BCO6653 Management of IT: Telstra & Vodafone Cloud Computing Case

Verified

Added on  2023/06/11

|15
|7715
|364
Case Study
AI Summary
This case study analyzes the implementation of cloud computing at Telstra and Vodafone Australia. It begins with an introduction to cloud computing and its benefits, followed by background information on both organizations. The study explores IS planning stages and presents interview responses from executives at Telstra and Vodafone regarding their cloud computing strategies, data security measures, and IT infrastructure management. A comparative analysis of the responses highlights the approaches taken by each company. The paper also references literature on information security strategic planning, emphasizing the importance of securing IT systems against online threats and maintaining data integrity, confidentiality, and availability. Desklib provides access to similar solved assignments and resources for students.
Document Page
COLLEGE OF BUSINESS - INFORMATION SYSTEMS DISCIPLINE
BCO6653 Management of Information Technology
Semester 2, 2014
A study of issues in:
List the topic areas here such as (order matching ‘submitted by’ list):
IT Human Resource Management
Business Continuity Management
Submitted by:
Place your student numbers and names here; these match the topic order above
Group # (place your group number here)
Place date submitted here
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Abstract
This paper has focused on conduction of an Interview with two companies with proper
literature analysis and comparative analysis of the responses gathered. The interview has been
based on the Cloud Computing in their organization. The paper starts with a general
introduction of the topic Cloud Computing. The content of the paper has been able to provide
information about implementation of the Cloud Computing in both companies. The paper
discusses about IS planning stages. The responses of the interview has been provided in the
next sections of the paper. A comparative study of the responses for both companies have been
done properly.
Introduction
Cloud Computing has grown to an extent in various organization. Cloud Computing
has been providing various services to the companies. Cloud Computing have helped in
providing flexible services in the companies. The accessibility factor of the cloud computing
has been creating a lot of opportunities for the companies in the market. The security of the
data and information has been a major issue for the company. Therefore, interview has been
conducted for gathering responses of the executives form both company related to the cloud
computing. The use of the cloud computing in the companies have been discussed in the
report.
Organisation background
Telstra Australia
Telstra Corporation Limited, or usually named as Telstra, is a main media
transmission association in Australia. Telstra had first started in a joint effort with Australia
Post as the Post Master General's Department. It used to control the media transmission
administrations of whole Australia through the Post Master General's Department. With a few
deteriorations later, it at long last began to function as an individual association after the split
in 1992. It was privatized in three unique stages casually alluded to as T1, T2 and T3. Since,
the whole association manages the media transmission administrations of the whole Australia,
it manages one of the major discrete and individual information of its clients. In the year
2011, Telstra had declared that the association would advance in executing another procedure
with the dispatch of Telstra Digital, drove by Gerd Schenkel of National Australia Bank.
The underlying motivation behind this dispatch was for enhancing the utilization of
computerized channels for client administrations. In any case, changes in a media
communications based association in Australia ought to keep up moral direct according to
Australian law proposes. Along these lines, it is fundamental that Telstra has cutting edge
digital safety efforts to ensure the basic and discrete information of their clients from being
hacked or abused by pernicious programmers. In Australia itself, the whole association of
Telstra had executed divisions in the hierarchical structure, basically committed to the digital
security group. The group divisions secure propose an arranged structure through which the
security group is actualized. The security framework is then organized in rates, making it
dependable to address every one of these divisions as indicated by their needs. Out of the
whole workforce in the digital security group, 38 percent need is committed to review the
security framework. 36 percent of the organized errand stays devoted to chance evaluations of
the whole framework.
The Head office is situated in Melbourne Australia. It is one of the tallest structures in
Australia and is situated in 242 Exhibition road. The landing page URL of the association is
https://www.telstra.com.au/. The individual who is met for this specific task is Stephen Eloph,
P a g e | 2
Document Page
the Technology and development official of the organization (Telstra - cell phones, prepaid
telephones, broadband, web, home telephones, business telephones 2018). He is as of now
situated in Sydney and is in charge of keeping up the digital security issues of the
organization.
Vodafone Australia
Vodafone Australia is a media transmission association working on Australia which
gives settled and portable broadband administrations. The system covers in excess of 21
million Australians and its broadband administrations and extends its administrations in
territorial focuses and capital urban areas. The association was made as a joint wander
between Hutchison Telecommunications and Vodafone Group Plc. The organization has
strong digital security specialists and have improved their group capacities after the
vulnerabilities distinguished by Specter and Meltdown.
