Latest News
TelSoc Online Event: Kristy Sparrow (BIRRR) and Sam Dimarco (NBN Co) No Choice, No Voice: How Lack of Competition Has Shaped Regional Connectivity Wednesday, 19 November 2025 – from 12.30 to 1.30 pm AEDT TelSoc has pleasure in announcing its next online webinar on Wednesday, 19 November 2025, from 12.30 p.m. with Kristy Sparrow of Better Internet for Rural, Regional and Remote Australia (BIRRR), and Sam Dimarco, General Manager Regional & Remote, NBN Co. They will share...
22nd October 2025
REMINDER: ANNUAL GENERAL MEETING ONLINE EVENT – WEDNESDAY 26 NOVEMBER 2025 COMMENCING AT 5.00 PM AEDT Have your say on TelSoc’s programs and priorities If you are a financial member or life member of TelSoc please register for the AGM on the TelSoc website at https://telsoc.org/event/telsoc-annual-general-meeting-wednesday-26-november-2025. If you cannot attend in person, please fill out an online proxy form – also on the website. As a volunteer...
22nd October 2025
The latest issue of our journal, the Journal of Telecommunications and the Digital Economy, is now available on the TelSoc website at https://telsoc.org/journal/jtde-v13-n3. Please have a look at it. You can download the full issue (towards the bottom of the issue page) or select individual articles. All content is free to TelSoc financial members (when logged in). The September issue includes a proposal by Anjikumar & Chakravarth for a lightweight encryption framework...
11th October 2025
Peak consumers body slams Australian telecoms sector as Optus fined $100 million; Optus boss apologises for deaths during emergency calls outage Verizon partners with key vendors to establish 6G Forum US mobile operator Verizon has partnered with five key telecommunications and device vendors to establish a working group on the development of 6G. Peak consumers body slams Australian telecoms sector as Optus fined $100 million Peak communications consumers...
26th September 2025
PLDT Global partners with Japan's BBIX for overseas customers PLDT Global, the international arm of Philippines telco PLDT, has announced a strategic partnership with Japanese Internet Exchange BBIX to provide remote peering services. Privacy risks still remain with Microsoft 365 Copilot: Dutch education cooperative Dutch...
20th September 2025
TelSoc Online Event: Agit Nagpal (Aetha Consulting), John Laughlin and Thomas Pickett Can telcos really stop scammers? The fight against foreign criminal gangs Wednesday, 24 September 2025 – from 5.00 pm AEST Note: The presentation begins at 5.00 pm AEST, not at the usual lunchtime. Just a reminder that TelSoc's next online webinar is on Wednesday, 24 September 2025, from 5.00 p.m. with Agit Nagpal, Partner of Aetha Consulting, and his team, John Laughlin and Thomas Pickett. ...
15th September 2025
Latest Events
Latest Journal Articles
Authored by Tamarapalli Anjikumar and A. S. N. Chakravarthy
Issued in JTDE - Vol 13, No 3 - September 2025
The rapid expansion of Internet of Things (IoT) applications in healthcare has amplified the need for secure, efficient, and scalable data transmission frameworks. This study proposes an energy-aware and secure IoT-based data transmission architecture tailored for remote healthcare monitoring systems. Unlike conventional encryption-centric models, the proposed framework integrates lightweight double encryption (ACROT-DHSKECC) and hashed access control (LSCRC32) with optimised network path selection using clustering and Grasshopper Optimisation Algorithm (GOA). This integration reduces latency, enhances node-level energy efficiency, and secures data transmission over distributed networks. The system’s design aligns with next-generation telecom infrastructure, making it well-suited for deployment in 5G-enabled smart healthcare environments. Simulation results demonstrate reduced hash generation time, lower memory usage, and enhanced encryption performance, affirming its viability for secure data delivery in modern digital health ecosystems.
