Telstra Corporation Limited: Background and Digital Security Measures
Discuss About The International Journal Of Production Economics.
Cloud Computing has grown to an extent in various organization. Cloud Computing has been providing various services to the companies. Cloud Computing have helped in providing flexible services in the companies. The accessibility factor of the cloud computing has been creating a lot of opportunities for the companies in the market. The security of the data and information has been a major issue for the company. Therefore, interview has been conducted for gathering responses of the executives form both company related to the cloud computing. The use of the cloud computing in the companies have been discussed in the report.
Telstra Corporation Limited, or usually named as Telstra, is a main media transmission association in Australia. Telstra had first started in a joint effort with Australia Post as the Post Master General’s Department. It used to control the media transmission administrations of whole Australia through the Post Master General’s Department. With a few deteriorations later, it at long last began to function as an individual association after the split in 1992. It was privatized in three unique stages casually alluded to as T1, T2 and T3. Since, the whole association manages the media transmission administrations of the whole Australia, it manages one of the major discrete and individual information of its clients. In the year 2011, Telstra had declared that the association would advance in executing another procedure with the dispatch of Telstra Digital, drove by Gerd Schenkel of National Australia Bank.
The underlying motivation behind this dispatch was for enhancing the utilization of computerized channels for client administrations. In any case, changes in a media communications based association in Australia ought to keep up moral direct according to Australian law proposes. Along these lines, it is fundamental that Telstra has cutting edge digital safety efforts to ensure the basic and discrete information of their clients from being hacked or abused by pernicious programmers. In Australia itself, the whole association of Telstra had executed divisions in the hierarchical structure, basically committed to the digital security group. The group divisions secure propose an arranged structure through which the security group is actualized. The security framework is then organized in rates, making it dependable to address every one of these divisions as indicated by their needs. Out of the whole workforce in the digital security group, 38 percent need is committed to review the security framework. 36 percent of the organized errand stays devoted to chance evaluations of the whole framework.
Vodafone Australia
The Head office is situated in Melbourne Australia. It is one of the tallest structures in Australia and is situated in 242 Exhibition road. The landing page URL of the association is https://www.telstra.com.au/. The individual who is met for this specific task is Stephen Eloph, the Technology and development official of the organization (Telstra – cell phones, prepaid telephones, broadband, web, home telephones, business telephones 2018). He is as of now situated in Sydney and is in charge of keeping up the digital security issues of the organization.
Vodafone Australia is a media transmission association working on Australia which gives settled and portable broadband administrations. The system covers in excess of 21 million Australians and its broadband administrations and extends its administrations in territorial focuses and capital urban areas. The association was made as a joint wander between Hutchison Telecommunications and Vodafone Group Plc. The organization has strong digital security specialists and have improved their group capacities after the vulnerabilities distinguished by Specter and Meltdown.
The organization has legitimate 4G arrange benefits and keeps up the IT frameworks proficiently. It has more than 120 Retail stores all around Australia and has its primary headquarter at Sydney, 177 Pacific Hwy. The landing page URL of the organization is https://www.vodafone.com.au.
The individual who is met for this specific task is the central innovation officer of the organization to be specific Kevin Millroy. Kevin Milroy was delegated as the main innovation officer by Vodafone in July. He was in charge of dealing with the IT branch of the organization. He was the general administrator of the organization and was in charge of extending the IT anticipates and revealing the system overhaul. He was associated with the Mobile dark spot program as well. As the leader of the IT division his activity is to grow the current VHS organize and conveying the required broadband inside the following year (Mobile Phone, Tablet and Mobile Broadband Plans 2018).
The utilization of an appropriate arrangement for the security of the data is especially basic for an organization (Peltier 2013). The best possible utilization of the arrangement for the frameworks of data based security would be to a great degree accommodating with a specific end goal to help in shielding the association from instances of online robbery (Liu, Zhang and Li 2013). The instances of online robbery are for the most part regular among IT based associations and organizations. This is because of the way that these segment contain a gigantic measure of essential information of their workers and in addition the shoppers. The essential focal point of the IT businesses is to secure their frameworks and hence help in keeping the important data from being getting stolen (Lin, Wang and Kung 2015).
