@book{550577cede8349509e6c015f1a1edb32,
title = "Modelling telecom fraud with e3value",
abstract = "Telecommunication services are complex product packages that rely on a large and complex technical infrastructure. However, fraudulent use of such telecommunication services rarely exploits hardware vulnerabilities. Instead, most common exploits operate at a business level, capitalizing on the unexpected interaction between various product packages from multiple providers. As such, an assumption was made that in order to fully describe the scenarios, a modelling language capable of describing value transactions between actors is required. In order to validate this assumption, a business value modelling language, e3value was selected, generic (non-misuse) business models were created and four misuse scenarios were modelled. This report showcases the models, discusses strengths and limitations encountered during modelling and draws conclusions with regard to the applicability, usability and utility of e3value models in modelling (Telecom) fraud as well as more generally in Risk Assessment.",
keywords = "EC Grant Agreement nr.: FP7/2007-2013, Telecom fraud, Attacker motivation, Impact estimation, Business value, EC Grant Agreement nr.: FP7/318003",
author = "Dan Ionita and Sebastiaan Koenen and Wieringa, {Roelf J.}",
note = "Foreground = 100%; Type of activity = technical report; Main leader = UT; Type of audience = scientific community; Size of audience = n.a.; Countries addressed = international;",
year = "2014",
month = oct,
day = "31",
language = "English",
series = "CTIT Technical Report Series",
publisher = "Centre for Telematics and Information Technology (CTIT)",
number = "TR-CTIT-14-11",
address = "Netherlands",
}