Google’s Dominance in Search Engine Space under Threat in Australia

    Google faces the prospect of giving up its position as the default search engine on tablets and mobile phones as an antitrust watchdog in Australia wants the tech giant’s power to be reined in. 

    As per Bloomberg News, The Australian Competition & Consumer Commission (ACCC) has recommended a compulsory choice screen and alternative search engine providers to be displayed on the new and current mobile devices that run on the Android operating system provided by Google. The watchdog is considering inviting Apple iPhones and desktop services to be a part of the change. 

    The ACCC has also said that it may demand that users use the internet browser of their choice.  

    This plan is similar to the one followed in Europe right now, where Google Android devices have a small screen that allows users to choose the search engines operated by small companies. The google search integration into Android is about text input and several other features of the operating system structure, including google assistant, which is voice-activated. The choice of provider is a step away from shaking Google’s dominance. 

    Google’s market share is 94% in search engines in Australia, as per the ACCC. Regulators enforcing more measures would prolong the assault on Google’s dominance in the country. Australia this year passed a law which is the first of its kind in the world, that forces Alphabet Inc-owned Google and Facebook Inc to pay publishers for using their news. 

    The ACCC is planning to start consultations on these new proposals. Google is the default search engine on two popular browsers like Apple’s Safari and Google’s Chrome. These two browsers are pre-installed on most Australian mobile devices.

    According to ACC Chairman Rod Sims, Google existing commercial arrangements and dominance have created increased entry barriers and prevented new rivals’ search engines from reaching the consumers. 


    RELATED ARTICLES

    what is the purpose of the network security authentication function?

    Network Security Authentication: Key Purpose!

    In the digital generation, in which cyber threats and facts breaches have come to be...
    Why Businesses Benefit from Cloud Consulting Services

    Why Businesses Benefit from Cloud Consulting Services

    Cloud technology is reshaping how businesses operate, offering flexibility, scalability, and cost efficiency. However, navigating...
    How to secure starlink network

    Secure Your Starlink Network with These Pro Tips

    Starlink, the satellite internet provider advanced by SpaceX, has converted international net accessibility by presenting...
    https //uxapps.ultimatix.net

    https //uxapps.ultimatix.net: How to Navigate and More

    Efficiency is the most crucial aspect of success in the corporate world. Ultimatix is known...
    Management Platform for Social Workers

    Maximize Efficiency with a Powerful Case Management Platform for Social Workers

    Social work involves comprehensive documentation and seamless data operations. The outcomes of social intervention are...
    How does a hash help secure Blockchain Technology?

    How Does a Hash Help Secure Blockchain Technology?

    Blockchain technology has made many different industries flip a switch to efficiencies with decentralization and...
    Nail Tech Courses

    Nail Tech Courses: Turn Your Side Hustle into a Business

    Do you love creating unique nail designs and spoiling friends and family with gorgeous manicures...
    Best Online Stock Market Courses

    Best Online Stock Market Courses to Boost Your Investing Skills

    Investing in the stock market is an exciting way to grow your wealth, but it...
    Filmy4WEB XYZ

    Filmy4web xyz or com: Download New Movies in HD

    Filmy4web xyz or com: The allure of free movies often masks underlying dangers. Are you...
    Marketing Strategy in 2025

    Why Every Business Needs a Video Marketing Strategy in 2025

    If a picture is worth a thousand words, what could a video be worth in...
    what is the purpose of the network security authentication function?

    Network Security Authentication: Key Purpose!

    In the digital generation, in which cyber threats and facts breaches have come to be...