P a g e | 3
Document Page
The organization has legitimate 4G arrange benefits and keeps up the IT frameworks
proficiently. It has more than 120 Retail stores all around Australia and has its primary
headquarter at Sydney, 177 Pacific Hwy. The landing page URL of the organization is
https://www.vodafone.com.au.
The individual who is met for this specific task is the central innovation officer of the
organization to be specific Kevin Millroy. Kevin Milroy was delegated as the main
innovation officer by Vodafone in July. He was in charge of dealing with the IT branch of the
organization. He was the general administrator of the organization and was in charge of
extending the IT anticipates and revealing the system overhaul. He was associated with the
Mobile dark spot program as well. As the leader of the IT division his activity is to grow the
current VHS organize and conveying the required broadband inside the following year
(Mobile Phone, Tablet and Mobile Broadband Plans 2018).
P a g e | 4
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
IS Planning
The utilization of an appropriate arrangement for the security of the data is especially
basic for an organization (Peltier 2013). The best possible utilization of the arrangement for
the frameworks of data based security would be to a great degree accommodating with a
specific end goal to help in shielding the association from instances of online robbery (Liu,
Zhang and Li 2013). The instances of online robbery are for the most part regular among IT
based associations and organizations. This is because of the way that these segment contain a
gigantic measure of essential information of their workers and in addition the shoppers. The
essential focal point of the IT businesses is to secure their frameworks and hence help in
keeping the important data from being getting stolen (Lin, Wang and Kung 2015).
With a specific end goal to secure the IT based frameworks, it is to a great degree
fundamental for the organizations to secure the frameworks to ensure their data (Martinez and
Pulier 2015). An appropriate arrangement for the security of data should be set up by the
organization keeping in mind the end goal to ensure the indispensable data of the customers.
An Information Security Strategic Plan would be useful in situating an association keeping in
mind the end goal to decrease, exchange, acknowledge and stay away from the danger of data
frameworks that are identified with innovations, procedures and individuals (Stiff, Sharpe and
Atkinson 2014). A legitimate built up procedure is additionally useful for the association
keeping in mind the end goal to ensure the trustworthiness, classification and accessibility of
significant data (Vian et al. 2014).
The advantages with the end goal of the business in light of a compelling security
system design is generally huge and has the capacity to offer an upper hand (Wang et al.
2013). These might incorporate the reason for following the measures inside the business,
keep away from an occurrence implied for harming the security, supporting the business
notoriety and in this manner helps in supporting responsibility with the accomplices, clients,
providers and investors (Rong et al. 2015).
IS Planning Literature Analysis
The essential point of the vital arrangement for the security is to give an
administration the fundamental data keeping in mind the end goal to settle on educated
choices about the speculation made inside the security. The arrangement for the procedure for
the data based security is connected with the capacity of security with the course of the
business (Rao 2014).
The procedure should show an instance of the business, which would depict the
principle advantages of the business and the results, which are in connection with the security.
The arrangement additionally gives prescribed procedures with a specific end goal to
accomplish the results.
The procedures implied with the end goal of security would help in accomplishing the
targets of the business to identify and tending to the necessities for the IT based framework
inside an association. The arrangement additionally gives business based capacities and a few
sort of activities, arrangement for IT based framework, procedures and individuals that would
have the capacity to meet the fundamental prerequisites of security (Little et al. 2013)..
IS Planning Literature Analysis
The IT based associations or organizations need to execute an arrangement with a
specific end goal to guarantee the security of the benefits of the association. This arrangement
is characterized by the security experts inside the specific business. A legitimately based IT
security issue would be useful in giving a system so as to stay with the at a proposed level of
P a g e | 5
Document Page
security. This could be accomplished by getting to the measure of dangers, choosing the
procedures so as to relieve them and an appropriate arrangement to refresh the projects and the
acts of security (Gusmeroli, Piccione and Rotondi 2013).
Telstra
Neil Campbell, the chief of worldwide security arrangements of Telstra has given a
scope in view of the security arrangements of the association. His considerations were that the
physical based security had begun as a simple and mechanical reality where the locks implied
for checking was a physical based errand. In the 21st century, the security in view of the IT
space is a noteworthy concern. A focal station for the checking could be utilized for a blend of
video and electric based entryway intended to access with a specific end goal to keep a sharp
sight on the availability and control over the IT frameworks. Amid the meeting, he expressed:
"The essential test inside the business is to meet the innovation inside the business. The
clients ought to have an alternate arrangement of capacities that would be never found inside a
similar association (Slocombe 2017)."
Neil additionally trusts that the two distinct universes ought to have crashed as on the
grounds that the innovation is making simple to play out the things midway.
