20,151 research outputs found
Mobile Value Added Services: A Business Growth Opportunity for Women Entrepreneurs
Examines the potential for mobile value-added services adoption by women entrepreneurs in Egypt, Nigeria, and Indonesia in expanding their micro businesses; challenges, such as access to digital channels; and the need for services tailored to women
Recommended from our members
Towards a business model for cellular network and telecommunication operators: a theoretical framework
Cellular networks and telecommunications bring major change to the way businesses are conducted.
Mobility has become one of the main priorities for users and this has impacted on cellular networks and telecommunication operators (CNTOs). However, entrants into the cellular industry have been confounded primarily by inexistent or weak Business Models (BMs). Designing a BM for a CNTO is
complex and requires multiple actors to balance different and often conflicting design requirements. Nevertheless, most research about CNTOs has been technically oriented and has mainly addressed the technological and engineering issues related to their infrastructure. Less attention has been given to
the business model of CNTOs. Hence, there is a need to enhance our ability to determine what
constitutes the optimal and most viable business model to meet the various strategic objectives and
goals for these CNTOs. In this paper an overview of research into the cellular business model and the main issues to be resolved is provided. In particular, the authors propose guidelines as a basis on which to develop a more comprehensive definition which may lead to a consensus. Moreover, a generic model (V4 Model) is proposed for the BM of these companies based on value proposition, value architecture, value network and value finance
Cognitive Radio Networks: Realistic or Not?
A large volume of research has been conducted in the cognitive radio (CR)
area the last decade. However, the deployment of a commercial CR network is yet
to emerge. A large portion of the existing literature does not build on real
world scenarios, hence, neglecting various important interactions of the
research with commercial telecommunication networks. For instance, a lot of
attention has been paid to spectrum sensing as the front line functionality
that needs to be completed in an efficient and accurate manner to enable an
opportunistic CR network architecture. This is necessary to detect the
existence of spectrum holes without which no other procedure can be fulfilled.
However, simply sensing (cooperatively or not) the energy received from a
primary transmitter cannot enable correct dynamic spectrum access. For example,
the low strength of a primary transmitter's signal does not assure that there
will be no interference to a nearby primary receiver. In addition, the presence
of a primary transmitter's signal does not mean that CR network users cannot
access the spectrum since there might not be any primary receiver in the
vicinity. Despite the existing elegant and clever solutions to the DSA problem
no robust, implementable scheme has emerged. In this paper, we challenge the
basic premises of the proposed schemes. We further argue that addressing the
technical challenges we face in deploying robust CR networks can only be
achieved if we radically change the way we design their basic functionalities.
In support of our argument, we present a set of real-world scenarios, inspired
by realistic settings in commercial telecommunications networks, focusing on
spectrum sensing as a basic and critical functionality in the deployment of
CRs. We use these scenarios to show why existing DSA paradigms are not amenable
to realistic deployment in complex wireless environments.Comment: Work in progres
Security analysis of mobile edge computing in virtualized small cell networks
Based upon the context of Mobile Edge Computing (MEC) actual research and within the innovative scope of the SESAME EU-funded research project, we propose and assess a framework for security analysis applied in virtualised Small Cell Networks, with the aim of further extending MEC in the broader 5G environment. More specifically, by applying the fundamental concepts of the SESAME original architecture that aims at providing enhanced multi-tenant MEC services through Small Cells coordination and virtualization, we focus on a realistic 5G-oriented scenario enabling the provision of large multi-tenant enterprise services by using MEC. Then we evaluate several security issues by using a formal methodology, known as the Secure Tropos
ICT Sector Performance
The country âperformance reviewsâ summarised in this volume were conducted in 2003 by the initial
members of the Research ICT Africa! network. The studies seek to assess the performance of the
countriesâ telecommunications sectors â and reform strategies adopted â against their respective
national objectives.
These studies are the first contribution by network members to the realisation of the RIA! vision â our vision of a biquitous African information society and knowledge economy, actively shared in by all.These studies are the first contribution by network members to the realisation of the RIA! vision â our vision of a biquitous African information society and knowledge economy, actively shared in by all
The case for "Open Access" communications infrastructure in Africa : the SAT-3/WASC cable - a briefing
This study examines the impact the SAT-3 fibre optic submarine cable has had on telecommunications in four African countries has found that the potential of the cable has not been properly exploited. Instead, ownership of the cable by telecoms incumbents in the countries researched has reinforced their market positions. The study analyses the effect ownership of the South Atlantic 3/West Africa Submarine Cable (SAT-3/WASC) has had on the communications markets in Angola, Cameroon, Ghana and Senegal. It focuses on the 'Africa section' of the submarine cable -running along the west coast of Africa down to southern Africa- with a specific emphasis on access and cost
- âŠ