affected by the research variables.
Factor analysis was used in this study to reduce the number of variables in such a way that a structural analysis would be supported. Factor analysis extracts the proportion of variance that is shared by several items and which is due to commonality (common factors). By using factor analysis, the researcher was able to use the latent variables, which are not observable, to explain the correlations between the observations. Further, the use of factor analysis permitted the error variance -- the variance not accounted for by the correlation coefficients -- to be ignored while accounting only for the variance in the correlation coefficients. A factor rotation strategy was used to obtain a clear pattern of factor loadings.
The process of diagonalizing a matrix in factor analysis allows variance to be consolidated. Eigenvalues provide information about the consolidation of variance, such that, the larger the eigenvalue, the more the variance, and the "factors with small or negative eigenvalues that are usually omitted from solutions"[footnoteRef:1] (Tabachnick and Fidell, 1996, p. 646). [1: Tabachnick, B.G., & Fidell, L.S. (1996). Using multivariate statistics (3rd Ed.). New York: Harper Collins.]
A t-test was used to determine the statistical significance between the sample distribution's mean and parameters. Structural equation modeling (SEM) used a covariance data matrix in a confirmatory manner to estimate the structural and measurement relationships implied by the hypothesized model. The SEM provides details about the key respondent groups and with regard to their perceptions and impact on decision-making related to establishing a telecommunications regulatory framework in Jordan. A Pearson correlation coefficient analysis was used to determine the discriminate validity of the survey.
A reliability analysis was conducted using statistical analysis processes such as Cronbach's alpha and hypothesis testing. These procedures are employed to gauge the reliability of the instrument to gather sufficiently robust data, which will then enable generalizations to be made regarding the probability of these findings beyond the sample to the entire population.
8.2.1 Questionnaire Validity
A pilot study was conducted by using individual open interviews to pre-test the validity of the questions to be used in the questionnaires and the interviews of the study. Face validity was addressed in the pre-test by using judgment to determine whether the questions contained items that were adequate to measure the research variables of interest. Against the background of the literature review, and through consideration of the regulatory framework for telecommunications in Australia, interview questions were developed that reflect the known relevant issues of telecommunications law and access.
Concurrent validity was tested through the interviews in the first stage of data collection. In an iterative fashion, the interview questions were tested with a representative group of subjects consisting of...
E., the company) that has technical control over telecommunications networks and thus technical ability to access communications, versus a party that is duly authorized to actually access those communications via a warrant (Mares, 2002). Although, as is consistent with the British model of legal evolution that relies heavily on interpretation of judicial action and precedent rather than overt legislative action, there have been no new statues issued in the intervening
Conclusion: Chapter 2. Legal interception, defined as "the legally authorized process by which a network operators or services provider gives law enforcement officials access to the communications (telephone calls, e-mail massage etc.) of private individuals or organizations" , is crucial in preserving national security, investigating serious criminal activities, and combating terrorism. Currently, this includes intercepting cable systems, public switched telephone network and wireless. Parties involved in the interception process are sender of
According to Reidenberg (2000: 1318), policy in the United States protects personal information according to a market-dominated paradigm, where limited statutory and common law rights are granted for information privacy. In Europe, on the other hand, the privacy protection norm is dominated by privacy rights. The European Union, for example, requires Member States to include comprehensive statutory protections for its citizens when it comes to privacy rights. The fact that
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now