"A legitimately reasonable administration for the security is implied keeping in mind
the end goal to guarantee that the client ought to have the suitable mix of the dynamic and
detached controls inside the systems and the client ought to have the capacity to screen over
them."
"In the event that information is shared from the frameworks of electronic security and
the frameworks of digital security, at that point it ought to be done in a secured mold."
Vodafone
Interviews in view of the security authority of Vodafone arrived at a conclusion that
the general information protection inside the frameworks is on the ascent and it is very basic
so as to secure the frameworks. The attention on the security of the frameworks have
expanded to a larger amount.
They said that the digital insight that fundamentally monitors the digital assaults that
would occur outside. They would endeavor to uncover the data and after that attempt to
recognize the parts of innovation and the usual way of doing things of the assaults.
The most serious issue for the associations is to recognize the information, which is
should have been ensured. The organization is utilizing encryption as far as the control of
access, checking of the entrance to the benefit, change as the arrangements of information, the
correct type of the administration apparatuses of information. All these sort of innovations,
which have been utilized to the innovation front of the scene so as to ensure and secure the
information.
The security masters inside the organization have significantly tested the procedures
keeping in mind the end goal to have a negligible based presentation for the information of the
clients (Kwofie 2013).
Skill Set Related Problem in Countering the Cyber Attacks
The range of abilities is valid for every one of the enterprises. In each industry, there
are different items from the diverse accomplices. Every one of the types of gear identified
with the security identified with the IT area should have been set up and should have been
P a g e | 6
Document Page
worked at the coveted level. The optional factor is the separation factor of the experience of
the clients. The organization is additionally capable in separating the client encounter.
The organization is centered around what's to come. The security pros have said that
they are constantly prepared to encounter more up to date type of innovations. This would
imply that that would keep a check whether they would go to end of life items and inheritance
frameworks.
Vodafone is additionally committed towards awareness with respect to the variables of
cost and adequacy of the cost. They likewise guarantee the partners in wording for the
consistence and the different dangers identified with the protection.
Views on the Adoption of Cloud Based Technology by the Telecom Operators
They would mean the appropriation of cloud based stage to be put by the telcos. The
selection of cloud based stage isn't a simple factor as a result of the necessities identified with
administrative. Telcos need everything close by because of the administrative prerequisites
and remote access, review and upkeep and activity based affirmation. This would essentially
make a level of limitation in light of the appropriation of the cloud stage. This would thus
limit the telcos from winding up considerably more adaptable and supple. There would be
expected to roll out improvements as far as controls.
Comparative analysis
In light of the exchange in view of the two telecom based administrators, it could be
presumed that both of these media transmission organizations have made a few ramifications
in view of its divisions. They have been ensnaring advancements in view of the machine
learning innovation and AI based advances. The normal innovation utilized by both the
administrators are chatbots, which are being utilized on a worldwide premise (Ask et al.
2016). The second innovation, which is being utilized is intellectual processing. All the media
transmission administrators have understood that the essential administration is information
and voice. They can't generally depend on the bearer for the customers. They should begin on
the production of the substance. Significantly more sort of innovations are being embraced by
both of these administrators. The SON based innovation is being utilized by Vodafone. This
innovation is being utilized quickly. This innovation has the essential ability to advance the
procedure of conveyance (Swetina et al. 2014). The optional factor is the client based
understanding. There are a few undertakings around the experience of the clients and the new
pattern is to set new type of IT based security answers for the telecom administrators. A
significant number of these activities are for the most part utilized for the advanced space.
There are numerous dangers identified with the IT based divisions inside the new
advancements. This has prompted the reception of more current type of innovations inside the
segments (Alam et al. 2014).
Issues studied
Topic 1: Customer Privacy as a competitive advantage
P a g e | 7
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
The telecom area is developing at an amazing pace in everywhere throughout the
world. The utilization of media transmission has been vital part of our every day life. Media
transmission ventures are drawing in various number of clients through building up an
appropriate bond with their brands. There are a few key direct, needs toward be consider to
proceed with the heritage (Van Hoboken 2013). Vodafone and Telstra are the main telecom
businesses in all finished Australia. One of the reason of their fame is they esteem their client
protection. Be that as it may, they take after various ways to deal with ensure client private
points of interest, for example, Visa data, address and that's only the tip of the iceberg.
Vodafone: According to the organization's partners, they are vigorously centered
around the client security. As indicated by them, for giving viable administrations to client
they gather some indispensable data from the clients (Ball, Borge and Greenwald 2013). In
any case, this points of interest are overseen in a specific pattern. They entirely takes after the
law requirement divulgence report so as to secure the client protection. They likewise every
now and again reacts to the administration requests keeping in mind the end goal to get to the
client data. It is additionally evident that, Vodafone does not utilize the "satisfactory level" of
security set up to ensure the protection data (Van Hoboken 2013). There are some security
break revealed against the Vodafone. As per the Timothy Pilgrim, Vodafone had been in
rupture of its commitments under the Privacy Act. Be that as it may, he didn't force any
punishment as the Privacy Act does not enable him to do as such.