IS Planning
With a specific end goal to secure the IT based frameworks, it is to a great degree fundamental for the organizations to secure the frameworks to ensure their data (Martinez and Pulier 2015). An appropriate arrangement for the security of data should be set up by the organization keeping in mind the end goal to ensure the indispensable data of the customers. An Information Security Strategic Plan would be useful in situating an association keeping in mind the end goal to decrease, exchange, acknowledge and stay away from the danger of data frameworks that are identified with innovations, procedures and individuals (Stiff, Sharpe and Atkinson 2014). A legitimate built up procedure is additionally useful for the association keeping in mind the end goal to ensure the trustworthiness, classification and accessibility of significant data (Vian et al. 2014).
The advantages with the end goal of the business in light of a compelling security system design is generally huge and has the capacity to offer an upper hand (Wang et al. 2013). These might incorporate the reason for following the measures inside the business, keep away from an occurrence implied for harming the security, supporting the business notoriety and in this manner helps in supporting responsibility with the accomplices, clients, providers and investors (Rong et al. 2015).
The essential point of the vital arrangement for the security is to give an administration the fundamental data keeping in mind the end goal to settle on educated choices about the speculation made inside the security. The arrangement for the procedure for the data based security is connected with the capacity of security with the course of the business (Rao 2014).
The procedure should show an instance of the business, which would depict the principle advantages of the business and the results, which are in connection with the security. The arrangement additionally gives prescribed procedures with a specific end goal to accomplish the results.
The procedures implied with the end goal of security would help in accomplishing the targets of the business to identify and tending to the necessities for the IT based framework inside an association. The arrangement additionally gives business based capacities and a few sort of activities, arrangement for IT based framework, procedures and individuals that would have the capacity to meet the fundamental prerequisites of security (Little et al. 2013)..
The IT based associations or organizations need to execute an arrangement with a specific end goal to guarantee the security of the benefits of the association. This arrangement is characterized by the security experts inside the specific business. A legitimately based IT security issue would be useful in giving a system so as to stay with the at a proposed level of security. This could be accomplished by getting to the measure of dangers, choosing the procedures so as to relieve them and an appropriate arrangement to refresh the projects and the acts of security (Gusmeroli, Piccione and Rotondi 2013).
IS Planning Literature Analysis
Neil Campbell, the chief of worldwide security arrangements of Telstra has given a scope in view of the security arrangements of the association. His considerations were that the physical based security had begun as a simple and mechanical reality where the locks implied for checking was a physical based errand. In the 21st century, the security in view of the IT space is a noteworthy concern. A focal station for the checking could be utilized for a blend of video and electric based entryway intended to access with a specific end goal to keep a sharp sight on the availability and control over the IT frameworks. Amid the meeting, he expressed:
“The essential test inside the business is to meet the innovation inside the business. The clients ought to have an alternate arrangement of capacities that would be never found inside a similar association (Slocombe 2017).”
Neil additionally trusts that the two distinct universes ought to have crashed as on the grounds that the innovation is making simple to play out the things midway.
“A legitimately reasonable administration for the security is implied keeping in mind the end goal to guarantee that the client ought to have the suitable mix of the dynamic and detached controls inside the systems and the client ought to have the capacity to screen over them.”
“In the event that information is shared from the frameworks of electronic security and the frameworks of digital security, at that point it ought to be done in a secured mold.”
Interviews in view of the security authority of Vodafone arrived at a conclusion that the general information protection inside the frameworks is on the ascent and it is very basic so as to secure the frameworks. The attention on the security of the frameworks have expanded to a larger amount.
They said that the digital insight that fundamentally monitors the digital assaults that would occur outside. They would endeavor to uncover the data and after that attempt to recognize the parts of innovation and the usual way of doing things of the assaults.
The most serious issue for the associations is to recognize the information, which is should have been ensured. The organization is utilizing encryption as far as the control of access, checking of the entrance to the benefit, change as the arrangements of information, the correct type of the administration apparatuses of information. All these sort of innovations, which have been utilized to the innovation front of the scene so as to ensure and secure the information.
The security masters inside the organization have significantly tested the procedures keeping in mind the end goal to have a negligible based presentation for the information of the clients (Kwofie 2013).
The range of abilities is valid for every one of the enterprises. In each industry, there are different items from the diverse accomplices. Every one of the types of gear identified with the security identified with the IT area should have been set up and should have been worked at the coveted level. The optional factor is the separation factor of the experience of the clients. The organization is additionally capable in separating the client encounter.
The organization is centered around what’s to come. The security pros have said that they are constantly prepared to encounter more up to date type of innovations. This would imply that that would keep a check whether they would go to end of life items and inheritance frameworks.
Vodafone is additionally committed towards awareness with respect to the variables of cost and adequacy of the cost. They likewise guarantee the partners in wording for the consistence and the different dangers identified with the protection.
They would mean the appropriation of cloud based stage to be put by the telcos. The selection of cloud based stage isn’t a simple factor as a result of the necessities identified with administrative. Telcos need everything close by because of the administrative prerequisites and remote access, review and upkeep and activity based affirmation. This would essentially make a level of limitation in light of the appropriation of the cloud stage. This would thus limit the telcos from winding up considerably more adaptable and supple. There would be expected to roll out improvements as far as controls.
In light of the exchange in view of the two telecom based administrators, it could be presumed that both of these media transmission organizations have made a few ramifications in view of its divisions. They have been ensnaring advancements in view of the machine learning innovation and AI based advances. The normal innovation utilized by both the administrators are chatbots, which are being utilized on a worldwide premise (Ask et al. 2016). The second innovation, which is being utilized is intellectual processing. All the media transmission administrators have understood that the essential administration is information and voice. They can’t generally depend on the bearer for the customers. They should begin on the production of the substance. Significantly more sort of innovations are being embraced by both of these administrators. The SON based innovation is being utilized by Vodafone. This innovation is being utilized quickly. This innovation has the essential ability to advance the procedure of conveyance (Swetina et al. 2014). The optional factor is the client based understanding. There are a few undertakings around the experience of the clients and the new pattern is to set new type of IT based security answers for the telecom administrators. A significant number of these activities are for the most part utilized for the advanced space. There are numerous dangers identified with the IT based divisions inside the new advancements. This has prompted the reception of more current type of innovations inside the segments (Alam et al. 2014).
Topic 1: Customer Privacy as a competitive advantage
The telecom area is developing at an amazing pace in everywhere throughout the world. The utilization of media transmission has been vital part of our every day life. Media transmission ventures are drawing in various number of clients through building up an appropriate bond with their brands. There are a few key direct, needs toward be consider to proceed with the heritage (Van Hoboken 2013). Vodafone and Telstra are the main telecom businesses in all finished Australia. One of the reason of their fame is they esteem their client protection. Be that as it may, they take after various ways to deal with ensure client private points of interest, for example, Visa data, address and that’s only the tip of the iceberg.
Vodafone: According to the organization’s partners, they are vigorously centered around the client security. As indicated by them, for giving viable administrations to client they gather some indispensable data from the clients (Ball, Borge and Greenwald 2013). In any case, this points of interest are overseen in a specific pattern. They entirely takes after the law requirement divulgence report so as to secure the client protection. They likewise every now and again reacts to the administration requests keeping in mind the end goal to get to the client data. It is additionally evident that, Vodafone does not utilize the “satisfactory level” of security set up to ensure the protection data (Van Hoboken 2013). There are some security break revealed against the Vodafone. As per the Timothy Pilgrim, Vodafone had been in rupture of its commitments under the Privacy Act. Be that as it may, he didn’t force any punishment as the Privacy Act does not enable him to do as such.
Telstra: Telstra is the main media transmission businesses all through the Australia. They gather diverse client private points of interest relies upon the administrations wanted by them. For the most part they assembles credit and charging data keeping in mind the end goal to direct money related association with the client. They additionally needs the gadget – particular data as working framework, equipment demonstrate, one of a kind gadget identifiers, gadget status, arrangement and programming and portable system data. They additionally assemble data about the item uses and area administrations (Ball, Borge and Greenwald 2013). The delicate data incorporates, individual’s race, ethnic root, political assessments, wellbeing, religious or philosophical convictions and criminal history. As indicated by some interior sources, this points of interest are utilized for some reasons organization, correspondence, change, advancement and direct promoting (Van Hoboken 2013). They additionally take after the information security law entirely. All partners prerequisites should be fulfilled by striking a harmony between their need to gather/share client individual data and need to secure client individual data.
