scispace - formally typeset
Search or ask a question

Showing papers on "Telecom infrastructure sharing published in 2004"


01 Jan 2004
TL;DR: Smart-phones, interoperable between the telecom networks and the Internet, are dangerous conduits for Internet security threats to reach the telecom infrastructure and the damage caused by subverted smart-phones could range from privacy violation and identity theft to emergency call center DDoS attacks and national crises.
Abstract: Internet has been permeating into every corner of the world and every aspect of our lives, empowering us with anywhere, anytime remote access and control over information, personal communications (eg, through smart-phones), and our environment (eg, through the use of sensors, actuators, and RFIDs) While enabling interoperation with the Internet brings tremendous opportunities in service creation and information access, the security threat of the Internet also dauntingly extends its reach In this paper, we wish to alarm the community that the long-realized risk of interoperation with the Internet is becoming a reality: Smart-phones, interoperable between the telecom networks and the Internet, are dangerous conduits for Internet security threats to reach the telecom infrastructure The damage caused by subverted smart-phones could range from privacy violation and identity theft to emergency call center DDoS attacks and national crises We also describe defense solution space including smart-phone hardening approaches, Internet-side defense, telecom-side defense, and coordination mechanisms that may be needed between the Internet and telecom networks Much of this space is yet to be explored

98 citations


Journal ArticleDOI
TL;DR: In this paper, the authors focus on the question of how Unisource, an alliance of Swedish Telia, Dutch KPN Telecom, Swiss Telecom and Spanish Telefonica has coped with the control vs commitment dilemma.
Abstract: The telecom sector has changed dramatically during the last decade. In order to meet new regulations, fierce competition and a growing demand for cheap and high quality telecom services by multinationals, European public telecom operators have created pan‐European strategic alliances. This paper focuses on the question of how Unisource, an alliance of Swedish Telia, Dutch KPN Telecom, Swiss Telecom and Spanish Telefonica has coped with the control vs commitment dilemma. The four telecom providers wanted to merge their activities with Unisource. To create commitment and trust the parents used a synergy strategy to deal with cultural diversity. Unisource was started in 1992, but finally collapsed in 1999 due to lack of commitment. The crisis in Unisource shows the dilemma of control vs commitment in a dynamic transition process of organisations.

22 citations


Journal ArticleDOI
TL;DR: In this article, the authors assess whether investment in infrastructure and broader institutional infrastructure reforms have been reflected in better infrastructure service provision across transition economies, and find that increased investment, tariff increases and the establishment of an independent regulator are all significantly associated with the reduction of power and telecom outages.

14 citations


Book
21 May 2004
TL;DR: This paper presents a service-Oriented Architecture for Telecom Management - Operations, a practical guide to end- user needs and Demands, and some practical suggestions for improving the quality of service.
Abstract: Preface.About the Author.References and Acknowledgements.Glossary.1. Introduction.2. End-User Needs and Demands.3. Networks and Technologies.4. Telecom Business.5. Services.6. Security.7. Quality of Service. 8. Service Implementation.9. Service Network.10. Terminals.11. Edge Nodes.12. Packet Backbone.13. Access Network.14. Control Network.15. Interconnection.16. Telecom Management - Operations.Appendix 1: Web Services and a Service-Oriented Architecture.Appendix 2: Financial Calculations.Appendix 3: Development Tracks.Appendix 4: Dimensioning Media Gateways and Associated Telephony Servers.Index.

13 citations


Journal ArticleDOI
Kim Chulwon1
TL;DR: In this article, the authors examined problems and solutions related to electronic commerce in the tourism industry and developed strategies for electronic commerce, in terms of innovation and growth of small and medium-sized tourism enterprises.
Abstract: This paper deals with e-tourism, innovation and growth of the small and medium-sized tourism enterprises (SMTEs). The Internet is revolutionizing the distribution of tourism information and sales. The SMTEs with well-developed and innovative Web sites can now have "equal Internet access" to international tourism markets. This implies equal access to telecom infrastructure, as well as to marketing management and education. Thus, this paper aims to examine problems and solutions related to electronic commerce in the tourism industry and to develop strategies for electronic commerce in terms of innovation of the tourism industry.

10 citations


Book
01 Jan 2004
TL;DR: The ISACs have identified challenges requiring further federal action, including building trusted relationships, developing processes to facilitate information sharing, overcoming barriers to information sharing; clarifying the roles and responsibilities of various government and private-sector entities that are involved in protecting critical infrastructures; and funding ISAC operations and activities as discussed by the authors.
Abstract: Federal awareness of the importance of securing the nation’s critical infrastructures—and the federal government’s strategy to encourage cooperative efforts among state and local governments and the private sector to protect these infrastructures—have been evolving since the mid1990s. Federal policy continues to emphasize the importance of the ISACs and their information-sharing functions. In addition, federal policy established specific responsibilities for DHS and other federal agencies involved with the CIP sectors. The ISACs have identified challenges requiring further federal action, including building trusted relationships; developing processes to facilitate information sharing; overcoming barriers to information sharing; clarifying the roles and responsibilities of the various government and private-sector entities that are involved in protecting critical infrastructures; and funding ISAC operations and activities.

7 citations


Journal ArticleDOI
TL;DR: In this paper, the authors take an interest group approach to analyse Thai telecom politics and argue that oligopoly-structured markets similar to those which already exist for fixed-line and mobile telephony services will be the likely endpoint of Thailand's current telecom liberalization phase.
Abstract: ��� Thispaper reviews the reorganization ofThailand's telecommunications marketsfrom the late 1980s up to the present with emphasis on the changes that have occurred during the current Thaksin administration. We take an interest group approach to analysing Thai telecom politics. Our view is that the main interestedparties will have the greatest influence on policy and that policy outcomes will therefore reflect the goals of those groups. Currently, the telecom policy landscape in Thailand is characterized by the leading position held by the country's private sector telecom firms. Support for these companies and their goals has become the driving force behind telecom policy and has replaced the more bureaucratic-led policy-making of the last decade. While the newly dominant coalition of private sector telecom operators can be seen as supporting the completion of the privatization ofThailand's public sector telecommunications organizations, they are not likely to support the creation of the fully competitive telecom markets envisioned during past administrations. We therefore argue that oligopoly-structured markets similar to those which already existforfixed-line and mobile telephony services will be the likely endpoint of Thailand's current telecom liberalization phase.

6 citations


01 Jan 2004
TL;DR: This research presents a meta-analysis of how the privatization process of telecom operators in different countries created a environment where knowledge was viewed as a key strategic resource and how that environment changed over time.
Abstract: Background: In today’s highly competitive business environment, knowledge is viewed as a key strategic resource. The privatization process of telecom operators in different countries created a dema ...

5 citations


01 Jan 2004
TL;DR: In this article, the authors present a system model of the market for technology-intensive assets and apply it to the military transport aircraft market, a classic case of slow growth and replacement and dominance by a few suppliers.
Abstract: Many markets are dismissed because they are “mature” The conventional wisdom says these markets are lacking in opportunity, particularly for new entrants or new products, because their growth is quite slow, asset lives are long, operators have strong incentives to stretch the life of existing assets rather than replace them, and the markets are dominated by a small number of well entrenched suppliers Innovative technology can disrupt a mature market and change its dynamics The incumbent suppliers may be more vulnerable than they appear The business opportunity could be enormous for a company who understands the market dynamics, constructs an effective competitive strategy, and has the strength and persistence to see it through This paper presents a system model of the market for technology-intensive assets It is applied to the market for military transport aircraft, a classic case of slow growth and replacement and dominance by a few suppliers But the system model is more general It explains important dynamics of many other markets, eg, industrial process plants, telecom infrastructure, large-scale IT, media production and distribution, motor vehicles, and not surprisingly commercial aircraft 1

4 citations


Journal ArticleDOI
TL;DR: The very concept of domestic regulation in telecommunications comes from multilateral commitments of international trade in services, under WTO GATS as mentioned in this paper, where regulation in telecom services, directly affect commercial and bilateral relationships of partner countries.
Abstract: The very concept of 'domestic regulation' in telecommunications comes from multilateral commitments of international trade in services, under WTO GATS. As international trade is a domain of multilateral and intergovernmental diplomatic relations, where regulation in telecom services, directly affect commercial and bilateral relationships of partner countries. Under WTO commitments Pakistan has opened up its telecom sector under De-Regulation Policy of 2003 and now the privatization process of PTCL (the national incumbent operator) is under way. Even after adopting the 'Technology Neutral' Policy, Pakistan's Telecom market is divided into two (2) main technologies i.e., CDMA (US) and GSM (European) technologies respectively. Further the policy has adopted to restrict the mobility of WLL (Wireless Local Loop) operators making the 'Technology Neutral' doctrine a paradox. Specific technology choices has activated forces of commercial diplomacy to play their aggressive role, to force the market into different directions of technology-choices. Here, Pakistan has earlier tried to liberalize some infrastructure sectors, like power and deep-sea fishing. These became wrong policy choices which even haunt the policy-markers today. At the time when this paper is written, Pakistan was in the mid of telecom policy evolution.