Difficulties towards Internal Organization Security.
Telstra: Telstra is the main media transmission businesses all through the Australia.
They gather diverse client private points of interest relies upon the administrations wanted by
them. For the most part they assembles credit and charging data keeping in mind the end goal
to direct money related association with the client. They additionally needs the gadget –
particular data as working framework, equipment demonstrate, one of a kind gadget
identifiers, gadget status, arrangement and programming and portable system data. They
additionally assemble data about the item uses and area administrations (Ball, Borge and
Greenwald 2013). The delicate data incorporates, individual's race, ethnic root, political
assessments, wellbeing, religious or philosophical convictions and criminal history. As
indicated by some interior sources, this points of interest are utilized for some reasons
organization, correspondence, change, advancement and direct promoting (Van Hoboken
2013). They additionally take after the information security law entirely. All partners
prerequisites should be fulfilled by striking a harmony between their need to gather/share
client individual data and need to secure client individual data.
Analyze: Vodafone and Telstra are both driving industry that give compelling and
redid telecom administrations to their clients. Both organization accumulate comparable sort
of information from their client, for example, charging points of interest, gadget subtle
elements and area. In any case, they the two uses diverse ways to deal with guarantee client
protection (Ball, Borge and Greenwald 2013). The key contrast between those methodologies
is usage of the "satisfactory level". Vodafone does not utilize the sufficient level that makes
them defenseless against outsiders. They additionally faces this comparable issues previously.
Telstra guarantees that the client data are right and up and coming. They additionally stores
this information in advanced and electric from in a storerooms that worked and claimed by the
organization for singular utilizations (Van Hoboken 2013). This storerooms are likewise
ensured by joined numerous specialized arrangement, security controls and inner procedures to
shield information and system from unapproved access and exposure.
Topic 2: Challenges in implementing secured third party environment
P a g e | 8
Document Page
The spotlights on the outsourcing model is additionally expanding with a specific end
goal to keep up the security system among outsiders. This outsourcing model partners with a
few outsiders which fundamentally challenges numerous administrator's data security pose.
The achievement of guaranteeing data completely relies upon the capacity of an association to
viably stretch out their security structure to its outsiders (Ball, Borge and Greenwald 2013).
Overseeing data security is delivering numerous deterrents in numerous key territories.
Foundation supplier, framework integrator, programming seller, retailers and merchants, VAS
supplier, charge printing organization. The purpose for the difficulties is the restricted control
over the outsider condition. The development of outsiders and hazard partners with
outsourcing including security controls as a major aspect of the agreement has turned into a
standard (Van Hoboken 2013). Be that as it may, guaranteeing adherence to the controls and
building up the responsibility for the same winds up testing in the present condition.
Vodafone: Vodafone outsourced numerous a portion of its tasks to different outsiders.
The enormous measure of outsiders are additionally kept up by them successfully keeping in
mind the end goal to pick up the most out of them (Van Hoboken 2013). As indicated by some
insider, this outsiders resemble expanded arms of the administrators which are important to
work. The way toward contracting and distinguishing proof of this outsiders are checked by
the inside officials. This administrators are in charge of to brought together and mange those
outsiders. They additionally habitually collaborate with them and recognizable them about the
everyday tasks (Ball, Borge and Greenwald 2013). Consequently, it is basic that each capacity
comprehends the significance of security and soaks up it in its association with their outsiders.
Vodafone entirely takes after a few intends to accomplish data security at outsiders. This
means are rely on the development and many-sided quality of the outsider condition, benefit
gave and relationship outsiders.
Telstra: Telstra to some degree comparative way to deal with deal with the outsider
data security. Telstra embrace some compelling ways to deal with guarantee the data security
partners with the outsiders (Van Hoboken 2013). The means which are taken after can be
show as security criteria for outsider determination, data security part of agreement,
intermittent hazard appraisal, committed security SPDC from outsider, outsider faculty
training program, security prerequisites part of SLAs and occasional security adherence report
from outsider.
Correlation: Vodafone and Telstra take after comparable ways to deal with keep up the
outsider data security. They both receive some viable ways to deal with guarantee the data
security partners with the outsiders (Ball, Borge and Greenwald 2013). The means which are
taken after can be show as security criteria for outsider choice, data security part of agreement,
intermittent hazard appraisal, devoted security SPDC from outsider, outsider work force
instruction program, security necessities part of SLAs and occasional security adherence report
from third party(Van Hoboken 2013). This means are rely on the development and intricacy of
the outsider condition, benefit furnished and association with outsiders.