Analyze: Vodafone and Telstra are both driving industry that give compelling and redid telecom administrations to their clients. Both organization accumulate comparable sort of information from their client, for example, charging points of interest, gadget subtle elements and area. In any case, they the two uses diverse ways to deal with guarantee client protection (Ball, Borge and Greenwald 2013). The key contrast between those methodologies is usage of the “satisfactory level”. Vodafone does not utilize the sufficient level that makes them defenseless against outsiders. They additionally faces this comparable issues previously. Telstra guarantees that the client data are right and up and coming. They additionally stores this information in advanced and electric from in a storerooms that worked and claimed by the organization for singular utilizations (Van Hoboken 2013). This storerooms are likewise ensured by joined numerous specialized arrangement, security controls and inner procedures to shield information and system from unapproved access and exposure.
Topic 2: Challenges in implementing secured third party environment
The spotlights on the outsourcing model is additionally expanding with a specific end goal to keep up the security system among outsiders. This outsourcing model partners with a few outsiders which fundamentally challenges numerous administrator’s data security pose. The achievement of guaranteeing data completely relies upon the capacity of an association to viably stretch out their security structure to its outsiders (Ball, Borge and Greenwald 2013). Overseeing data security is delivering numerous deterrents in numerous key territories. Foundation supplier, framework integrator, programming seller, retailers and merchants, VAS supplier, charge printing organization. The purpose for the difficulties is the restricted control over the outsider condition. The development of outsiders and hazard partners with outsourcing including security controls as a major aspect of the agreement has turned into a standard (Van Hoboken 2013). Be that as it may, guaranteeing adherence to the controls and building up the responsibility for the same winds up testing in the present condition.
Vodafone: Vodafone outsourced numerous a portion of its tasks to different outsiders. The enormous measure of outsiders are additionally kept up by them successfully keeping in mind the end goal to pick up the most out of them (Van Hoboken 2013). As indicated by some insider, this outsiders resemble expanded arms of the administrators which are important to work. The way toward contracting and distinguishing proof of this outsiders are checked by the inside officials. This administrators are in charge of to brought together and mange those outsiders. They additionally habitually collaborate with them and recognizable them about the everyday tasks (Ball, Borge and Greenwald 2013). Consequently, it is basic that each capacity comprehends the significance of security and soaks up it in its association with their outsiders. Vodafone entirely takes after a few intends to accomplish data security at outsiders. This means are rely on the development and many-sided quality of the outsider condition, benefit gave and relationship outsiders.
Telstra: Telstra to some degree comparative way to deal with deal with the outsider data security. Telstra embrace some compelling ways to deal with guarantee the data security partners with the outsiders (Van Hoboken 2013). The means which are taken after can be show as security criteria for outsider determination, data security part of agreement, intermittent hazard appraisal, committed security SPDC from outsider, outsider faculty training program, security prerequisites part of SLAs and occasional security adherence report from outsider.
Vodafone and Telstra take after comparable ways to deal with keep up the outsider data security. They both receive some viable ways to deal with guarantee the data security partners with the outsiders (Ball, Borge and Greenwald 2013). The means which are taken after can be show as security criteria for outsider choice, data security part of agreement, intermittent hazard appraisal, devoted security SPDC from outsider, outsider work force instruction program, security necessities part of SLAs and occasional security adherence report from third party(Van Hoboken 2013). This means are rely on the development and intricacy of the outsider condition, benefit furnished and association with outsiders.
Topic 3: Challenge to maintain internal organizational security
As the telecom ventures are advancing the regions of inward associations dangers are likewise expanding quickly. The principle purposes for the situation is representative earnestness toward data security, absence of consistency of controls and tremendous land spread (Ball, Borge and Greenwald 2013). The foundation of the viable data security association structure has been basic for both IT and system work (Van Hoboken 2013). The best possible usage of the inward association security will bring about numerous key zones, for example, developing business tasks, Inorganic business development, and topographical spread of data. Expanding clients of data resources. Lacking worker mindfulness and deficient administration duty.
Vodafone: In most recent few years, they tend to concentrate more on administrative prerequisites and outside hazard factors. Notwithstanding, the tremendous spread of administrations and tasks, representative qualities, association of outsiders should be edify to accomplish more business edges (Van Hoboken 2013). As the associations develop, their security pose additionally develops to the degree that inside data security turns into a fundamental cleanliness for doing business tasks. Vodafone should be more centered around their interior security (Ball, Borge and Greenwald 2013). The correct execution of the inward association security will bring about numerous key territories, for example, developing business tasks, Inorganic business development, and land spread of data. Expanding clients of data resources. Lacking representative mindfulness and deficient administration duty.
Telstra: Telstra has fruitful actualized their inward hierarchical security diagrams. While interior data security can be implemented by building up innovation controls and performing intermittent reviews, the accomplishment of such activities would to a great extent rely on the acknowledgment level of the workers (Van Hoboken 2013). Telecom administrators need to take a gander at setting up a culture where data security turns out to be a piece of the DNA of the associations and along these lines their representatives. The best possible execution of the inward association security will bring about numerous key territories, for example, developing business tasks, Inorganic business development, and land spread of data. Expanding clients of data resources (Ball, Borge and Greenwald 2013). Lacking representative mindfulness and insufficient administration responsibility. Data Security centers around IT and does exclude center telecom arrange. There is a requirement for an all encompassing Information Security Organization Structure that coordinates security in IT and center telecom arrange. Further, the viability of Information Security can be guaranteed by including business works in security activities.
Compare: Vodafone and Telstra are both driving industry that give compelling and altered telecom administrations to their clients. Both organization assemble comparable kind of information from their client, for example, charging subtle elements, gadget points of interest and area. The best possible usage of the inner association security will bring about numerous key territories, for example, developing business tasks, Inorganic business development, and land spread of data (Van Hoboken 2013). Expanding clients of data resources. Lacking representative mindfulness and deficient administration responsibility. Vodafone and Telstra both took after comparable methodologies with a specific end goal to accomplish liner results.
Topic 4: Factors contributing in adoption of New Technology & Services
When all is said in done, the majority of the telecom businesses are receiving best practices to guarantee that they are set up against conceivable dangers (Ball, Borge and Greenwald 2013). The requirement for feasible, productive, financially savvy and valuable course for business which is the driver for progression and ascent of new headways and organizations. The presence of developments, for instance, 3G, New Generation Networks (NGN), Wi-Max and use of organizations, for instance, M-Commerce, Cloud figuring organizations et cetera will benefit everyone by supporting the increase of information, engaging occupants to get to fundamental correspondence benefits and propelling the change of advancement movements (Van Hoboken 2013). These mechanical degrees of progress open telecom heads to new course of action of security risks and vulnerabilities.
Vodafone: Vodafone uses numerous methodologies conquer future dangers. Any security hazard could happened whenever. Vodafone hones chance administration to keep away from the conceivable dangers. The usage of such new innovations are additionally fundamental. They helped business to become further and set up mark esteems. As indicated by the organization’s partners, they are intensely centred around usage of new advancements. As indicated by them, the usage of the new innovation can help the association to accomplish their objectives while keep up the security concerns. Organizations, for instance, m-Commerce, enables customers to perform business trade and what’s more official correspondence wherever they go (Van Hoboken 2013). These mechanical movements speak to a test to general information security scene with in the telecom executive.
Telstra: The Company has a few practices with a specific end goal to confront the dangers of future in view of the security of the gadgets. The organization additionally hones the administration of dangers to maintain a strategic distance from the conceivable dangers without bounds. As indicated by the partners of the organization, they are intensely decided on the correct usage of the up and coming advancements. They can actualize the fresher type of innovation, which could help the association to achieve the objectives while keeping up the essential worries of security. The essential organizations, for example, m-Commerce would help in enabling the customers with a specific end goal to play out the trading of business and notwithstanding the official correspondence. These mechanical based movements would speak to a general information for the security of information inside the executive of telecom.
Compare: Telstra and Vodafone are committed towards conveying appropriate administrations in light of the security of gadgets inside the media transmission segment. Subsequently they endeavor to actualize more current type of advancements inside the segment. Numerous advancements inside the part, for example, NGN, Wi-Max are the advances that would help for the improvement of secure systems. These sort of mechanical advancements open more up to date approaches to the administrators of telecom for the more current type of course of action of the risks to the security and the vulnerabilities made inside the part.
