StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

IB Internal Assessment - Essay Example

Cite this document
Summary
Name: Professor: Course: Date: Title of extract: Kenya: CCK Says Safaricom 'Arm-Twisting' It at Consumers' Expense Source of extract: http://allafrica.com Date of extract: 16th November 2011 Word count of the commentary: 744 Date the commentary was written: 29th December 2011 Section(s) of the syllabus: Microeconomics Commentary Safaricom, Airtel Kenya, Orange Telkom and Essar Telecom are the only mobile phone operators in Kenya…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER99% of users find it useful
IB Internal Assessment
Read Text Preview

Extract of sample "IB Internal Assessment"

of extract: Kenya: CCK Says Safaricom 'Arm-Twisting' It at Consumers' Expense Source of extract: http allafrica.com Date of extract: 16th November 2011 Word count of the commentary: 744 Date the commentary was written: 29th December 2011 Section(s) of the syllabus: Microeconomics Commentary Safaricom, Airtel Kenya, Orange Telkom and Essar Telecom are the only mobile phone operators in Kenya. Safaricom’s market share in mobile network subscribers is almost 70% followed by Airtel Kenya, Orange Telkom and Essar Telecom which have their share being 15 % , 9% and 6% respectively (Nyabiage b).

The telecommunication industry in which they operate is regulated by the Communication Commission of Kenya (CCK). This organization has the mandate of granting and withdrawing telecommunication licenses. Safaricom’s majority market share in the mobile telecommunication industry has aspects of Monopoly as implied by Jevans Nyabiage b. This is one of the main causes of market failure. According to this article, the Communication Commission of Kenya accuses Safaricom of resisting its aim of ‘level the playing field for mobile phone operators.

’ This means that Safaricom is resisting moves by the regulatory commission to making the market more competitive by lifting barriers such as opposing reduction of barriers to entry. Barriers to entry in this case involve the cost of entry into providing 3G services. Safaricom maintains a monopoly by raising barriers to entry namely high cost of investment, technological capacity and legal barriers. Safaricom was the first operator to obtain the 3G license. This company paid $25 million to CCK.

This was a high capital venture considering the returns and financial power of the operators present at that time. Safaricom therefore enjoyed a monopoly since it was the only company which could afford acquiring the 3G telecommunication network license. The second form of barriers to entry is technological capacity. Having the 3G network ensured that the company enjoyed superior technology in offering its services (Nyabiage a). This company could therefore enjoy more efficiency in its production compared to any other telecommunication service provider.

Barriers to entry are characteristics of a monopoly in a market. Monopoly is a cause of market failure in the Kenyan telecommunication industry. Legal barriers to entry are also visible as Safaricom tries to use the courts of law to address its interests. The outcome of this legal case will be determined in January 2011. The court may rule that either CCK maintain the fee at $25 million licensing fee, refund $15 million to Safaricom or rule against Safaricom’s plea and support the decision for CCK to grant 3G licenses to Safaricom’s competitors at $10 million down from $25 million (Nyabiage a).

The first possible ruling would set up a legal barrier to entry by barking the high cost of acquiring the 3G license. This is a source of market failure because Safaricom will still have its monopoly power over the consumers and the rest of its competitors. Lack of perfect or close substitutes to outputs by a firm is a source of market failure since it creates a form of monopoly. Safaricom being the only company having the 3G network prior to licensing of Orange Telkom indicates that its 3G service had no perfect substitutes.

3G networks are credited for their fast in nature data transfer which is strictly preferred by both consumer and commercial subscribers. Since Safaricom was the only company providing such superior services to the market, it had in check any possible competition in its market hence exercising monopoly power. This leads to market failure because there is no perfect substitution associated with a competitive market. Market Failure associated with Monopoly Table 1: Implications of a Monopoly Super-normal profits associated by a monopoly (shown by the shaded green area) arise from consumption of consumer surpluses.

This is in line with CCK’s claim that Safaricom is of trying to make gains at the expense of consumers. To prove this further, Safaricom data rates were Kshs. 8 before the license was grated to Orange Telkom. CCK increased the competitive nature of the Kenyan telecommunication sub-market by Granting a second operator the 3G license hence increasing competition in this sub-market segment. Safaricom currently has its data rates revised to Kshs. 4. This reduction in price is associated with entry of new players in an industry and corresponds with increased output by the monopoly as it tries to maximize its profit in the more competitive market.

From the above graph, entry of competition in a monopolist market makes a monopoly reduces price from Pm to P1 and increases output to Q2 from Qm. This is arguably consistent with safaricoms dynamic price mechanism after the 3G license was granted to a competitor. Super normal profits are likely to keep on reducing upto zero. Works Cited Economicshelp.org. Diagram of Monopoly. Retrieved on 29th December 27, 2011 from http://www.economicshelp.org/microessays/markets/monopoly-diagram.html Nyabiage a, Jevans.

