.8% down, 3% to go

Boney, Karissa
December 1997
Cellular Business;Dec97, Vol. 14 Issue 13, p6
Trade Publication
Opinion. Presents the author's view on the decreasing claim of wireless fraud as seen in the percentage of the telecommunications industry's overall revenue stream in United States for the year 1996. Obstacles put up by carriers and vendors for cloners; Advice of the author to carriers in beating fraudsters.


Related Articles

  • Security: Everyone Has A Stake. Dziatkiewicz, Mark // Wireless Week;09/18/2000, Vol. 6 Issue 38, p22 

    Discusses issues on the adoption of security measures in the wireless communication industry. Response of several carriers on the issue; Information on global industry initiatives for secure mobile transactions.

  • Don't Pretend, Defend. Williamson, John // Global Telephony;Jul2000, Vol. 8 Issue 7, p18 

    Discusses the need for wireless operators to be on guard against fraud and security breaches. Projected growth of telecommunication and information technology fraud and security concerns; Operators and end users' need to be familiar with how their network or service could be hit by fraud;...

  • i3Mobile introduces security feature.  // RCR Wireless News;9/25/2000, Vol. 19 Issue 39, p16 

    Features the wireless portal developed by i3Mobile Inc. for security service providers to detect threats to information systems and networks in Stamford, Connecticut.

  • Fraud Is Down, But Not Out. Bourrie, Sally Ruth // Wireless Week;06/05/2000, Vol. 6 Issue 23, p44 

    Focuses on fraud or corrupt practices committed through wireless communication systems. Discussion on subscription fraud; Corrupt practices within telecommunication companies.

  • Proprietary fixes for WAP security gap. Chan, Tony // Telecom Asia;Feb2000, Vol. 11 Issue 2, p20 

    Cites the technical issues concerning the wireless application protocol (WAP) technology. Incorporation of Wireless Transport Layer Security; Need for another form of encryption at the section of the network between the gateway and server; WAP security solutions.

  • Bluetooth Bulletin. Beach, Tarre // Wireless Review;07/15/2000, Vol. 17 Issue 14, p46 

    Focuses on the Bluetooth technology, a short-range radio link for the wireless industry. How Bluetooth-enabled devices can minimize interference; Levels of security of Bluetooth's operation modes; Other forms of security Bluetooth uses; Qualification program developed to ensure its...

  • Securing wireless transactions. Chen, Anne // eWeek;04/02/2001, Vol. 18 Issue 13, p44 

    Predicts the extension of the security and identity verification capabilities of public-key infrastructure in wired transactions in the United States to wireless transactions. Modification of public-key infrastructure products for mobile applications; Enabling of wireless users to encrypt their...

  • Security, Privacy Ready For Long Haul. Smith, Brad // Wireless Week;10/28/2002, Vol. 8 Issue 39, p14 

    Focuses on a white paper presented at the Cellular Telecommunication & Internet Association's Wireless Internet Caucus which deals with the issues of privacy and security of wireless subscribers. Step in providing security and privacy for wireless subscribers; Actions being taken by wireless...

  • The twists and turns of fraud. Parker, Tammy // Telephony;11/5/96Supplement, Vol. 231 Issue 19, p18 

    Reports on the wireless industries' efforts in managing fraud and to cut losses in the United States. Annual losses of wireless industry in terms of fraud; Comments by Michael Guidry on the industry's losses; Two categories of fraud-fighting efforts; Prevention of cloning fraud; Use of...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics