Skip to main content

Implementing Organizational Cybernetics for the Next Generation of Digital Business Models

  • Conference paper
  • First Online:
Complex Systems Design & Management (CSDM 2019)

Abstract

ETSI identified that “future work will take into consideration heterogeneous networks using LTE, 5G fixed and WiFi technologies that will include developer friendly and standard APIs, standard based interface among multi-access hosts and an alignment with NFV architecture”. However, the term added value requires disruptive technology that can provide value from a customer perspective which leads to characterizing the value stream for the products service(s). The main synthesis of this paper is to investigate disruptive IoT technology opportunities and user needs for securing interoperable connections of the next generation of digital business models. The following objectives will be analysed and presented; (i) the customer objectives (identifying the system requirements and system design) for wireless communications; (ii) IoT System dynamics and its value chain; (iii) protocols, open API economy, and market analytics; (iv) electronic transactions within the finance sector; and (v) security. The outcome of this paper will inform the reader of the operational requirements assessments needed to provide Seamless Mobility through the management process of organizational cybernetics.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Abbreviations

API:

Application Performance Interface

BS:

Basic Safety Message

CAA:

Context-Aware Authentication

ConOps:

Concept Operations

COTS:

Commercial Off-The-Shelf

CPU:

Central Processing Unit

CPS:

Communication Service Providers

DSRC:

Dedicated Short-Range Communications

EG:

ETSI Guide

eIDAS:

Electronic Identification and Trust Services

ETSI:

European Telecommunications Standard Institute

FMC:

Fixed Mobile Convergence

3GPP:

3rd Generation Partnership Project

HTTP:

Hypertext Transfer Protocol

IMS:

IP Multimedia Subsystem

IoT:

Internet of Things

IPsec:

Internet Protocol Security

ISG:

Industry Specification Group

LoRaWAN:

Long range wide area networks (media access control (MAC) protocol for wide area networks)

LoWPAN:

Low power Wireless Personal Area Networks

LTE:

Long-Term Evolution

MEC:

Multi-access Edge Computing

multi-RAT:

Multiple Radio Access Technology

NFC:

Near Field Communications

OpsCon:

System Operational Concept

ORD:

Operational Requirements Document

QoE:

Quality of Experience

SAE:

Society of Automotive Engineers

SEBoK:

Systems Engineering Body of Knowledge

SDN:

Software Defined Networks

SIP:

Session Initiation Protocol

SMTP:

Simple Mail Transfer Protocol

SOI:

System of Interest

SOO:

Statement of Objectives

SRR:

System Requirement Review

SSL:

Secure Socket layer

TCO:

Total Cost of Ownership

TLS:

Transport Layer security

UMA/CAN:

Unlicensed Mobile Access

VMs:

Virtual Machines

VNF:

Virtualized Network Function and

VSM:

Value-Stream Mapping

Wifi:

Local Area Wireless Technology

WiMAX:

Worldwide Interoperability for Microwave Access

References

  1. Haskins, C. (ed.) INCOSE: Systems Engineering Handbook, A Guide for System Life Cycle Processes and Activities, 4th edn., p. 26. Wiley, Hoboken (2015a)

    Google Scholar 

  2. Almustafa, K., Alenezi, M.: Cost analysis of SDN/NFV architecture over 4G infrastructure. In: The 8th International Conference on Emerging Ubiquitous Systems and Pervasive Networks, Science Direct (2017). Proc. Comput. Sci. 113, 130–137

    Article  Google Scholar 

  3. European Telecommunication Standard Institute (ETSI): ETSI GS NGP 001 V1.1.1, Group Specification, Next Generation (NGP); Scenarios Definitions (2016)

    Google Scholar 

  4. Reznik, A.: An Update on our Mult-Access Edge Computing ISG, The Standard, News from ETSI – Issue 2 (2017)

    Google Scholar 

  5. Corser, G., Fink, G.A., Aledhari, M., Bielby, J., Nighot, R., Mandal, S., Aneja, N., Hrivnak, C., Cristache, L.: Internet of Things (IOT) security best practices. IEEE Internet Technology Policy Community White Paper (2017). Internetinitiative.ieee.org

  6. Ali, N.B., Petersen, K., de França, B.B.N.: Evaluation of simulation-assisted value-stream mapping for software product development: two industrial cases. Inf. Softw. Technol. 68, 45 (2015)

    Article  Google Scholar 

  7. Ali, N.B., Petersen, K., Schneider, K.: FLOW-assisted value-stream mapping in the early phases of large-scale software development. J. Syst. Softw. 111, 213–227 (2016)

    Article  Google Scholar 

  8. SEBoK v. 1.9.1. https://www.sebokwiki.org/wiki/Cybernetics_(glossary). Accessed 16 Oct 2018

  9. Ashby, W.R.: Chapter 11. Introduction to Cybernetics. Wiley, London (1956)

    Google Scholar 

  10. Haskins, C. (ed.) INCOSE: Systems Engineering Handbook, A Guide for System Life Cycle Processes and Activities, 4th edn., pp. 47–103. Wiley, Hoboken (2015b)

    Google Scholar 

  11. Senge, P.M.: The Fifth Discipline: The Art and Practice of the Learning Organization, 2nd edn. Doubleday Currency, New York (2006)

    Google Scholar 

  12. Singh, A.: Agile Release Train, digité How Work really Gets Done (2017). https://www.digite.com/blog/agile-release-train-art/

  13. Carter, A.: Better Buying Power: Mandate for Restoring Affordability and Productivity in Defense Spending, Memorandum for Defense Acquisition and Logistics Professionals, Under Secretary of Defense for Acquisition, Technology, and Logistics (2011)

    Google Scholar 

  14. Yang, S.N., Ho, S.W., Lin, Y.B., Gan, C.H.: A multi-RAT bandwidth aggregation mechanism with software-defined networking. J. Netw. Comput. Appl. https://doi.org/10.1016/j.jnca.(2015)11.003

  15. Ochaney, M.: Fixed Mobile Convergence, LinkedIn SlideShare (2014). https://www.slideshare.net/MiteshOchaney/fixed-mobile-convergence-fmc-33401126

  16. Pope, N.: New trust services helping in the fight against fraud, Standards for New types of “Trust Services” Provide an Important Toolset to Encounter Growing Internet Fraud, Enjoy The ETSI MAG, Internet Security: Dream or Reality? p. 10 (2019)

    Google Scholar 

  17. ETSI: The Standards People, A Connected World, Annual Report, April 2018, Security, Standards for Secure, Reliable Communications (2018)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Alan Martin Redmond or Loic Chanvillard .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Redmond, A.M., Chanvillard, L. (2020). Implementing Organizational Cybernetics for the Next Generation of Digital Business Models. In: Boy, G., Guegan, A., Krob, D., Vion, V. (eds) Complex Systems Design & Management. CSDM 2019. Springer, Cham. https://doi.org/10.1007/978-3-030-34843-4_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-34843-4_6

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-34842-7

  • Online ISBN: 978-3-030-34843-4

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics