{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:21:36Z","timestamp":1750220496042,"version":"3.41.0"},"publisher-location":"Cham","reference-count":22,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319569246"},{"type":"electronic","value":"9783319569253"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-56925-3_26","type":"book-chapter","created":{"date-parts":[[2017,4,5]],"date-time":"2017-04-05T12:33:44Z","timestamp":1491395624000},"page":"323-336","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Fraud Risk Modelling: Requirements Elicitation in the Case of Telecom Services"],"prefix":"10.1007","author":[{"given":"Ahmed Seid","family":"Yesuf","sequence":"first","affiliation":[]},{"given":"Lars","family":"Wolos","sequence":"additional","affiliation":[]},{"given":"Kai","family":"Rannenberg","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,4,6]]},"reference":[{"key":"26_CR1","unstructured":"CFCA: Global Telecom fraud report. Technical report, Communications Fraud Control Association (2015)"},{"key":"26_CR2","unstructured":"Yesuf, A.S.: A review of risk identification approaches in the telecommunication domain. In: Third International Conference on Information Systems Security and Privacy (ICISSP) (2017)"},{"key":"26_CR3","doi-asserted-by":"publisher","first-page":"337","DOI":"10.1016\/j.eswa.2005.09.028","volume":"31","author":"H Farvaresh","year":"2006","unstructured":"Farvaresh, H., Sepehri, M.M.: Subscription fraud prevention in telecommunications using fuzzy rules and neural networks. Expert Syst. Appl. 31, 337\u2013344 (2006). Elsevier","journal-title":"Expert Syst. Appl."},{"key":"26_CR4","doi-asserted-by":"publisher","first-page":"182","DOI":"10.1016\/j.engappai.2010.05.009","volume":"24","author":"PA Est\u00e9vez","year":"2011","unstructured":"Est\u00e9vez, P.A., Held, C.M., Perez, C.A.: A data mining framework for detecting subscription fraud in telecommunication. Eng. Appl. Artif. Intell. 24, 182\u2013194 (2011). Elsevier","journal-title":"Eng. Appl. Artif. Intell."},{"key":"26_CR5","unstructured":"ISO\/IEC: ISO\/IEC 27005:2011: Information Technology \u2013 Security Techniques \u2013 Information Security Risk Management (2011)"},{"key":"26_CR6","unstructured":"TM Forum: Enhanced Telecom Operations Map (eTOM) The Business Process Framework (2015)"},{"key":"26_CR7","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1109\/MWC.2009.5361183","volume":"16","author":"G Macia-Fernandez","year":"2009","unstructured":"Macia-Fernandez, G., Garcia-Teodoro, P., Diaz-Verdejo, J.: Fraud in roaming scenarios: an overview. IEEE Wirel. Commun. 16, 88\u201394 (2009). IEEE","journal-title":"IEEE Wirel. Commun."},{"key":"26_CR8","unstructured":"Yufeng, K.Y., Chang-Tien, C.T., Sirwongwattana, S., Yo-Ping, H.Y.: Survey of fraud detection techniques. In: IEEE International Conference on Networking, Sensing and Control. IEEE (2004)"},{"key":"26_CR9","doi-asserted-by":"publisher","first-page":"915","DOI":"10.1006\/jpdc.2000.1720","volume":"61","author":"P Burge","year":"2001","unstructured":"Burge, P., Shawe-Taylor, J.: An unsupervised neural network approach to profiling the behavior of mobile phone users for use in fraud detection. J. Parallel Distrib. Comput. 61, 915\u2013925 (2001). Elsevier","journal-title":"J. Parallel Distrib. Comput."},{"key":"26_CR10","unstructured":"TIR Corporation: The 2015 telecommunications industry review: an anthology of market facts and forecasts. Technical report, The Insight Research Corporation (2015)"},{"key":"26_CR11","unstructured":"Cortes\u00e3o, L., Martins, F., Rosa, A., Carvalho, P.: Fraud management systems in telecommunications: a practical approach. In: Proceeding of ICT (2005)"},{"key":"26_CR12","doi-asserted-by":"publisher","first-page":"721","DOI":"10.1016\/j.knosys.2008.03.026","volume":"21","author":"CS Hilas","year":"2008","unstructured":"Hilas, C.S., Mastorocostas, P.A.: An application of supervised and unsupervised learning approaches to telecommunications fraud detection. Knowl. Based Syst. 21, 721\u2013726 (2008). Elsevier","journal-title":"Knowl. Based Syst."