16,086 research outputs found

    Design and initial validation of the Raster method for telecom service availability risk assessment

    Get PDF
    Crisis organisations depend on telecommunication services; unavailability of these services reduces the effectiveness of crisis response. Crisis organisations should therefore be aware of availability risks, and need a suitable risk assessment method. Such a method needs to be aware of the exceptional circumstances in which crisis organisations operate, and of the commercial structure of modern telecom services. We found that existing risk assessment methods are unsuitable for this problem domain. Hence, crisis organisations do not perform any risk assessment, trust their supplier, or rely on service level agreements, which are not meaningful during crisis situations. We have therefore developed a new risk assessment method, which we call RASTER. We have tested RASTER using a case study at the crisis organisation of a government agency, and improved the method based on the analysis of case results. Our initial validation suggests that the method can yield practical results

    (De)convergence in TV: a comparative analysis of the development of Smart TV

    Get PDF
    Against the backdrop of media convergence, Smart TVs are developing rapidly in large parts of the world. Smart TV refers to the integration of broadband Internet and social media features into TV sets. From a media business perspective, the proliferation of Smart TV services may put pressure on the market structure of the TV landscape, and urge for new business models in order to capture the dynamics of media convergence. By means of a comparative analysis in four European markets (Belgium, Germany, the Netherlands and the United Kingdom), the development of Smart TV is sketched in terms of viewing patterns, business models and standardization. The conclusion is that national TV markets are evolving quite differently, so that service providers must adapt their marketing strategies to reflect local market conditions. Hence, the success of Smart TV ultimately depends on the local package of value-added services and the amount of strategic partnerships with content owners, TV broadcasters and pay-TV operators

    Mobile banking in Asia

    Get PDF
    Technology has transformed the banking industry with the introduction of mobile banking services that offer unprecedented convenience and accessibility to customers. This Asia Focus report describes the various approaches to mobile banking in Asia, and examines how particular countries have addressed regulatory issues.Payment systems ; Electronic funds transfers

    Validating the raster risk assessment method in practice

    Get PDF
    Telecommunication services are essential to modern information systems, especially so for crisis management. Telecoms systems are complex and difficult to analyse. Current risk assessment methods are either not used because of their complexity, or lack rigorous argumentation to justify their results because they are oversimplified. Our challenge has been to develop a risk assessment method that is both usable in practice and delivers understandable arguments to explain and justify its risk evaluations. After experiments to validate the method in laboratory environments, we now present the first results from successful application with practitioners in a regional crisis organization that provides evidence about the practical usability of the method

    An eco-solution for track & trace of goods and third party logistics

    Get PDF
    This paper presents a new economic cost-effective solution known as the Web and telephony based method for tracking and tracing of goods and small and medium sized third party logistic providers. Considering that these companies usually operate on very flat margins, a comparison is made of the available track and trace technologies like GPS, mobile phone approximated GPS and Java based cell tracking in terms of costs, operating risks, and other evaluation criteria

    Analysis of WIMAX/BWA Licensing in India: A real option approach

    Get PDF
    Indian Internet and broadband market has experienced very slow growth and limited penetration till now. The introduction of Broadband Wireless Access (BWA) is expected to aid in increasing the penetration of internet and broadband in India. The report sheds light on the guidelines and procedure used in 4G/BWA spectrum auction and presents comparative analysis of the competing technologies, providing the information about suitability of each technology available. Recently held 4G/ BWA spectrum auction saw enthusiastic participation by the industry and even saw some new entrants in Indian broadband market. Government benefited by Rs, 385bn that it earned as revenue from the auction of the spectrum and projected it as successful auction. However, the question remains if the auctions were efficient and whether they led to creation of value or will it prove to be burden to the telecom operators and will depress their balance sheet for years to come. The report uses both traditional valuation methods such as Discounted Cash Flow as well as Real Option approach to answer such questions. Using DCF analysis, the broadband subscribers have been forecasted to grow from present 13.77mn to 544mn by the end of 2025. The wireless subscribers are forecasted to be 70% of the total broadband subscribers after 5 years of roll out as it will be difficult to replace all wireline subscribers with wireless subscribers in India due to the high cost of wireless broadband and new technology. WiMAX is expected to increase its presence with time and reach 90mn subscribers from meager 0.35mn subscribers by 2025. Using industry wide cost of capital as 12.05%, the Net Present Value has been found Rs 221bn aggregate with an IRR of 17.1%. Using Real option approach, the value of license has been calculated as Rs 437bn which is 13.5% more than the spectrum fees paid by the operators. This mismatch, between the auction value and the correct value that should have been discovered by supply-demand dynamics, can be due to limited participants in BWA spectrum auctions and companies such as TATA and Reliance opting out of the auction process midway as well as uncertainty about acceptance of new technology with Indian subscribers.WiMAX, broadband, 3G spectrum, 4G,broadband wireless access, valuation, licensing, real option

    Reviewing PPP Performance in Developing Economies

    Get PDF
    The current wave of PPPs in developing economies was not determined by an endogenous process; on the contrary, it was due to a coincidence of interests between international organizations that shared the view of the Washington Consensus and a set of countries that have considered divestiture the best way to alleviate the public deficit constraints. After the euphoria of the middle 1990s, some disenchantment about the capacity of PPI policy to overcome the existent big gaps between high-income countries and developing economies appeared. Although a high interconnection between foreign companies and domestic firms has resulted from PPI policy, and this interrelationship has allowed an expansion and upgrading of some domestic firms in developing economies; these economies go on being characterized by a lack of institutional capacity, weak governance systems, and unclear or unsuitable rules and regulations, all of which increase transaction costs and risks, making PPI arrangements more ineffective in practice than in theory. In the meanwhile, poor people in poorer countries caught in poverty traps need to be served and the rationale underling the PPI approach cannot give a positive answer to these people. Here, the government and the ODA must play a more extensive role than they have played since the emergence of the PPP fashion.Developing economies, infrastructure, PPI, public-private partnership

    Towards the Model-Driven Engineering of Secure yet Safe Embedded Systems

    Full text link
    We introduce SysML-Sec, a SysML-based Model-Driven Engineering environment aimed at fostering the collaboration between system designers and security experts at all methodological stages of the development of an embedded system. A central issue in the design of an embedded system is the definition of the hardware/software partitioning of the architecture of the system, which should take place as early as possible. SysML-Sec aims to extend the relevance of this analysis through the integration of security requirements and threats. In particular, we propose an agile methodology whose aim is to assess early on the impact of the security requirements and of the security mechanisms designed to satisfy them over the safety of the system. Security concerns are captured in a component-centric manner through existing SysML diagrams with only minimal extensions. After the requirements captured are derived into security and cryptographic mechanisms, security properties can be formally verified over this design. To perform the latter, model transformation techniques are implemented in the SysML-Sec toolchain in order to derive a ProVerif specification from the SysML models. An automotive firmware flashing procedure serves as a guiding example throughout our presentation.Comment: In Proceedings GraMSec 2014, arXiv:1404.163
    • …
    corecore