Topic 3: Challenge to maintain internal organizational security
As the telecom ventures are advancing the regions of inward associations dangers are
likewise expanding quickly. The principle purposes for the situation is representative
earnestness toward data security, absence of consistency of controls and tremendous land
spread (Ball, Borge and Greenwald 2013). The foundation of the viable data security
association structure has been basic for both IT and system work (Van Hoboken 2013). The
best possible usage of the inward association security will bring about numerous key zones,
for example, developing business tasks, Inorganic business development, and topographical
spread of data. Expanding clients of data resources. Lacking worker mindfulness and
deficient administration duty.
P a g e | 9
Document Page
Vodafone: In most recent few years, they tend to concentrate more on administrative
prerequisites and outside hazard factors. Notwithstanding, the tremendous spread of
administrations and tasks, representative qualities, association of outsiders should be edify to
accomplish more business edges (Van Hoboken 2013). As the associations develop, their
security pose additionally develops to the degree that inside data security turns into a
fundamental cleanliness for doing business tasks. Vodafone should be more centered around
their interior security (Ball, Borge and Greenwald 2013). The correct execution of the inward
association security will bring about numerous key territories, for example, developing
business tasks, Inorganic business development, and land spread of data. Expanding clients of
data resources. Lacking representative mindfulness and deficient administration duty.
Telstra: Telstra has fruitful actualized their inward hierarchical security diagrams.
While interior data security can be implemented by building up innovation controls and
performing intermittent reviews, the accomplishment of such activities would to a great
extent rely on the acknowledgment level of the workers (Van Hoboken 2013). Telecom
administrators need to take a gander at setting up a culture where data security turns out to be
a piece of the DNA of the associations and along these lines their representatives. The best
possible execution of the inward association security will bring about numerous key
territories, for example, developing business tasks, Inorganic business development, and land
spread of data. Expanding clients of data resources (Ball, Borge and Greenwald 2013).
Lacking representative mindfulness and insufficient administration responsibility. Data
Security centers around IT and does exclude center telecom arrange. There is a requirement
for an all encompassing Information Security Organization Structure that coordinates security
in IT and center telecom arrange. Further, the viability of Information Security can be
guaranteed by including business works in security activities.
Compare: Vodafone and Telstra are both driving industry that give compelling and
altered telecom administrations to their clients. Both organization assemble comparable kind
of information from their client, for example, charging subtle elements, gadget points of
interest and area. The best possible usage of the inner association security will bring about
numerous key territories, for example, developing business tasks, Inorganic business
development, and land spread of data (Van Hoboken 2013). Expanding clients of data
resources. Lacking representative mindfulness and deficient administration responsibility.
Vodafone and Telstra both took after comparable methodologies with a specific end goal to
accomplish liner results.
P a g e | 10
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Topic 4: Factors contributing in adoption of New Technology & Services
When all is said in done, the majority of the telecom businesses are receiving best
practices to guarantee that they are set up against conceivable dangers (Ball, Borge and
Greenwald 2013). The requirement for feasible, productive, financially savvy and valuable
course for business which is the driver for progression and ascent of new headways and
organizations. The presence of developments, for instance, 3G, New Generation Networks
(NGN), Wi-Max and use of organizations, for instance, M-Commerce, Cloud figuring
organizations et cetera will benefit everyone by supporting the increase of information,
engaging occupants to get to fundamental correspondence benefits and propelling the change
of advancement movements (Van Hoboken 2013). These mechanical degrees of progress open
telecom heads to new course of action of security risks and vulnerabilities.
Vodafone: Vodafone uses numerous methodologies conquer future dangers. Any
security hazard could happened whenever. Vodafone hones chance administration to keep
away from the conceivable dangers. The usage of such new innovations are additionally
fundamental. They helped business to become further and set up mark esteems. As indicated
by the organization's partners, they are intensely centred around usage of new advancements.
As indicated by them, the usage of the new innovation can help the association to accomplish
their objectives while keep up the security concerns. Organizations, for instance, m-
Commerce, enables customers to perform business trade and what's more official
correspondence wherever they go (Van Hoboken 2013). These mechanical movements speak
to a test to general information security scene with in the telecom executive.
