Abstract: The purpose of this article is (a) to give the reader an introduction to formal
standardization and (b) an overview of international standardization activities
in the field of ICT.
In the first part of the article the introduction to formal standardization
will be exemplified at a national level by the national Danish standardization
organization (DS), at a European level by the European standardization organizations
(CEN/CELENEC and ETSI) and at a global level by the international
standardization organizations (ISO, IEC and ITU).
The second part of the article will provide the reader with an overview of
the standards and ongoing standardization activities in JTC1 – the joint technical
committee between ISO and IEC on ICT standardization. This paragraph
will include a number of illustrative examples to give an in-depth impression
of the work in the joint technical committee.
Keywords: Standardization, standards, ICT, standardization organizations,
ISO/IEC JTC1, benefit from standards
Abstract: This paper describes the business impact of two international standards for
information security management: ISO/IEC 27001 and ISO/IEC 27002. Six
company cases show that companies had different reasons for wanting to
implement these standards, but that they achieved most of their objectives.
Benefits include improved service quality, higher customer satisfaction, and
in some cases, new business opportunities. A number of common success
factors ensure the objectives can be achieved, and financial and non-financial
benefits can indeed be obtained. The lessons learnt from these cases can help
other companies to also reap such benefits.
Keywords: Information security, ISO/IEC 27001, case study, standardization,
business impact.
Abstract: The Standards Education (SE) in the field of ICT gains increasing momentum
worldwide. The strategic value of the ICT standards and their influence on
the economy proves essential towards countries’ development and their economic
growth. This paper overviews the relevant current SE initiatives with a
special emphasis on the South Eastern Europe (SEE) case and Macedonia. It
discusses the level of ICT penetration, the recognition of the SE importance
and the involvement of the relevant stakeholders in the SE curricula design on
various education levels in Macedonia. Finally, the paper pinpoints the future
directions towards transparent and harmonized SE.Faculty of Electrical Engineering and Information Technologies (FEEIT) – Skopje
Keywords: ICT, Standards Education (SE), South Eastern Europe (SEE), SE
initiatives, ICT standardization, Macedonia’s case.
Abstract: In Osaka University, the Education on Global Standardization Program (Univ-
EoGSz) for post-graduate students is offered by the Interdisciplinary Center of
Osaka University and extensively developed since 2009. The Malaysia-Japan
International Institute of Technology (MJIIT), Universiti Teknologi Malaysia
(UTM) is now going to setup the courses of standardization education as a
sub program in collaboration with Osaka University for Malaysian academics
and university students. In this article, the objectives and frameworks of this
global standardization education program will be evaluated, especially on
the existing Osaka Univ. program and MJIIT program. The general issues
on standardization education and the results of case studies on the current
trends of global standardization are discussed. The contents of Osaka Model,
which MJIIT is now adopting, are slightly different from the conventional
educations regarding the introduction of standards, which was architected for
the general local schools and companies. It is expected that the article will
give a valuable example for understanding on the future direction of standardization
educations and advance further its activities in academic and/or
university on the issue.And by promoting this education, we hope the conceptual
paradigm regarding standardization will be shifted from the just simple
international standardization, as reflecting international expansion of the
intellectual property right (IPR) based national standard, to globalstandardization, as commonly acceptable one beyond IPR.And it focuses more
enhancing the innovativeness, entrepreneurial and global standardization
activities as well.
Keywords: Education on Global Standardization, Generic, Academic,
University.
Abstract: IEEE 802.11ah is an emerging Wireless LAN (WLAN) standard that defines
a WLAN system operating at sub 1 GHz license-exempt bands. Thanks to the
favorable propagation characteristics of the low frequency spectra, 802.11ah
can provide much improved transmission range compared with the conventional
802.11 WLANs operating at 2.4 GHz and 5 GHz bands. 802.11ah can
be used for various purposes including large scale sensor networks, extended
range hotspot, and outdoor Wi-Fi for cellular traffic offloading, whereas the
available bandwidth is relatively narrow.
In this paper, we give a technical overview of 802.11ah Physical (PHY)
layer and Medium Access Control (MAC) layer. For the 802.11ah PHY,
which is designed based on the down-clocked operation of IEEE 802.11ac’s
PHY layer, we describe its channelization and transmission modes. Besides,
802.11ah MAC layer has adopted some enhancements to fulfill the expected
system requirements. These enhancements include the improvement of power
saving features, support of large number of stations, efficient medium access
mechanisms and throughput enhancements by greater compactness of various
frame formats. Through the numerical analysis, we evaluate the transmission
range for indoor and outdoor environments and the theoretical throughput
with newly defined channel access mechanisms.
Keywords: Sub 1 GHz, IEEE 802.11ah, smart grid, long range WLAN
Abstract: The world of communication technology is changing fast and the means of
communication are moving towards a packet switched transmission systems
such as Voice over IP (VoIP). Formerly call identity spoofing of the displayed
number in circuit switched (CS) networks was too difficult to perform so that
people could be sure that when receiving a call on their mobile phone or at
home, the displayed number is the one as it is supposed to be. Nowadays
this is not the case anymore, voice communication from the internet with
VoIP is cheap and spam calls can be easily realized without any costs, also
it is getting easier to perform spoofed calls with wrong display name or
number.
The mobile network operators have no mechanisms to tackle those threats,
but standardization activities are already in place within the security group
SA3 of 3GPP. This paper provides an overview of the current status of
the standards activities and shows the most promising solutions that are
proposed up to now. The proposed solutions detect unsolicited communications
and spoofed calls by tracing back to the displayed number used in the
attack.
Keywords: Spam, Unsolicited Communication, Voice Phishing, Call Id
Spoofing.