• +353-1-416-8900(GMT OFFICE HOURS)
  • 1-800-526-8630(US/CAN TOLL FREE)
  • 1-917-300-0470(EST OFFICE HOURS)
Network Operator Monetization Strategies: Leveraging New Sources of Revenue - Product Image

Network Operator Monetization Strategies: Leveraging New Sources of Revenue

  • Published: February 2012
  • 201 Pages
  • Mind Commerce LLC

Arguably, the cellular communications marketplace has reached a point of saturation in terms of customer acquisition. Network operators are increasingly reliant upon cannibalizing customers from each other and growing revenue from non-voice communications. There are many other potential areas for driving revenue growth and improved profitability including:

- Subscriber data mining and management
- Leveraging presence and location determination
- Value-added Service (VAS) applications and content
- Working with third party application and content providers
- Mobile advertising, commerce, stored value and subsidized services
- Expanding the scope of Machine-to-Machine (M2M) communications
- Leveraging network improvements such as Self Organizing Networks (SON)
- Provide Free-to-End-user (FTEU) applications and services paid by third parties

This research evaluates opportunities for network operators to grow revenue from new sources including mobile Value Added Services (VAS) applications. The report analyzes many other revenue potential areas including subscriber data management, working with third party sources such as mobile marketing and mobile commerce READ MORE >

