Human Factors in Telecommunications? Links in Norway, Steinar M

Total Page:16

File Type:pdf, Size:1020Kb

Human Factors in Telecommunications? Links in Norway, Steinar M Contents Feature Special Guest editorial, Knut Nordby ........................................ 1 First installations of WDM, optical ADM and optical in-line amplifiers on long-haul cable Do we need human factors in telecommunications? links in Norway, Steinar M. Svendsen ..................... 115 Knut Nordby ................................................................. 2 Consumers, not Clients – Empowering users of new technology, Frode Volden ..................................... 9 Speech quality, usability and service quality, Norman Gleiss ............................................................ 14 Status Some current issues of Human Factors in International research and standardization telecommunications, Knut Nordby ............................. 33 activities in telecommunication: Introduction, Per Hjalmar Lehne ................................................... 125 Feedback tones in public telephone networks: Human Factors work at ETSI, Donald M. Anderson .65 The ACTS Project AC215 CRABS; Cellular Radio Access for Broadband Services, The ergonomics of teleworking, John W. Bakke ........ 78 Agne Nordbotten ....................................................... 126 Human factors of videotelephony, Knut Nordby ....... 90 AC066 OPEN – Open Pan-European Network, Torodd Olsen ............................................................ 129 A tactile marker for telephone cards: – From idea to global standard, Knut Nordby ............ 98 MoMuSys, Robert Danielsen ................................... 133 The User-Interface Design process; The SINUS project, Satellite communication some new year resolutions, Simon Clatworthy ........ 107 in the UMTS, Vendela Paxal .................................... 139 Editorial office: Telektronikk Telektronikk Telenor AS, Telenor Research & Development P.O. Box 83 Volume 93 No. 3/4 - 1997 N-2007 Kjeller, Norway ISSN 0085-7130 email: [email protected] Editor: Editorial board: Ola Espvik Ole P Håkonsen, Senior Executive Vice President Tel. + 47 63 84 88 83 Oddvar Hesjedal, Vice President, Research & Development Bjørn Løken, Director Status section editor: Per Hjalmar Lehne Graphic design: Tel. + 47 63 84 88 26 Design Consult AS Editorial assistant: Layout and illustrations: Gunhild Luke Gunhild Luke, Britt Kjus, Åse Aardal Tel. + 47 63 84 86 52 Telenor Research & Development Guest editorial KNUT NORDBY The possible services that can be information society. Again, the offered by today’s telecommuni- US is leading. In 1990 Congress cation systems are staggering, and passed the Americans with Dis- new services are continually being abilities Act (ADA), and a new added. However, developers and Telecommunications Act is now operators often seem to forget that going through Congress. This leg- the end users of these sophisti- islation provides for extensive cated services belong to the rights for the users and is being species Homo sapiens, which has closely studied by other countries. not changed significantly during In Europe, there is an increasing the last 50 000 years. Although demand for Pan-European legis- today’s computer-controlled lation and a mounting pressure on telecommunication networks the Commission of the European should be able to offer services Communities (CEC) to issue fully adapted to the capabilities of Directives to achieve the same human end users better than any level of consumer protection that previous technology, the opposite US citizens enjoy. is usually the case and new services that are not specifically In the days of the state-controlled adapted to human capabilities are monopolies, the consumers had no regularly introduced. Thus, the way to influence the quality and user interface of the plain old tele- usability of services and equip- phone (POT) has actually deterio- ment. Today, consumers’ and end- rated from the time of Alexander users’ organisations participate in Graham Bell to some of today’s standardisation, thus filling a void interactive voice services. In those left by telecom operators’ who are early days users interacted with other people and any misunder- reluctant to partake in standardisation – and these consumers’ standings could be set straight right away using the most basic of organisations may soon be the ones who are calling the shots. all human capabilities – the spoken language. Actually, the service providers and the consumers have the same objectives – good usability – but they may have different If people cannot easily use technology we will increasingly see solutions as how to achieve them. that the people in the Information Society will be divided into the ‘information rich’ and the ‘information poor’. The former For various