Authored by Truong Duy Dinh, Tran Duc Le, Thi Thu Ha Nguyen, and Hoang Giang Do
Issued in JTDE - Vol 13, No 3 - September 2025
Confronted by resource limitations and sophisticated cyber threats, Small and Medium Enterprises (SMEs) require tailored cybersecurity solutions. This research introduces and validates a Lightweight Zero-Trust Architecture (LZTA) specifically designed for SMEs. The proposed LZTA effectively integrates contextual access verification, multi-factor authentication, and role-based access control to ensure robust security without imposing excessive costs. Crucially, rigorous benchmarking demonstrated that the LZTA manages high-concurrency loads while significantly outperforming conventional and open-source Zero-Trust baselines in both response time and throughput. This work delivers a practical and high-performance blueprint for SMEs to adopt Zero-Trust principles, effectively balancing robust security with the operational constraints of smaller organisations.
Authored by Laurence Banda and Etienne Alain Feukeu
Issued in JTDE - Vol 13, No 3 - September 2025
The advent of 5G wireless technologies has created new opportunities and challenges for mobile operators in emerging markets. However, the disruptive nature of 5G networks is likely to transform existing value chains and impact the current mobile operator-centric ecosystem, rendering traditional business models inadequate. The introduction of 5G networks therefore requires the adoption of new business models or the reconfiguration of existing ones to ensure that mobile operators can achieve both economic value and technological innovation in a sustainable way. This study investigates the factors that impact business models of mobile operators in emerging markets as a result of 5G deployment. The study was conducted using the qualitative research method by adopting an interpretivist research philosophy. Primary data was collected inductively through a case study approach with 10 semi-structured online interviews conducted in 8 emerging markets in the Sub-Saharan Africa region. The results show that when 5G is commercially deployed, several aspects, including internal, external and hybrid factors impact the business models of mobile operators.
Authored by Lucia Palacios-Moya, María Camila Bermeo-Giraldo, John Alexander Arenas Lozano, Alejandro Valencia-Arias, and Paula Andrea Rodríguez-Correa
Issued in JTDE - Vol 13, No 3 - September 2025
Small and medium-sized enterprises (SMEs) are particularly susceptible to cyber-attacks, which can have considerable ramifications for both the organisation and the global economy. These include, for example, phishing, ransomware, denial-of-service attacks, malware and Trojans. Notwithstanding the latent nature of the problem, there remains a research gap in the study of cyber-attacks among organisations. The objective of this research is to examine the factors that influence the occurrence of cyber-attacks on SMEs in a developing country. To this end, a quantitative study was conducted. A total of 112 surveys were collected and analysed using SmartPLS 4 software, with the aid of a Partial Least Squares PLS-SEM proposed and developed. The findings indicate that a significant proportion of SMEs, 33%, have experienced a cyber-attack. Furthermore, the study identified the two most significant factors influencing cyber-attacks on SMEs: human talent and resources. Furthermore, the study emphasised the importance of cyber awareness, supplier relationships and organisational cybersecurity preparedness. These findings have practical implications for small and medium-sized enterprises (SMEs), the education sector, and the closing of the research gap concerning cyber-attacks in these organisations. This study makes a contribution to existing knowledge about the information security challenges faced by small businesses in emerging economies.
Authored by Anand R Navaratna and Deepak Saxena
Issued in JTDE - Vol 13, No 3 - September 2025
User-centric development of digital applications must integrate user feedback, developer channels, and regulatory compliance, yet lacks a standardised framework. The rapid rise of AI exacerbates auditing and governance challenges, with self-regulation prevailing but requiring scrutiny of user and developer concerns. This paper analyses the top 10 AI chatbot apps on Google Play Store via a three-prong approach. First, sentiment analysis of 117,353 user reviews using two algorithms reveals sentiments on policy and governance. Second, evaluation of 15 preset developer compliance parameters shows self-declared adherence. Third, comparative results indicate only 69% compliance, despite these apps' high popularity and downloads. Users prioritise experience quality, while developers emphasise service quality. The study exposes self-regulation gaps in AI chatbots, advocating for a standard compliance score on app stores and enhanced citizen digital awareness to bridge divides.
Authored by Ian Campbell
Issued in JTDE - Vol 13, No 3 - September 2025
This paper is a comment on the background to the two historical papers reproduced in “Automation of Directory Assistance” in this issue. The experience of this author is that, despite a rapid decline in the service quality and mounting operating costs, Telecom was slow to act on automation of the Directory Assistance Service, did not fully exploit the advantages of the automated system, and provided a Directory Assistance Service that was clearly inferior to world’s best practice. Some benchmarking results are provided as evidence.