CCK Says Safaricom 'Arm-Twisting' It at Consumers' Expense. Nairobi: Business Daily. 2011. Retrieved on 27th December 27, 2011 from http://allafrica.com/stories/201111170055.html Nyabiage b, Jevans. As Safaricom Sheds More Market Share, Small Rivals Make Big Gains. Nairobi: Daily Nation. 2011. Retrieved on 27th December 27, 2011 from http://allafrica.com/stories/201111170055.html

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“IB Internal Assessment Essay Example | Topics and Well Written Essays - 750 words”, n.d.)
IB Internal Assessment Essay Example | Topics and Well Written Essays - 750 words. Retrieved from https://studentshare.org/macro-microeconomics/1440401-micro-economics-ib-internal-assessment-market
(IB Internal Assessment Essay Example | Topics and Well Written Essays - 750 Words)
IB Internal Assessment Essay Example | Topics and Well Written Essays - 750 Words. https://studentshare.org/macro-microeconomics/1440401-micro-economics-ib-internal-assessment-market.
“IB Internal Assessment Essay Example | Topics and Well Written Essays - 750 Words”, n.d. https://studentshare.org/macro-microeconomics/1440401-micro-economics-ib-internal-assessment-market.
  • Cited: 0 times

CHECK THESE SAMPLES OF IB Internal Assessment

Mathematics IB Internal Assessment

Sur Lecturer Date What are the cost difference in shipping and product across the world compared to Bahrain?... Introduction Bahrain is a small island country located near the shores of western Persian Gulf.... The country is an archipelago of several islands.... hellip; The island is about 55 km long and 18 km wide....
7 Pages (1750 words) Research Paper

Alfalfa hay yield prediction using yield monitor data and satellite imagery

Alfalfa Hay Yield Prediction Using Yield Monitor Data and Satellite Imagery Introduction Literature has supported the view of biomass production models in relation to satellite data.... (Monteith 1972, Kumar 1982, Daughtry et al, 1992, Gower et al, 1999, Field et al, 1995, Christensen et al, 1993)....
8 Pages (2000 words) Research Paper

Firewall Security Measures

This paper deals with the security measures in information technology.... Admittedly, layers 3 and 4 of OSI models use packet filtering as a firewall security measures, with IP address in the packets, and also the ports used to filter session that is admitted or otherwise drop.... … The author of the paper touches upon the security means within the information technology sphere....
13 Pages (3250 words) Essay

Risk Assessment

This paper ''Risk assessment'' discusses that risk assessment based on GFI network diagram.... nbsp;Risk assessment will be conducted ion GFI network to establish the likely areas of failure.... n this study, I am going to undertake risk assessment based on GFI network diagram.... isk assessment will be conducted ion GFI network to establish the likely areas of failure.... Risk assessment will focus on managerial, operational and technical aspects that are prone to vulnerabilities and which can be exploited by attackers....
11 Pages (2750 words) Term Paper

Cases in Westmount Roanoke Clinic

I would implement the decision through proper management selection, and I would assess my implementation thorough assessment of the performance of the management personnel.... I would evaluate the decision through the assessment of the performance of the management personnel....
3 Pages (750 words) Essay

Technological Advancement in Human and Health Services

This term paper “Technological Advancement in Human and Health Services” provides a deep insight into computer literacy for health care professionals, health insurance portability and accountability, health services for mental issues, the impact of advances in technology over public health etc....
27 Pages (6750 words) Term Paper

Analysis for the New Technology Formwork Establishment for the TRANSCORP Business

Here I am working as managing in charge for the enhanced assessment and analysis of some of main security perspective at the business.... isk Analysis2a, 2b internal ThreatsIn case of new technology based structure establishment we are also having some of main security and privacy aspects to address....
13 Pages (3250 words) Case Study

Analysis of Some of Main Aspects of the TRANSCORP Business

Risk AnalysisActivity 2a, 2b internal ThreatsIn case of new technology platform implementation we are having biggest and threat regarding the internal business areas.... … 16b Control mechanisms1917b New Procedures for Controlling Security Provisions1917c Existing Monitoring Processes2018b Identify and document the implementation strategy20Design Audit Mechanisms2019a Audit Principles and the relevance to security 16b Control mechanisms1917b New Procedures for Controlling Security Provisions1917c Existing Monitoring Processes2018b Identify and document the implementation strategy20Design Audit Mechanisms2019a Audit Principles and the relevance to security planning2019c Response principles21Identify Technology Fixes2119d Response mechanisms2121a Establish technology needs....
10 Pages (2500 words) Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us