reasons industry, and the telecom industry is no group will successively improve its position in society, while exception, has come to regard good usability or the misused the latter may be excluded from important societal services and term ‘user friendliness’ as costly add-ons that offer little become increasingly dependent on others. More than 25 % of advantage in the long run. Today, this view is being turned all European citizens are either aged, disabled or both, and these on its head. Simple cost/benefit analyses will show even the do not in any way make up any marginal groups. most stubborn executives the great economical and commercial advantage of good usability: When NYNEX, the great US East- During the last ten years a wave of liberalisation, de-regulation coast based telephone company, managed to shave just three and privatisation of the state-owned telecommunication monop- seconds average off each inquiry transaction, they saved them- olies has swept across Europe and other parts of the world. selves hiring more than 500 operators. These liberalised, privatised telecommunication markets need new regulation, and a wave of re-regulation and legislation is The bottom line of all this is Human Factors or Ergonomics, the now under way: the most liberalised market of them all, the US science of designing good user interfaces. The following nine market, is also the most regulated market to secure basic articles in this Feature Section of Telektronikk are devoted to services, just trading and fair competition. various perspectives of Human Factors in Telecommunications. These range from simple tactile identifiers on telephone cards to It is to these re-regulated markets that user-groups, special empowering users of new technology; from sound quality in the interest groups and consumers’ organisations are moving in, telephone to the special requirements of tele-working; from the demanding proper services and equipment. The trade journals basic tones (line signals) we hear in the handset to the intri- now print comparative tests of similar products, and these tests cacies of using video-telephones, and from the historic origins review usability; i.e. how easy is it to use, how long does it take of human factors in telephony (did Alexander Graham Bell to learn to use it, is it easy to make a fatal mistake. And think about it?) to a review of contemporary issues. A brief purchasing decisions are increasingly made on the basis of such overview like this can only scratch the surface of a large field, reviews. Prospective customers do not only look at prices – ease but hopefully this may inspire some readers to dip deeper into of use has become an important decision factor – a product with this fascinating topic. a bad usability mark is not going to make it in the marketplace. Thus, manufacturers and service providers are going to need all the human factors expertise they can get to keep a competitive advantage. On the other side we have the legislators. Society cannot sit still and watch large groups of citizens being left outside the Telektronikk 3/4.1997 1 Do we need human factors in telecommunications? KNUT NORDBY NORWEGIAN TELECOMMUNICATIONS MUSEUM NORWEGIAN TELECOMMUNICATIONS MUSEUM The changing user interface When the telephone was in its infancy, the user interface was the simplest of all times: You just lifted the handset off- hook and gave a small crank a turn or two to alert the other party, and when the call was answered you could start the conversation. This was in the days when only two and two telephones were con- nected together (e.g. between the home and the shop, or between the mansion Figure 1 Norwegian telephone set from Figure 3 Norwegian telephone set from house and the porter’s lodge). However, 1893 with inductor crank. This telephone 1931 with rotating number dial. This was the idea of connecting several telephones set worked with the simple user interface the first ‘modern’ telephone with inte- together via a switchboard or exchange from the early days of telephony. The grated hook switch. It was designed by was soon realised, making it possible to earpiece on the handset can be moved to Johan Christian Bjerknes of Elektrisk reach many people, thus making the tele- adapt to ‘small and large heads’, Bureau, Norway (with some finishing phone a much more important communi- a simple ergonomic consession to user touches by the artist Jean Heiberg), but it cation instrument. You still only needed variability was to be produced in Sweden by L.M. to lift the handset off hook and give the Ericsson, who had acquired a majority of little crank a turn or two to alert the oper- Elektrisk Bureau shares ator (in some systems you had to press the hook a couple of times), and when the exchange answered you simply asked As the telephone networks grew, opera- the telephone book had arrived.