Conclusion
A legitimate methodology get ready for the data security inside the IT based associations could be more successful when an all-encompassing based approach would be taken after. This technique would require the obtaining of procedures, individuals and measurements of innovation in view of data security by guaranteeing that it would be hazard adjusted and in light of business. This would require an appropriate arrangement and incorporation to the settling on of key choices. This would help really taking shape of choices and getting the correct things to be done in a request in light of need. The worry of the security of data inside the internet is a critical concern. Executing a legitimate arrangement of system would be a basic achievement factor for the IT based associations with a specific end goal to expand the capacity to deal with the dangers of data security. Focusing on the procedures would devour time and a few type of assets. So as to be completely viable, the pioneers for the security would need to see on including a business based esteem and procedures for the arranging of the IT methodologies. It would likewise center around the method for system, which could help in improving the business forms inside the associations and in this manner helping in making progress.
References
Adwan, O., Faris, H., Jaradat, K., Harfoushi, O. and Ghatasheh, N., 2014. Predicting customer churn in telecom industry using multilayer preceptron neural networks: Modeling and analysis. Life Science Journal, 11(3), pp.75-81.
Ahmad, A., Maynard, S.B. and Park, S., 2014. Information security strategies: towards an organizational multi-strategy perspective. Journal of Intelligent Manufacturing, 25(2), pp.357-370.
Alam, M., Yang, D., Rodriguez, J. and Abd-alhameed, R., 2014. Secure device-to-device communication in LTE-A. IEEE Communications Magazine, 52(4), pp.66-73.
Amutha, W.M. and Rajini, V., 2015. Techno-economic evaluation of various hybrid power systems for rural telecom. Renewable and Sustainable Energy Reviews, 43, pp.553-561.
Ask, J.A., Facemire, M., Hogan, A. and Conversations, H.N.B.F., 2016. The State Of Chatbots. Forrester. com report, 20.
Atoum, I., Otoom, A. and Abu Ali, A., 2014. A holistic cyber security implementation framework. Information Management & Computer Security, 22(3), pp.251-264.
Ball, J., Borger, J. and Greenwald, G., 2013. Revealed: how US and UK spy agencies defeat internet privacy and security. The Guardian, 6.
Binder Ready Version: A Strategic Approach. John Wiley & Sons.
Caldwell, T., 2013. Plugging the cyber-security skills gap. Computer Fraud & Security, 2013(7), pp.5-10.
Cavelty, M.D. and Mauer, V., 2016. Power and security in the information age: Investigating the role of the state in cyberspace. Routledge.
Cheminod, M., Durante, L. and Valenzano, A., 2013. Review of security issues in industrial networks. IEEE Transactions on Industrial Informatics, 9(1), pp.277-293.
Chen, K., Hu, Y.H. and Hsieh, Y.C., 2015. Predicting customer churn from valuable B2B customers in the logistics industry: a case study. Information Systems and e-Business Management, 13(3), pp.475-494.
Cheng, L., Li, Y., Li, W., Holm, E. and Zhai, Q., 2013. Understanding the violation of IS security policy in organizations: An integrated model based on social control and deterrence theory. Computers & Security, 39, pp.447-459.
Costa-Requena, J., Santos, J.L., Guasch, V.F., Ahokas, K., Premsankar, G., Luukkainen, S., Pérez, O.L., Itzazelaia, M.U., Ahmad, I., Liyanage, M. and Ylianttila, M., 2015, June. SDN and NFV integration in generalized mobile network architecture. In Networks and Communications (EuCNC), 2015 European Conference on (pp. 154-158). IEEE.
Crawford, S.P., 2013. Captive audience: The telecom industry and monopoly power in the new gilded age. Yale University Press.
Gubbi, J., Buyya, R., Marusic, S. and Palaniswami, M., 2013. Internet of Things (IoT): A vision, architectural elements, and future directions. Future generation computer systems, 29(7), pp.1645-1660.
Gusmeroli, S., Piccione, S. and Rotondi, D., 2013. A capability-based security approach to manage access control in the internet of things. Mathematical and Computer Modelling, 58(5-6), pp.1189-1205.