3 citations


Journal Article
TL;DR: The Telecom Regulatory Authority of India's recommendations make effective de-licensing possible through a system for 'automatic licensing', subject to transparent published guidelines, but Spectrum permits are still strictly controlled by the spectrum advisor with no provision for trading.
Abstract: The Telecom Regulatory Authority of India's recommendations make effective de-licensing possible through a system for 'automatic licensing', subject to transparent published guidelines. Spectrum permits are, however, still strictly controlled by the spectrum advisor with no provision for trading. The regulatory authority needs to reconsider this issue.

Proceedings ArticleDOI
Xiulan Yu1, Xiaoyan Chen1, Xing Fang1, Xiaocheng Ding2, Bin Zhou2, Bing Wei2 
13 Sep 2004
TL;DR: The multiple aspects of Web service security are discussed, a web service security performance experiment results based on data size and different security policies are provided, and suggestions on how to apply Web services security technology to data service delivery platform interface design are given.
Abstract: The major requests for telecom network are efficiency, security, and reliability of service. Data service, running on the telecom network, is a most prominent revenue source for telecom operators. But traditional interface for data service delivery platform cannot completely meet these requirements. Web services, as a promising distributed computing technology, is regarded as the best candidate to design these interfaces. However, whether Web services technology can satisfy the telecom major requirements, especially security request, is still a question for telecom operators. This paper discusses the multiple aspects of Web service security, provides Web service security performance experiment results based on data size and different security policies, and gives suggestions on how to apply Web service security technology to data service delivery platform interface design

01 Jan 2004
TL;DR: In this paper, the authors focus on the issue of Mergers and Acquisition in the case of user/consumer access, which is closely related to the certain aspects of spectrum policy and the issues connected with spectrum cannot be considered in isolation from that of mergers and acquisition.
Abstract: Introduction Virmani (1999) argued for complete de-licensing of entry into (and exit from) Telecom services coupled with competitive auction of tradable spectrum permits. The former was to be achieved through an amendment of the Telegraph Act to replace the public monopoly provisions in the act by an injunction to “promote competition.” Despite the fact that the Telegraph act has not been amended in this way, effective delicensing is still possible through a system for “automatic licensing,” i.e. free issue of licenses subject to transparent published guidelines. This is what the TRAI has recommended to the government, (which has accepted this recommendation) and is drawing up detailed guidelines for implementing. Spectrum permits are however still strictly controlled by the spectrum advisor with no provision for trading. This aspect needs to be reconsidered by TRAI. Now that we are on the way to de-licensing, the issue of market structure and competition assumes greater urgency. This paper therefore focuses on the Issue of Mergers and Acquisition. In the case of user/consumer access this issue is closely related to the certain aspects of spectrum policy. The issues connected with spectrum cannot, therefore be considered in isolation from that of Mergers and acquisition.

Proceedings Article
01 Jan 2004
TL;DR: A methodological approach for determining the range of services, customers and product options that will be successful in the new mobile-business environment is described, able to closely meet the needs of the digital economy’s more sophisticated customers, and therefore increase the potential success of the new business models.
Abstract: The advent of the digital economy has brought about radical changes in traditional business channels and operations in several industries. This paper reviews opportunities and challenges that the digital economy has opened in the telecommunication industry in general, and more specifically for mobile telecom operators. It explores the key strategies and technological factors that are guiding the reshaping of the business models for mobile telecom operators, and discusses ongoing changes in the traditional mobile value chain. In addition to presenting a conceptual overview of emerging business models, the paper describes a methodological approach for determining the range of services, customers and product options that will be successful in the new mobile-business environment. The strength of this approach lies in its ability to closely meet the needs of the digital economy’s more sophisticated customers, and therefore increase the potential success of the new business models.

Proceedings ArticleDOI
19 Sep 2004
TL;DR: In this article, a risk control asset management approach is proposed to support the transition of a new generation network that will deliver existing services and extend the network capability to pick up new data and video demand.
Abstract: Telecom New Zealand (Telecom)'s network is accommodated in buildings and supported by infrastructure, some of which dates back to the 1950s. Much of that infrastructure has been upgraded and replaced as it has come to the end of its useful life. Competition for internal funding and drive for increased efficiency has necessitated investigations into methods which will lead to a reduction in capital spend and maintenance costs without compromising performance. In parallel with this, Telecom is planning the rollout of a new generation network that will deliver existing services and extend the network capability to pick up new data and video demand. To ensure spend on plant operation and short term investments is minimised during the transition period, it has been necessary to adopt a risk control asset management approach. This involves a methodology that integrates plant replacement and the extension of existing plant life and to support the growth in demand at sites that will be retained in this new network environment. In New Zealand and Australia the infrastructure industry has developed an asset management standard based around local council infrastructure of roads, water services etc. Telecom has followed this standard and developed an asset management plan to assist all those involved within Telecom in infrastructure management. It is a tool to: illustrate procedures, assist in determining priorities and identify additional tools required to ensure more effective management.