Recommended publications
  • Internet Invariants: What Really Matters an Internet Society Public Policy Briefing
    Internet Invariants: What Really Matters An Internet Society Public Policy Briefing 26 September 2016 Introduction Today’s Internet has We place an enormous amount of faith in the Internet, largely because it facilitates our transformed how more than two billion people connect and everyday lives. We instinctively trust that when we send an email, it will be received by communicate. And it will the intended recipient. When we type a domain name into a browser, we presume that continue to transform our economy, infrastructure, and the results will be what we are looking for. We can make these assumptions because social lives as cloud computing, Internet invariants ensure that if we send data, it arrives; and if we seek content, it will the Internet of Things, and be located. mobile devices evolve in ways we cannot yet imagine. We don’t often talk about how the Starting in the 1970s, a variety of protocols and network architectures were developed, network behind this technology works, just as most of us don’t but none became the driver of economic and social development that the Internet did. concern ourselves with where IBM’s Systems Network Architecture, for example, failed to take off because it could only electricity comes from, so long connect with hardware manufactured by IBM. The technical system that proliferated as our lights turn on. But as the Internet becomes an instead, and which remains at the foundation of the Internet, was TCP/IP because of its increasingly more pervasive and decentralized nature and underlying values of interoperability, flexibility, resilience, and critical piece of infrastructure, we need to understand both global reach.
    [Show full text]
  • GPGS-F User’S Guide 8Th Edition
    GPGS-F User’s Guide 8th Edition Norsk samarbeid innen grafisk databehandling Norwegian Association for Computer Graphics 8th Edition GPGS-F User’s Guide PAGE ii Notice SINTEF DELAB / NORSIGD retain all ownership rights to the GPGS-F software and its documentation. The information in this document is subject to change without notice. SINTEF DELAB / NORSIGD assume no responsibility for any errors that may appear in this document. The software described in this document is furnished under a license and may be used or copied only in accordance with the terms of such license. SINTEF DELAB / NORSIGD are in no way responsible for consequential damages and/or costs from the use of this software. FrameMaker is a registered trademark of Frame Technology Corporation. PostScript is a registered trademark of Adobe Systems Incorporated. X Window System is a trademark of the Massachusetts Institute of Technology. This document was prepared using FrameMaker publishing software. All figures illustrating program examples were generated by using the GPGS-F device driver for PostScript, and subsequently included into the document. Last changed: Apr 7, 1995 8th Edition GPGS-F User’s Guide PAGE iii Table of Contents Page Notice . ii Table of Contents . iii Preface . xi Font Conventions Used in the Manual . xiii Argument Naming Conventions . xiii Manual Distribution and Revisions . xiv Modification Dates . xv Chapter 1 Graphic Devices 1.1 System Initialization . 1-1 1.2 Device Control . 1-2 1.2.1 Device Options. 1-4 1.2.2 Inquiring Available Device Drivers . 1-5 1.3 Synchronizing GPGS-F Output with Other I/O Operations .