},{"key":"26_CR13","doi-asserted-by":"crossref","unstructured":"J\u00fcrjens, J., Schreck, J., Bartmann, P.: Model-based security analysis for mobile communications. In: Proceedings of the 30th International Conference on Software Engineering, pp. 683\u2013692. ACM (2008)","DOI":"10.1145\/1368088.1368186"},{"key":"26_CR14","unstructured":"Gosset, P., Mark, H.: Classification, detection and prosecution of fraud in mobile networks. In: Proceedings of ACTS Mobile Summit, Sorrento, Italy (1999)"},{"key":"26_CR15","unstructured":"The Smartvox Knowledgebase. http:\/\/kb.smartvox.co.uk\/asterisk\/secure-asterisk-pbx-part-1\/. Accessed Dec 2016"},{"key":"26_CR16","doi-asserted-by":"crossref","unstructured":"Kuhn, D.R.: PBX Vulnerability Analysis: Finding Holes in Your PBX Before Someone Else Does. US Department of Commerce, Technology Administration, National Institute of Standards and Technology (2001)","DOI":"10.6028\/NIST.SP.800-24"},{"issue":"3","key":"26_CR17","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1016\/S1361-3723(13)70027-7","volume":"2013","author":"M Yelland","year":"2013","unstructured":"Yelland, M.: Fraud in mobile networks. Comput. Fraud Secur. 2013(3), 5\u20139 (2013)","journal-title":"Comput. Fraud Secur."},{"key":"26_CR18","doi-asserted-by":"crossref","unstructured":"Zuccato, A., Endersz, V., Daniels, N.: Security requirement engineering at a Telecom provider. In: Third International Conference on Availability, Reliability and Security (ARES), pp. 1139\u20131147. IEEE (2008)","DOI":"10.1109\/ARES.2008.14"},{"key":"26_CR19","doi-asserted-by":"crossref","unstructured":"Zuccato, A., Daniels, N., Jampathom, C.: Service security requirement profiles for Telecom: how software engineers may tackle security. In: Sixth International Conference on Availability, Reliability and Security (ARES), pp. 521\u2013526. IEEE (2011)","DOI":"10.1109\/ARES.2011.81"},{"key":"26_CR20","doi-asserted-by":"crossref","unstructured":"Qi, M.T., Xiao, Y.C., Jin, L.P., Ying, C.: Asset-based requirement analysis in telecom service delivery platform domain. In: IEEE\/IFIP Network Operations and Management Symposium: Pervasive Management for Ubiquitous Networks and Services, pp. 815\u2013818. IEEE (2008)","DOI":"10.1109\/NOMS.2008.4575221"},{"key":"26_CR21","unstructured":"Krogstie, J.: Requirement engineering for mobile information systems. In: Proceedings of International Workshop on Requirements Engineering: Foundation for Software Quality, Interlaken, Switzerland (2001)"},{"key":"26_CR22","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1007\/978-3-319-48393-1_8","volume-title":"The Practice of Enterprise Modeling","author":"D Ionita","year":"2016","unstructured":"Ionita, D., Gordijn, J., Yesuf, A.S., Wieringa, R.: Value-driven risk analysis of coordination models. In: Horkoff, J., Jeusfeld, M.A., Persson, A. (eds.) PoEM 2016. LNBIP, vol. 267, pp. 102\u2013116. Springer, Cham (2016). doi:10.1007\/978-3-319-48393-1_8"}],"container-title":["Lecture Notes in Business Information Processing","Exploring Services Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-56925-3_26","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:53:28Z","timestamp":1750193608000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-56925-3_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319569246","9783319569253"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-56925-3_26","relation":{},"ISSN":["1865-1348","1865-1356"],"issn-type":[{"type":"print","value":"1865-1348"},{"type":"electronic","value":"1865-1356"}],"subject":[],"published":{"date-parts":[[2017]]},"assertion":[{"value":"6 April 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"IESS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Exploring Services Science","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Rome","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Italy","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2017","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 May 2017","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 May 2017","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icexss2017","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.itais.org\/conference\/iess2017\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}