Abstract
ETSI identified that “future work will take into consideration heterogeneous networks using LTE, 5G fixed and WiFi technologies that will include developer friendly and standard APIs, standard based interface among multi-access hosts and an alignment with NFV architecture”. However, the term added value requires disruptive technology that can provide value from a customer perspective which leads to characterizing the value stream for the products service(s). The main synthesis of this paper is to investigate disruptive IoT technology opportunities and user needs for securing interoperable connections of the next generation of digital business models. The following objectives will be analysed and presented; (i) the customer objectives (identifying the system requirements and system design) for wireless communications; (ii) IoT System dynamics and its value chain; (iii) protocols, open API economy, and market analytics; (iv) electronic transactions within the finance sector; and (v) security. The outcome of this paper will inform the reader of the operational requirements assessments needed to provide Seamless Mobility through the management process of organizational cybernetics.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Abbreviations
- API:
-
Application Performance Interface
- BS:
-
Basic Safety Message
- CAA:
-
Context-Aware Authentication
- ConOps:
-
Concept Operations
- COTS:
-
Commercial Off-The-Shelf
- CPU:
-
Central Processing Unit
- CPS:
-
Communication Service Providers
- DSRC:
-
Dedicated Short-Range Communications
- EG:
-
ETSI Guide
- eIDAS:
-
Electronic Identification and Trust Services
- ETSI:
-
European Telecommunications Standard Institute
- FMC:
-
Fixed Mobile Convergence
- 3GPP:
-
3rd Generation Partnership Project
- HTTP:
-
Hypertext Transfer Protocol
- IMS:
-
IP Multimedia Subsystem
- IoT:
-
Internet of Things
- IPsec:
-
Internet Protocol Security
- ISG:
-
Industry Specification Group
- LoRaWAN:
-
Long range wide area networks (media access control (MAC) protocol for wide area networks)
- LoWPAN:
-
Low power Wireless Personal Area Networks
- LTE:
-
Long-Term Evolution
- MEC:
-
Multi-access Edge Computing
- multi-RAT:
-
Multiple Radio Access Technology
- NFC:
-
Near Field Communications
- OpsCon:
-
System Operational Concept
- ORD:
-
Operational Requirements Document
- QoE:
-
Quality of Experience
- SAE:
-
Society of Automotive Engineers
- SEBoK:
-
Systems Engineering Body of Knowledge
- SDN:
-
Software Defined Networks
- SIP:
-
Session Initiation Protocol
- SMTP:
-
Simple Mail Transfer Protocol
- SOI:
-
System of Interest
- SOO:
-
Statement of Objectives
- SRR:
-
System Requirement Review
- SSL:
-
Secure Socket layer
- TCO:
-
Total Cost of Ownership
- TLS:
-
Transport Layer security
- UMA/CAN:
-
Unlicensed Mobile Access
- VMs:
-
Virtual Machines
- VNF:
-
Virtualized Network Function and
- VSM:
-
Value-Stream Mapping
- Wifi:
-
Local Area Wireless Technology
- WiMAX:
-
Worldwide Interoperability for Microwave Access
References
Haskins, C. (ed.) INCOSE: Systems Engineering Handbook, A Guide for System Life Cycle Processes and Activities, 4th edn., p. 26. Wiley, Hoboken (2015a)
Almustafa, K., Alenezi, M.: Cost analysis of SDN/NFV architecture over 4G infrastructure. In: The 8th International Conference on Emerging Ubiquitous Systems and Pervasive Networks, Science Direct (2017). Proc. Comput. Sci. 113, 130–137
European Telecommunication Standard Institute (ETSI): ETSI GS NGP 001 V1.1.1, Group Specification, Next Generation (NGP); Scenarios Definitions (2016)
Reznik, A.: An Update on our Mult-Access Edge Computing ISG, The Standard, News from ETSI – Issue 2 (2017)
Corser, G., Fink, G.A., Aledhari, M., Bielby, J., Nighot, R., Mandal, S., Aneja, N., Hrivnak, C., Cristache, L.: Internet of Things (IOT) security best practices. IEEE Internet Technology Policy Community White Paper (2017). Internetinitiative.ieee.org
Ali, N.B., Petersen, K., de França, B.B.N.: Evaluation of simulation-assisted value-stream mapping for software product development: two industrial cases. Inf. Softw. Technol. 68, 45 (2015)
Ali, N.B., Petersen, K., Schneider, K.: FLOW-assisted value-stream mapping in the early phases of large-scale software development. J. Syst. Softw. 111, 213–227 (2016)
SEBoK v. 1.9.1. https://www.sebokwiki.org/wiki/Cybernetics_(glossary). Accessed 16 Oct 2018
Ashby, W.R.: Chapter 11. Introduction to Cybernetics. Wiley, London (1956)
Haskins, C. (ed.) INCOSE: Systems Engineering Handbook, A Guide for System Life Cycle Processes and Activities, 4th edn., pp. 47–103. Wiley, Hoboken (2015b)
Senge, P.M.: The Fifth Discipline: The Art and Practice of the Learning Organization, 2nd edn. Doubleday Currency, New York (2006)
Singh, A.: Agile Release Train, digité How Work really Gets Done (2017). https://www.digite.com/blog/agile-release-train-art/
Carter, A.: Better Buying Power: Mandate for Restoring Affordability and Productivity in Defense Spending, Memorandum for Defense Acquisition and Logistics Professionals, Under Secretary of Defense for Acquisition, Technology, and Logistics (2011)
Yang, S.N., Ho, S.W., Lin, Y.B., Gan, C.H.: A multi-RAT bandwidth aggregation mechanism with software-defined networking. J. Netw. Comput. Appl. https://doi.org/10.1016/j.jnca.(2015)11.003
Ochaney, M.: Fixed Mobile Convergence, LinkedIn SlideShare (2014). https://www.slideshare.net/MiteshOchaney/fixed-mobile-convergence-fmc-33401126
Pope, N.: New trust services helping in the fight against fraud, Standards for New types of “Trust Services” Provide an Important Toolset to Encounter Growing Internet Fraud, Enjoy The ETSI MAG, Internet Security: Dream or Reality? p. 10 (2019)
ETSI: The Standards People, A Connected World, Annual Report, April 2018, Security, Standards for Secure, Reliable Communications (2018)
Author information
Authors and Affiliations
Corresponding authors
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Redmond, A.M., Chanvillard, L. (2020). Implementing Organizational Cybernetics for the Next Generation of Digital Business Models. In: Boy, G., Guegan, A., Krob, D., Vion, V. (eds) Complex Systems Design & Management. CSDM 2019. Springer, Cham. https://doi.org/10.1007/978-3-030-34843-4_6
Download citation
DOI: https://doi.org/10.1007/978-3-030-34843-4_6
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-34842-7
Online ISBN: 978-3-030-34843-4
eBook Packages: EngineeringEngineering (R0)