    [Show full text]
  • A FACULTY PERSPECTIVES and PRACTICES of SOCIAL PRESENCE in ONLINE POST-SECONDARY LEARNING ENVIRONMENTS a Dissertation SUBMITTED
    FACULTY PERSPECTIVES AND PRACTICES OF SOCIAL PRESENCE IN ONLINE POST-SECONDARY LEARNING ENVIRONMENTS A Dissertation SUBMITTED TO THE FACULTY OF THE UNIVERSITY OF MINNESOTA BY Julie Ann Smith IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF DOCTOR OF EDUCATION Joyce Strand, Ph.D., Adviser April 2018 a Julie Ann Smith 2018 © b Acknowledgements This dissertation would not have been able without my patient adviser, Dr. Joyce Strand, who continued to support me throughout the years and help me to finally finish this research project. The last three years of trying to finish my dissertation included the caregiving to my mother and father. My father spent over two years in assistive care at the end of battling a long war with Alzheimer’s. He needed my mother’s help and she needed mine. This, and a concurrent divorce to my husband of 23 years, prolonged my ability to complete the writing of this dissertation, thus a long time had passed since the literature review. Many thanks go to my committee and doctoral chair who patiently provided me excellent advice in educational theory, interview and survey questionnaire revisions and/or dissertation guidance: Drs. Helen Mongan-Rallis, Craig Stroupe, Terrie Shannon, and Linda Deneen, and Chair Dr. Frank Guldbrandsen. Acknowledgements also go out to the faculty survey respondents and interviewees. Without their volunteer time, participation, and input, I would not have results to advance the study of social presence in the Community of Inquiry model. Additional thanks go to the faculty and staff and my cohort of the Education Doctorate in Teaching and Learning program at the University of Minnesota Duluth in the College of Education and Human Service Professions.
    [Show full text]
  • NORSK DATA AS SINTRAN Iii Reference Manual
    SINTRAN Il Reference Manual NORSK DATA AS SINTRAN IiI Reference Manual ND-60.128.03 NOTICE The information in this document is subject to change without notice. Norsk Data A.S assumes no responsibility for any errors that may appear in this document. Norsk Data A.S assumes no responsibility for-the use or reliability of its software on equipment that is not furnished or supported by Norsk Data A.S. The information described in this document is protected by copyright. It may not be photocopied, reproduced or translated without the prior consent of Norsk Data A.S. Copyright © 1983 by Norsk Data A.S This manual is in loose leaf form for ease of updating. Old pages may be removed and new pages easily inserted if the manual is revised. The loose leaf form also allows you to place the manual in a ring binder (A) for greater protection and convenience of use. Ring binders with 4 rings corre- sponding to the holes in the manual may be ordered in two widths, 30 mm and 40 mm. Use the order form below. The manual may also be placed in a plastic cover (B). This cover is more suitable for manuals of less than 100 pages than for large manuals. Plastic covers may also be ordered below. M= | ~ . IB== B 'S NORSK DATA AS NORSK DATA AS Bil=i & e lll\ ® A Ring Binder B Plastic Cover Please send your order to the local ND office or {in Norway) to: Documentation Department Norsk Data A.S P.0O. Box 4, Lindeberg gérd Oslo 10 ORDER FORM | would like to order Ring Binders, 30 mm, at nkr 20,- per binder Ring Binders, 40 mm, at nkr 25,- per binder Plastic Covers at nkr 10,- per cover NAME ..
    [Show full text]
  • Digital Image Steganalysis Techniques
    ISSN: 2277-3754 ISO 9001:2008 Certified International Journal of Engineering and Innovative Technology (IJEIT) Volume 3, Issue 4, October 2013 A Review on Digital Image Steganalysis Techniques Categorised by Features Extracted Rita Chhikara, Latika Singh ITM University, Gurgaon, Haryana, India presence or absence of embedded message. Images are Abstract- The overwhelming growth in communication often used as a carrier because of their extensive technology and usage of public domain channels (i.e. availability with high resolution of pixels. Data Internet) has greatly facilitated transfer of data. However, embedding in a multimedia carrier like image may such open communication channels have greater vulnerability involve varying parameters such as different image to security threats causing unauthorized information access. Steganography is the art of hiding and transmitting data formats, different embedding algorithms and various through apparently innocuous carriers such as text, image, steganographic keys. This has made steganalysis a more audio or video in an effort to conceal the existence of the difficult and challenging task. Earliest work on secret data and the fact that communication is even taking steganalysis was reported by Johnson and Jajodia [9] and place. Steganalysis is an attack on steganography. Both Chandramouli et al.[10]. It has gained prominence in steganography and steganalysis have received a great deal of national security and forensic sciences as detection of attention from law enforcement and the media. In the past hidden messages can lead to the prevention of disastrous years many powerful and robust methods of steganography security incidents. Algorithms for Steganalysis are and steganalysis have been reported in the literature.