Han, B., Gopalakrishnan, V., Ji, L. and Lee, S., 2015. Network function virtualization: Challenges and opportunities for innovations. IEEE Communications Magazine, 53(2), pp.90-97.
Hawilo, H., Shami, A., Mirahmadi, M. and Asal, R., 2014. NFV: state of the art, challenges, and implementation in next generation mobile networks (vEPC). IEEE Network, 28(6), pp.18-26.
Ion, M., Zhang, J. and Schooler, E.M., 2013, August. Toward content-centric privacy in ICN: Attribute-based encryption and routing. In Proceedings of the 3rd ACM SIGCOMM workshop on Information-centric networking (pp. 39-40). ACM.
Jungnickel, V., Habel, K., Parker, M., Walker, S., Bock, C., Riera, J.F., Marques, V. and Levi, D., 2014, July. Software-defined open architecture for front-and backhaul in 5G mobile networks. In Transparent Optical Networks (ICTON), 2014 16th International Conference on (pp. 1-4). IEEE.
Kim, D. and Solomon, M.G., 2013. Fundamentals of information systems security. Jones & Bartlett Publishers.
Kirui, C., Hong, L., Cheruiyot, W. and Kirui, H., 2013. Predicting customer churn in mobile telephony industry using probabilistic classifiers in data mining. IJCSI International Journal of Computer Science Issues, 10(2), pp.1694-0814.
Kshetri, N., 2013. Privacy and security issues in cloud computing: The role of institutions and institutional evolution. Telecommunications Policy, 37(4-5), pp.372-386.
Kumar, U. and Gambhir, S., 2014. A literature review of security threats to wireless networks. International Journal of Future Generation Communication and Networking, 7(4), pp.25-34.
Kwofie, B., 2013. Cloud computing opportunities, risks and challenges with regard to Information Security in the context of developing countries: A case study of Ghana.
Laudon, K.C. and Laudon, J.P., 2013. Management Information Systems 13e.
Lin, Y., Wang, Y. and Kung, L., 2015. Influences of cross-functional collaboration and knowledge creation on technology commercialization: Evidence from high-tech industries. Industrial marketing management, 49, pp.128-138.
Little, H.A., Adams, N.P. and Totzke, S.W., BlackBerry Ltd, 2013. System and method of security function activation for a mobile electronic device. U.S. Patent 8,386,805.
Liu, Z., Zhang, A. and Li, S., 2013, July. Vehicle anti-theft tracking system based on Internet of things. In Vehicular Electronics and Safety (ICVES), 2013 IEEE International Conference on (pp. 48-52). IEEE.
Luiijf, H.A.M. and te Paske, B.J., 2015. Cyber security of industrial control systems. TNO.
Martinez, F.R. and Pulier, E., ServiceMesh Inc, 2015. System and method for a cloud computing abstraction layer with security zone facilities. U.S. Patent 9,069,599.
Mayring, P., 2014. Qualitative content analysis: theoretical foundation, basic procedures and software solution.
McDermott, T., Rouse, W., Goodman, S. and Loper, M., 2013. Multi-level modeling of complex socio-technical systems. Procedia Computer Science, 16, pp.1132-1141.
McHenry, M.P., 2013. Technical and governance considerations for advanced metering infrastructure/smart meters: Technology, security, uncertainty, costs, benefits, and risks. Energy Policy, 59, pp.834-842.
Mobile Phone, Tablet and Mobile Broadband Plans. 2018. Retrieved from https://www.vodafone.com.au
Pandita, R., Xiao, X., Yang, W., Enck, W. and Xie, T., 2013, August. WHYPER: Towards Automating Risk Assessment of Mobile Applications. In USENIX Security Symposium (Vol. 2013).
Pearlson, K.E., Saunders, C.S. and Galletta, D.F., 2016. Managing and Using Information Systems,
Peltier, T.R., 2013. Information security fundamentals. CRC Press.
Petajajarvi, J., Mikhaylov, K., Roivainen, A., Hanninen, T. and Pettissalo, M., 2015, December. On the coverage of LPWANs: range evaluation and channel attenuation model for LoRa technology. In ITS Telecommunications (ITST), 2015 14th International Conference on (pp. 55-59). IEEE.
Rao, T.V., 2014. HRD audit: Evaluating the human resource function for business improvement. SAGE Publications India.
Rong, K., Hu, G., Lin, Y., Shi, Y. and Guo, L., 2015. Understanding business ecosystem using a 6C framework in Internet-of-Things-based sectors. International Journal of Production Economics, 159, pp.41-55.
Rosenberg, D., 2018. Origins. In Israel’s Technology Economy(pp. 17-36). Palgrave Macmillan, Cham.
Saeed, R., Lodhi, R.N., Iqbal, A., Nayyab, H.H., Mussawar, S. and Yaseen, S., 2013. Factors influencing job satisfaction of employees in telecom sector of Pakistan. Middle-East Journal of Scientific Research, 16(11), pp.1476-1482.
Sicari, S., Rizzardi, A., Grieco, L.A. and Coen-Porisini, A., 2015. Security, privacy and trust in Internet of Things: The road ahead. Computer networks, 76, pp.146-164.
Slocombe, G., 2017. Defence’s cyber security benefits from industry support. Asia-Pacific Defence Reporter (2002), 43(6), p.54.
Stair, R. and Reynolds, G., 2013. Principles of information systems. Cengage Learning.
Sterbenz, J.P., Çetinkaya, E.K., Hameed, M.A., Jabbar, A., Qian, S. and Rohrer, J.P., 2013. Evaluation of network resilience, survivability, and disruption tolerance: analysis, topology generation, simulation, and experimentation. Telecommunication systems, 52(2), pp.705-736.
Stiff, G., Sharpe, M. and Atkinson III, L.W., Genworth Holdings Inc, 2014. System and method for imbedding a defined benefit in a defined contribution plan. U.S. Patent 8,799,134.
Swetina, J., Lu, G., Jacobs, P., Ennesser, F. and Song, J., 2014. Toward a standardized common M2M service layer platform: Introduction to oneM2M. IEEE Wireless Communications, 21(3), pp.20-26.
Swetina, J., Lu, G., Jacobs, P., Ennesser, F. and Song, J., 2014. Toward a standardized common M2M service layer platform: Introduction to oneM2M. IEEE Wireless Communications, 21(3), pp.20-26.
Telstra – mobile phones, prepaid phones, broadband, internet, home phones, business phones. 2018. Retrieved from https://www.telstra.com.au/
Turban, E., King, D., Sharda, R. and Delen, D., 2013. Business intelligence: a managerial perspective on analytics. Prentice Hall, New York.
Van Hoboken, J.V., 2013. Privacy and security in the cloud: Some realism about technical solutions to transnational surveillance in the Post-Snowden Era. Me. L. Rev., 66, p.487.
Vian, J.L., Mansouri, A.R. and Saad, E.W., Boeing Co, 2014. Traffic and security monitoring system and method. U.S. Patent 8,643,719.
Von Solms, R. and Van Niekerk, J., 2013. From information security to cyber security. computers & security, 38, pp.97-102.
Von Solms, R. and Van Niekerk, J., 2013. From information security to cyber security. computers & security, 38, pp.97-102.
Wang, Q., McCalley, J.D., Zheng, T. and Litvinov, E., 2013. A computational strategy to solve preventive risk-based security-constrained OPF. IEEE Transactions on Power Systems, 28(2), pp.1666-1675.
Wilks, S. and Wright, M. eds., 2016. The promotion and regulation of industry in Japan. Springer.
Wollschlaeger, M., Sauter, T. and Jasperneite, J., 2017. The future of industrial communication: Automation networks in the era of the internet of things and industry 4.0. IEEE Industrial Electronics Magazine, 11(1), pp.17-27.
Yan, Y., Hu, R.Q., Das, S.K., Sharif, H. and Qian, Y., 2013. An efficient security protocol for advanced metering infrastructure in smart grid. IEEE Network, 27(4), pp.64-71.
Zhiqun, X., Duan, C., Zhiyuan, H. and Qunying, S., 2013. Emerging of telco cloud. China Communications, 10(6), pp.79-85.
Zhiqun, X., Duan, C., Zhiyuan, H. and Qunying, S., 2013. Emerging of telco cloud. China Communications, 10(6), pp.79-85.