Telstra: The Company has a few practices with a specific end goal to confront the
dangers of future in view of the security of the gadgets. The organization additionally hones
the administration of dangers to maintain a strategic distance from the conceivable dangers
without bounds. As indicated by the partners of the organization, they are intensely decided on
the correct usage of the up and coming advancements. They can actualize the fresher type of
innovation, which could help the association to achieve the objectives while keeping up the
essential worries of security. The essential organizations, for example, m-Commerce would
help in enabling the customers with a specific end goal to play out the trading of business and
notwithstanding the official correspondence. These mechanical based movements would speak
to a general information for the security of information inside the executive of telecom.
Compare: Telstra and Vodafone are committed towards conveying appropriate
administrations in light of the security of gadgets inside the media transmission segment.
Subsequently they endeavor to actualize more current type of advancements inside the
segment. Numerous advancements inside the part, for example, NGN, Wi-Max are the
advances that would help for the improvement of secure systems. These sort of mechanical
advancements open more up to date approaches to the administrators of telecom for the more
current type of course of action of the risks to the security and the vulnerabilities made inside
the part.
Conclusion
A legitimate methodology get ready for the data security inside the IT based
associations could be more successful when an all-encompassing based approach would be
taken after. This technique would require the obtaining of procedures, individuals and
measurements of innovation in view of data security by guaranteeing that it would be hazard
adjusted and in light of business. This would require an appropriate arrangement and
incorporation to the settling on of key choices. This would help really taking shape of choices
and getting the correct things to be done in a request in light of need. The worry of the
security of data inside the internet is a critical concern. Executing a legitimate arrangement of
P a g e | 11
Document Page
system would be a basic achievement factor for the IT based associations with a specific end
goal to expand the capacity to deal with the dangers of data security. Focusing on the
procedures would devour time and a few type of assets. So as to be completely viable, the
pioneers for the security would need to see on including a business based esteem and
procedures for the arranging of the IT methodologies. It would likewise center around the
method for system, which could help in improving the business forms inside the associations
and in this manner helping in making progress.
P a g e | 12
Document Page
References
Adwan, O., Faris, H., Jaradat, K., Harfoushi, O. and Ghatasheh, N., 2014. Predicting customer churn
in telecom industry using multilayer preceptron neural networks: Modeling and analysis. Life Science
Journal, 11(3), pp.75-81.
Ahmad, A., Maynard, S.B. and Park, S., 2014. Information security strategies: towards an
organizational multi-strategy perspective. Journal of Intelligent Manufacturing, 25(2), pp.357-370.
Alam, M., Yang, D., Rodriguez, J. and Abd-alhameed, R., 2014. Secure device-to-device
communication in LTE-A. IEEE Communications Magazine, 52(4), pp.66-73.
Amutha, W.M. and Rajini, V., 2015. Techno-economic evaluation of various hybrid power systems for
rural telecom. Renewable and Sustainable Energy Reviews, 43, pp.553-561.
Ask, J.A., Facemire, M., Hogan, A. and Conversations, H.N.B.F., 2016. The State Of
Chatbots. Forrester. com report, 20.
Atoum, I., Otoom, A. and Abu Ali, A., 2014. A holistic cyber security implementation
framework. Information Management & Computer Security, 22(3), pp.251-264.
Ball, J., Borger, J. and Greenwald, G., 2013. Revealed: how US and UK spy agencies defeat internet
privacy and security. The Guardian, 6.
Binder Ready Version: A Strategic Approach. John Wiley & Sons.
Caldwell, T., 2013. Plugging the cyber-security skills gap. Computer Fraud & Security, 2013(7),
pp.5-10.
Cavelty, M.D. and Mauer, V., 2016. Power and security in the information age: Investigating the role
of the state in cyberspace. Routledge.
Cheminod, M., Durante, L. and Valenzano, A., 2013. Review of security issues in industrial
networks. IEEE Transactions on Industrial Informatics, 9(1), pp.277-293.
Chen, K., Hu, Y.H. and Hsieh, Y.C., 2015. Predicting customer churn from valuable B2B customers in
the logistics industry: a case study. Information Systems and e-Business Management, 13(3), pp.475-
494.
Cheng, L., Li, Y., Li, W., Holm, E. and Zhai, Q., 2013. Understanding the violation of IS security
policy in organizations: An integrated model based on social control and deterrence theory. Computers
& Security, 39, pp.447-459.
Costa-Requena, J., Santos, J.L., Guasch, V.F., Ahokas, K., Premsankar, G., Luukkainen, S., Pérez,
O.L., Itzazelaia, M.U., Ahmad, I., Liyanage, M. and Ylianttila, M., 2015, June. SDN and NFV
integration in generalized mobile network architecture. In Networks and Communications (EuCNC),
2015 European Conference on (pp. 154-158). IEEE.
Crawford, S.P., 2013. Captive audience: The telecom industry and monopoly power in the new gilded
age. Yale University Press.