EXECUTIVE SUMMARY
INTRODUCTION
1.1 MOBILE APPLICATION STORE AND ITS POTENTIAL REVENUES FOR MOBILE OPERATORS
1.1.1 CONCLUSION
MOBILE PAYMENT AND ITS POTENTIALS FOR OPERATORS TO MAKE PROFIT
1.1.2 MOBILE PAYMENT SYSTEMS
1.1.3 CURRENT M-PAYMENT MARKET
1.1.1 MONEY TRANSFERS
1.1.2 M-BANKING ECO-SYSTEM
1.1.3 MOBILE WALLETS
1.1.4 COMPARISON BETWEEN CURRENT WALLET SYSTEMS
1.1.5 ADVANTAGES OF THE M-PAYMENTS SYSTEMS
MOBILE COMMERCE AND ITS PROFIT FOR OPERATORS
1.1.6 FACTORS TO AFFECT THE M-COMMERCE INDUSTRY
1.1.7 THE FUTURE OF M-COMMERCE
1.1.8 M-COMMERCE FUTURE TRENDS
1.1.9 M-COMMERCE CHALLENGES
1.1.10 CONCLUSION
MOBILE NETWORK MANAGEMENT: WAYS TO INCREASE PROFITS
1.1.11 NETWORK MANAGEMENT FUNCTIONALITY
1.1.12 MOBILE NETWORK MANAGEMENT METHODS
1.1.13 SIMPLE NETWORK MANAGEMENT PROTOCOL (SNMP)
1.1.14 OTHER NETWORK MANAGEMENT PROTOCOLS
1.1.15 MANAGING INTERNET PROTOCOL FOR MOBILES
1.1.16 CASE STUDY: HOW TO MANAGE NETWORKS TO INCREASE PROFITS
1.1.17 CORE DIAMETER NETWORKS MANAGEMENT
1.1.18 SUBSCRIBER DATA MANAGEMENT
1.1.19 POLICY MANAGEMENT
MOBILE MARKETING AND ADVERTISING
1.2 MOBILE ADVERTISING METHODS
1.2.1 MESSAGING SERVICES
1.2.2 BUSINESS ON THE GO APPLICATIONS
1.3 THE SECURE AUTHENTICATION INFRASTRUCTURE FOR MOBILE USERS
1.4 DIFFERENT SECURED CONNECTIONS
1.4.1 AUTHENTICATION
1.4.2 ACCESS RIGHTS
1.4.3 PAYMENT CREDENTIALS
1.4.4 PRIVACY OF COMMUNICATION
1.4.5 INTEGRITY OF MESSAGE EXCHANGES
1.4.6 ANONYMITY
1.5 AUTHENTICATION METHODS AND PROTOCOLS FOR BUSINESS ON THE GO CONCEPT
1.5.1 SYMMETRIC AUTHENTICATION
1.5.2 ASYMMETRIC AUTHENTICATION,
1.5.3 AUTHENTICATION BASED ON BIOMETRIC INFORMATION
1.5.4 REQUIREMENTS FOR MOBILE INTERNET (BUSINESS ON THE GO) AUTHENTICATION
1.5.5 PASSWORD-BASED AUTHENTICATION WITH SUPPORT FOR PUBLIC KEY TECHNOLOGY
1.5.6 PROTOCOL DESCRIPTION
1.5.7 VERIFICATION OF THE AUTHENTICATION REQUIREMENTS
1.5.8 SYMMETRIC CRYPTOGRAPHY (SIM-BASED AUTHENTICATION)
1.6 PUBLIC KEY CRYPTOGRAPHY
1.6.1 DIGITAL SIGNATURES
1.6.2 CERTIFICATE AUTHORITIES
1.6.3 HOW TO COMBINE BOTH PUBLIC AND SECRET KEY CRYPTOGRAPHY
1.6.4 AUTHENTICATION CODES
1.6.5 WAP SECURITY (WIM MODULE)
1.7 NEW VALUE ADDED SERVICES TO BE USED
1.7.1 TRACKING SALES AND CONTROLLING THE COMPANIES RESOURCES
PRIVACY AND SECURITY OF M-BANKING AND HOW TO INCREASE PROFITS THROUGH NFC PAYMENTS AND NFC MARKETING
1.7.2 NFC USAGE AND APPLICATIONS
1.7.3 NFC ANALYSIS (WHERE IS THE PROFIT?)
1.7.4 SECURITY OF THE NFC AND ITS PAYMENT SYSTEMS
1.7.5 ATTACKS ON NFC SECURITY
1.7.6 USING NFC AS SECURE KEY STORAGE
DATA MINING AND MANAGEMENT IN TELECOMMUNICATIONS
1.7.7 DATA MINING TOOLS AND TECHNIQUES
1.7.8 THE PERFORMANCE OF DATA MINING TECHNIQUES WHEN APPLIED TO CHURN PREDICTION
1.7.9 DATA MINING FOR CALLS
1.7.10 DATA MINING IN DATA NETWORKS
1.7.11 DATA MINING IN CUSTOMERS DATA AND ITS PRIVACY
NEW VALUE ADDED SERVICES APPLICATION FOR THE 4G AND LTE ERA
1.8 E-GOVERNMENT
1.8.1 MOBILE APPLICATIONS FOR THE GOVERNMENT
1.8.2 THE FUTURE OF E-GOVERNMENT CONCEPT
1.8.3 E-GOVERNMENT TO MOBILE GOVERNMENT (GOVERNMENT ON GO CONCEPT)
1.8.4 THE RETURN ON THE INVESTMENT OF THE MOBILE GOVERNMENT
1.8.5 THE USE OF TELECOMMUNICATION IN PUBLIC SERVICE APPLICATIONS
1.8.6 CASE STUDY: HOW TELECOMMUNICATION CAN SAVE COSTS FOR THE GOVERNMENTS AND MAKE PROFITS
1.8.7 THE EFFECT ON THE ECONOMY AND THE ROI
1.8.8 CELL BROADCAST SERVICE (CBS)
1.8.9 CELLTICK
1.8.10 (MMS) MULTIMEDIA MESSAGING SERVICE
1.8.11 MOZAT
1.8.12 ANNY WAY MMS
1.8.13 UNIFIED MESSAGING
1.8.14 CYCOS AG
1.9 AUGMENTED REALITY
1.9.1 INTRODUCTION
1.9.2 AR 3D APPLICATIONS
1.9.3 TRACKING USER'S POSITION
1.9.4 QR CODES
1.9.5 MOBILE SYSTEMS IN AR
1.9.6 COLLABORATIVE APPLICATIONS
1.9.7 AUGMENTED REALITY CHALLENGES
1.9.8 AR APPLICATIONS
1.9.9 AR IN TOURISM
1.9.10 AR AND FACE RECOGNITION
1.9.11 CASE STUDY: HOW MOBILE CAN BENEFIT FROM AUGMENTED REALITY
1.10 WEB 2.0 AND SOCIAL SOFTWARE
1.10.1 LOCATION-BASED SERVICE IN AR
1.10.2 CONCLUSION
THE CURRENT CHALLENGES FACING THE TELECOMMUNICATION INDUSTRY AND THE IMPACT OF MOBILE VALUE ADDED SERVICES ON THE MARKET
LTE BENEFITS FOR THE MOBILE OPERATORS
1.10.3 KEY SERVICE ADVANCES
1.10.4 DEVICES DEVELOPMENTS
1.10.5 NETWORK INTERFACES
1.10.6 MOBILE INTERFACES
1.10.7 HIGH-PERFORMANCE BROADBAND SYSTEMS STRATEGIES
1.10.8 EDGE/HSPA/LTE FEATURES
1.10.9 ADOPTION OF TECHNOLOGIES TO 2030
1.10.10 MIGRATION FROM THE CURRENT NETWORKS TO LTE STRATEGIES
1.11 FUTURE TRENDS
1.12 EVOLUTION OF THE TELECOMMUNICATION INDUSTRY TO 2016
1.13 FUTURE TECHNOLOGIES FOR A UNIVERSAL RADIO ENVIRONMENT
1.14 FUTURE TECHNOLOGIES FOR A UNIVERSAL RADIO ENVIRONMENT TDD SYSTEM
1.15 FEATURES OF FUTURE TDD SYSTEM
1.16 CHALLENGES OF THE TDD SYSTEM
1.17 THE UPCOMING TECHNOLOGY OF TDD SYSTEM
1.18 TDD TOPOLOGY
1.19 RADIO ACCESS NETWORK (RAN)
1.19.1 CONTROL PLANE AND USER PLANE
1.20 PEAK DATA RATE
1.21 MULTIPLE ACCESS METHODS
1.21.1 OFDM MODULATION
1.21.2 RANDOM ACCESS PROCEDURE
SELF ORGANIZING NETWORKS
1.22 INTRODUCTION
1.23 ARCHITECTURE OF SON
1.23.1 IEEE 802.16
1.23.2 NGMN STANDARDS FOR SON
1.23.3 SON CATEGORIES AND CASES
1.23.4 DISTRIBUTED/SELF-ORGANIZING (DSO)
1.23.5 COOPERATIVE RELAYING (CR) IN SON
1.23.6 FEEDBACK OVERHEAD IN SON
1.23.7 CODEBOOK-BASED PRE-CODING IN SON
1.23.8 FEEDBACK DELAY IN SON
1.24 INSTALLING SON
1.25 STAGES OF INSTALLING SON
1.25.1 SELF CONFIGURATION
1.25.2 SELF OPTIMIZATION
1.25.3 SELF HEALING
1.25.4 PROBLEMS WITH SELF HEALING
1.25.5 INSTALLING PHASES

Note: Product cover images may vary from those shown

RELATED PRODUCTS

Our Clients

Our clients' logos