    [Show full text]
  • Use of Mobile Technology by Adults Who Use Augmentative and Alternative Communication: Voices from Two Countries
    Volume 11, Summer 2017 Assistive Technology Outcomes and Benefits Volume 11, Summer 2017, pp. 66-81 Copyright ATIA 2017 ISSN 1938-7261 Available online: www.atia.org/atob Use of Mobile Technology by Adults Who Use Augmentative and Alternative Communication: Voices from Two Countries Diane Nelson Bryen, PhD Professor Emerita, Temple Univeristy – USA Juan Bornman, PhD Professor and Director, Center for Augmentative and Alternative Communication, University of Pretoria – South Africa John Morris, PhD Clinical Research Scientist, Shepherd Center – USA Enid Moolman Lecturer, Center for Augmentative and Alternative Communication, University of Pretoria – South Africa F. Mark Sweatman, PhD Data Analyst, Shepherd Center – USA Abstract are important, but some Find it diFFicult to use requiring a variety of modifications. More than 50% Mobile technology – cell phones, smartphones and of participants From each country used their mobile tablets – has expanded communication and social devices For text-messaging, web browsing, keeping interaction, commerce, and access to inFormation a directory oF contacts, voice calling, sharing photos for many people with disabilities. Little is known or videos online, listening to music, and social about the use of these mainstream technologies by networking. Recommendations are made For adults who use augmentative and alternative industry and people who rely on AAC. communication (AAC). InFormation comparing their use by adults who rely on AAC From both high- Keywords: augmentative and alternative income and low or middle-income countries is communication, AAC, cell phones, mobile technol- nonexistent. This article presents data on the use oF ogy mobile technology by 38 adults From the United States and 30 adults From South AFrica who use AAC.
    [Show full text]
  • The Effect of Social Control Models on Motivation and Use in Electronic Communication Infrastructures
    THE EFFECT OF SOCIAL CONTROL MODELS ON MOTIVATION 103 The Effect Of Social Control Models On Motivation and Use In Electronic Communication Infrastructures Dan Manson Computer Information Systems Electronic communication can restrict organizational communication, or open communication channels to all employees regardless of status and personality. The purpose of this paper is to explore the relationships between social control patterns and electronic communication infrastructure use. Political, administrative, and computing infrastructure examples are used to provide initial understanding of infrastructure use. Social control models are used to provide insight into employee use of an electronic communication infrastructure. Case data from electronic communication systems is mapped to social control models to illustrate the effect of social control types on electronic communication use. Introduction A communications infrastructure provides an enabling platform for employees to share information to be used for decision-making, problem-definition, and coordination of organiza- tional behaviors. A functioning infrastructure enables the delivery of products and services facilitating human and cognitive processes adding value through information and knowledge exchange. In discussing the role of computing infrastructures, it is important to define infrastructure characteristics being considered. Computing infrastructure refers to the set of human and organizational resources that help make it simpler and faster for skilled people to use computerized systems (Kling, 1993). A computing infrastructure can consist of physical, technological and social characteristics. Physical characteristics can affect the ability to access the system. Technological characteristics involve issues of quality and reliability. Social characteristics address issues of information access and accountability. Physical and technological issues are driven by economic and technical issues, while social issues involve organizational issues.
    [Show full text]
  • Visions of Electric Media Electric of Visions
    TELEVISUAL CULTURE Roberts Visions of Electric Media Ivy Roberts Visions of Electric Media Television in the Victorian and Machine Ages Visions of Electric Media Televisual Culture Televisual culture encompasses and crosses all aspects of television – past, current and future – from its experiential dimensions to its aesthetic strategies, from its technological developments to its crossmedial extensions. The ‘televisual’ names a condition of transformation that is altering the coordinates through which we understand, theorize, intervene, and challenge contemporary media culture. Shifts in production practices, consumption circuits, technologies of distribution and access, and the aesthetic qualities of televisual texts foreground the dynamic place of television in the contemporary media landscape. They demand that we revisit concepts such as liveness, media event, audiences and broadcasting, but also that we theorize new concepts to meet the rapidly changing conditions of the televisual. The series aims at seriously analyzing both the contemporary specificity of the televisual and the challenges uncovered by new developments in technology and theory in an age in which digitization and convergence are redrawing the boundaries of media. Series editors Sudeep Dasgupta, Joke Hermes, Misha Kavka, Jaap Kooijman, Markus Stauff Visions of Electric Media Television in the Victorian and Machine Ages Ivy Roberts Amsterdam University Press Cover illustration: ‘Professor Goaheadison’s Latest,’ Fun, 3 July 1889, 6. Cover design: Coördesign, Leiden
    [Show full text]
  • Redial: 2016 TCPA Year in Review Telephone Consumer Protection Act: Analysis of Critical Issues and Trends Introduction
    Redial: 2016 TCPA Year in Review Telephone Consumer Protection Act: Analysis of Critical Issues and Trends Introduction Eversheds Sutherland is pleased to present REDIAL, our annual in-depth analysis of key Telephone Consumer Protection Act (TCPA) issues and trends. REDIAL reports on issues affecting the industries that face TCPA class action liability. Did you know? 2ND 100,000 3X For the fourth consecutive year, The FCC has reported that as many The TCPA imposes liability of TCPA cases are the second most as 100,000 cell phone numbers $500 per call, text or fax, trebled filed type of case in federal are reassigned every day. to $1,500 if the sender’s conduct courts nationwide. is deemed willful. Eversheds Sutherland Industry Knowledge and Focus Few industries are immune from TCPA liability. In 2016, the insurance, financial services, energy and health sectors were uniquely affected by TCPA litigation. REDIAL analyzes key legal issues affecting these industries. Eversheds Sutherland tracks daily all TCPA cases filed across the country. This allows us to spot trends and keep our clients informed. We understand the law and our clients’ businesses, allowing us to design compliance and risk management programs uniquely suited to our clients' specific needs and to spot issues before they result in litigation. When litigation is filed, Eversheds Sutherland’s TCPA team has the depth of experience necessary to zealously defend its clients’ interests in court. Why Eversheds Sutherland? STRENGTH in representing STRENGTH in knowing STRENGTH in advising
    [Show full text]
  • TX-NR636 AV RECEIVER Advanced Manual
    TX-NR636 AV RECEIVER Advanced Manual CONTENTS AM/FM Radio Receiving Function 2 Using Remote Controller for Playing Music Files 15 TV operation 42 Tuning into a Radio Station 2 About the Remote Controller 15 Blu-ray Disc player/DVD player/DVD recorder Presetting an AM/FM Radio Station 2 Remote Controller Buttons 15 operation 42 Using RDS (European, Australian and Asian models) 3 Icons Displayed during Playback 15 VCR/PVR operation 43 Playing Content from a USB Storage Device 4 Using the Listening Modes 16 Satellite receiver / Cable receiver operation 43 CD player operation 44 Listening to Internet Radio 5 Selecting Listening Mode 16 Cassette tape deck operation 44 About Internet Radio 5 Contents of Listening Modes 17 To operate CEC-compatible components 44 TuneIn 5 Checking the Input Format 19 Pandora®–Getting Started (U.S., Australia and Advanced Settings 20 Advanced Speaker Connection 45 New Zealand only) 6 How to Set 20 Bi-Amping 45 SiriusXM Internet Radio (North American only) 7 1.Input/Output Assign 21 Connecting and Operating Onkyo RI Components 46 Slacker Personal Radio (North American only) 8 2.Speaker Setup 24 About RI Function 46 Registering Other Internet Radios 9 3.Audio Adjust 28 RI Connection and Setting 46 DLNA Music Streaming 11 4.Source Setup 29 iPod/iPhone Operation 47 About DLNA 11 5.Listening Mode Preset 32 Firmware Update 48 Configuring the Windows Media® Player 11 6.Miscellaneous 32 About Firmware Update 48 DLNA Playback 11 7.Hardware Setup 33 Updating the Firmware via Network 48 Controlling Remote Playback from a PC 12 8.Remote Controller Setup 39 Updating the Firmware via USB 49 9.Lock Setup 39 Music Streaming from a Shared Folder 13 Troubleshooting 51 Operating Other Components Using Remote About Shared Folder 13 Reference Information 57 Setting PC 13 Controller 40 Playing from a Shared Folder 13 Functions of REMOTE MODE Buttons 40 Programming Remote Control Codes 40 En AM/FM Radio Receiving Function Tuning into stations manually 2.
    [Show full text]
  • The Social Imaginary of Telephony
    The Social Imaginary of Telephony Fictional Dispositives in Albert Robida’s Le Vingtième Siècle and the Archeology of “Talking Cinema”1 Alain Boillat What I propose to do here, within a perspective involving both epistemology and the archaeology of media, is to approach “talking cinema” through the examination of discourses produced in the last two decades of the nineteenth century, that is, almost fifty years prior to the generalization of talkies and the institutionalization of practices related to sound in the domain of cinema.2 Beyond this specific medium, I will examine the series of machines of audiovisual representation, one of whose many actualiza- tions was “talking cinema” (which is why quotation marks are fitting here, with regard to “cinema” as well as “talking”). Among the many inventions from which various experimentations with “talking cinema” may be said to derive, I will emphasize the technique of telephony. Indeed, its study presents the advantage of encompassing a number of auditive or audiovisual dispositives that are often much more difficult to reduce to their place in the genealogy of (institutionalized) cinema than viewing dispositives. On a methodological level, de-centering the point of view is precisely what appears productive to me, as the discussion of the place given to the voice within various audio(visual) dispositives constitutes the theoretical horizon of my observations.3 1 Translator’s note: the French expression “cinéma parlant” (literally, “talking cinema”) is usually translated as “sound cinema” in English, but given the focus of this chapter and the existence of the term “talkies” in English, it is translated as “talking cinema” here.
    [Show full text]
  • Phoneypot: Data-Driven Understanding of Telephony Threats
    Phoneypot: Data-driven Understanding of Telephony Threats Payas Gupta Bharat Srinivasan Vijay Balasubramaniyan Mustaque Ahamad New York University Georgia Institute of Technology Pindrop Security Georgia Institute of Technology Abu Dhabi [email protected] [email protected] New York University Abu Dhabi [email protected] [email protected] Abstract—Cyber criminals are increasingly using robocalling, the telephony channel can be attributed to the availability of voice phishing and caller ID spoofing to craft attacks that are IP telephony (Voice over Internet Protocol). Such calls can being used to scam unsuspecting users who have traditionally be made at no or low cost at scale in an automated fashion trusted the telephone. It is necessary to better understand similar to email spam, and criminals are already exploiting telephony threats to effectively combat them. Although there the telephony channel to craft attacks such as voice phishing exist crowd sourced complaint datasets about telephony abuse, (vishing). Unfortunately, attacks that utilize the telephone as a such complaints are often filed after a user receives multiple calls over a period of time, and sometimes they lack important resource are more successful because people in the past have information. We believe honeypot technologies can be used to trusted the telephony channel. In fact, telephony has reportedly augment telephony abuse intelligence and improve its quality. become the weak link even for web security because cyber However, a telephony honeypot presents several new challenges criminals have used social engineering over the phone to reset that do not arise in other traditional honeypot settings. We online banking credentials to steal money [48].
    [Show full text]