Gubbi, J., Buyya, R., Marusic, S. and Palaniswami, M., 2013. Internet of Things (IoT): A vision,
architectural elements, and future directions. Future generation computer systems, 29(7), pp.1645-
1660.
Gusmeroli, S., Piccione, S. and Rotondi, D., 2013. A capability-based security approach to manage
access control in the internet of things. Mathematical and Computer Modelling, 58(5-6), pp.1189-
1205.
Han, B., Gopalakrishnan, V., Ji, L. and Lee, S., 2015. Network function virtualization: Challenges and
opportunities for innovations. IEEE Communications Magazine, 53(2), pp.90-97.
Hawilo, H., Shami, A., Mirahmadi, M. and Asal, R., 2014. NFV: state of the art, challenges, and
implementation in next generation mobile networks (vEPC). IEEE Network, 28(6), pp.18-26.
Ion, M., Zhang, J. and Schooler, E.M., 2013, August. Toward content-centric privacy in ICN:
Attribute-based encryption and routing. In Proceedings of the 3rd ACM SIGCOMM workshop on
Information-centric networking (pp. 39-40). ACM.
P a g e | 13
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Jungnickel, V., Habel, K., Parker, M., Walker, S., Bock, C., Riera, J.F., Marques, V. and Levi, D.,
2014, July. Software-defined open architecture for front-and backhaul in 5G mobile networks.
In Transparent Optical Networks (ICTON), 2014 16th International Conference on (pp. 1-4). IEEE.
Kim, D. and Solomon, M.G., 2013. Fundamentals of information systems security. Jones & Bartlett
Publishers.
Kirui, C., Hong, L., Cheruiyot, W. and Kirui, H., 2013. Predicting customer churn in mobile telephony
industry using probabilistic classifiers in data mining. IJCSI International Journal of Computer Science
Issues, 10(2), pp.1694-0814.
Kshetri, N., 2013. Privacy and security issues in cloud computing: The role of institutions and
institutional evolution. Telecommunications Policy, 37(4-5), pp.372-386.
Kumar, U. and Gambhir, S., 2014. A literature review of security threats to wireless
networks. International Journal of Future Generation Communication and Networking, 7(4), pp.25-34.
Kwofie, B., 2013. Cloud computing opportunities, risks and challenges with regard to Information
Security in the context of developing countries: A case study of Ghana.
Laudon, K.C. and Laudon, J.P., 2013. Management Information Systems 13e.
Lin, Y., Wang, Y. and Kung, L., 2015. Influences of cross-functional collaboration and knowledge
creation on technology commercialization: Evidence from high-tech industries. Industrial marketing
management, 49, pp.128-138.
Little, H.A., Adams, N.P. and Totzke, S.W., BlackBerry Ltd, 2013. System and method of security
function activation for a mobile electronic device. U.S. Patent 8,386,805.
Liu, Z., Zhang, A. and Li, S., 2013, July. Vehicle anti-theft tracking system based on Internet of
things. In Vehicular Electronics and Safety (ICVES), 2013 IEEE International Conference on (pp. 48-
52). IEEE.
Luiijf, H.A.M. and te Paske, B.J., 2015. Cyber security of industrial control systems. TNO.
Martinez, F.R. and Pulier, E., ServiceMesh Inc, 2015. System and method for a cloud computing
abstraction layer with security zone facilities. U.S. Patent 9,069,599.
Mayring, P., 2014. Qualitative content analysis: theoretical foundation, basic procedures and software
solution.
McDermott, T., Rouse, W., Goodman, S. and Loper, M., 2013. Multi-level modeling of complex
socio-technical systems. Procedia Computer Science, 16, pp.1132-1141.
McHenry, M.P., 2013. Technical and governance considerations for advanced metering
infrastructure/smart meters: Technology, security, uncertainty, costs, benefits, and risks. Energy
Policy, 59, pp.834-842.
Mobile Phone, Tablet and Mobile Broadband Plans. 2018. Retrieved from
https://www.vodafone.com.au
Pandita, R., Xiao, X., Yang, W., Enck, W. and Xie, T., 2013, August. WHYPER: Towards
Automating Risk Assessment of Mobile Applications. In USENIX Security Symposium (Vol. 2013).
Pearlson, K.E., Saunders, C.S. and Galletta, D.F., 2016. Managing and Using Information Systems,
Peltier, T.R., 2013. Information security fundamentals. CRC Press.
Petajajarvi, J., Mikhaylov, K., Roivainen, A., Hanninen, T. and Pettissalo, M., 2015, December. On
the coverage of LPWANs: range evaluation and channel attenuation model for LoRa technology.
In ITS Telecommunications (ITST), 2015 14th International Conference on (pp. 55-59). IEEE.
Rao, T.V., 2014. HRD audit: Evaluating the human resource function for business improvement.
SAGE Publications India.
Rong, K., Hu, G., Lin, Y., Shi, Y. and Guo, L., 2015. Understanding business ecosystem using a 6C
framework in Internet-of-Things-based sectors. International Journal of Production Economics, 159,
pp.41-55.
Rosenberg, D., 2018. Origins. In Israel's Technology Economy(pp. 17-36). Palgrave Macmillan,
Cham.
P a g e | 14
Document Page
Saeed, R., Lodhi, R.N., Iqbal, A., Nayyab, H.H., Mussawar, S. and Yaseen, S., 2013. Factors
influencing job satisfaction of employees in telecom sector of Pakistan. Middle-East Journal of
Scientific Research, 16(11), pp.1476-1482.
Sicari, S., Rizzardi, A., Grieco, L.A. and Coen-Porisini, A., 2015. Security, privacy and trust in
Internet of Things: The road ahead. Computer networks, 76, pp.146-164.
Slocombe, G., 2017. Defence's cyber security benefits from industry support. Asia-Pacific Defence
Reporter (2002), 43(6), p.54.
Stair, R. and Reynolds, G., 2013. Principles of information systems. Cengage Learning.
Sterbenz, J.P., Çetinkaya, E.K., Hameed, M.A., Jabbar, A., Qian, S. and Rohrer, J.P., 2013. Evaluation
of network resilience, survivability, and disruption tolerance: analysis, topology generation,
simulation, and experimentation. Telecommunication systems, 52(2), pp.705-736.
Stiff, G., Sharpe, M. and Atkinson III, L.W., Genworth Holdings Inc, 2014. System and method for
imbedding a defined benefit in a defined contribution plan. U.S. Patent 8,799,134.
Swetina, J., Lu, G., Jacobs, P., Ennesser, F. and Song, J., 2014. Toward a standardized common M2M
service layer platform: Introduction to oneM2M. IEEE Wireless Communications, 21(3), pp.20-26.
Swetina, J., Lu, G., Jacobs, P., Ennesser, F. and Song, J., 2014. Toward a standardized common M2M
service layer platform: Introduction to oneM2M. IEEE Wireless Communications, 21(3), pp.20-26.
Telstra - mobile phones, prepaid phones, broadband, internet, home phones, business phones. 2018.
Retrieved from https://www.telstra.com.au/
Turban, E., King, D., Sharda, R. and Delen, D., 2013. Business intelligence: a managerial perspective
on analytics. Prentice Hall, New York.
Van Hoboken, J.V., 2013. Privacy and security in the cloud: Some realism about technical solutions to
transnational surveillance in the Post-Snowden Era. Me. L. Rev., 66, p.487.
Vian, J.L., Mansouri, A.R. and Saad, E.W., Boeing Co, 2014. Traffic and security monitoring system
and method. U.S. Patent 8,643,719.
Von Solms, R. and Van Niekerk, J., 2013. From information security to cyber security. computers &
security, 38, pp.97-102.
Von Solms, R. and Van Niekerk, J., 2013. From information security to cyber security. computers &
security, 38, pp.97-102.
Wang, Q., McCalley, J.D., Zheng, T. and Litvinov, E., 2013. A computational strategy to solve
preventive risk-based security-constrained OPF. IEEE Transactions on Power Systems, 28(2),
pp.1666-1675.
Wilks, S. and Wright, M. eds., 2016. The promotion and regulation of industry in Japan. Springer.
Wollschlaeger, M., Sauter, T. and Jasperneite, J., 2017. The future of industrial communication:
Automation networks in the era of the internet of things and industry 4.0. IEEE Industrial Electronics
Magazine, 11(1), pp.17-27.
Yan, Y., Hu, R.Q., Das, S.K., Sharif, H. and Qian, Y., 2013. An efficient security protocol for
advanced metering infrastructure in smart grid. IEEE Network, 27(4), pp.64-71.
Zhiqun, X., Duan, C., Zhiyuan, H. and Qunying, S., 2013. Emerging of telco cloud. China
Communications, 10(6), pp.79-85.
Zhiqun, X., Duan, C., Zhiyuan, H. and Qunying, S., 2013. Emerging of telco cloud. China
Communications, 10(6), pp.79-85.
P a g e | 15
chevron_up_icon
1 out of 15
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]