表紙
市場調査レポート

M2Mにおける不正および収益漏出防止市場:推移と予測

M2M Fraud and Revenue Leakage Market and Forecast 2013 - 2018

発行 Mind Commerce 商品コード 321189
出版日 ページ情報 英文 156 Pages
納期: 即日から翌営業日
価格
詳細については [お問い合わせ] ボタンよりお問い合わせ下さい。
Back to Top
M2Mにおける不正および収益漏出防止市場:推移と予測 M2M Fraud and Revenue Leakage Market and Forecast 2013 - 2018
出版日: 2013年10月01日 ページ情報: 英文 156 Pages
概要

M2Mの大幅な成長が見込まれる中で、M2Mのエコシステムの各所で起こりうる不正および収益漏出の可能性に焦点を当て、これらへの対策を講ずる必要があります。

当レポートでは、M2Mにおける不正および収益漏出防止のための各種ソリューションの市場について調査し、通信事業者による不正管理戦略、M2Mにおけるリスク管理と収益保証に関する課題、主なソリューションと提供事業者、M2Mソリューションの市場規模の推移と予測などをまとめています。

第1章 エグゼクティブサマリー

第2章 通信事業者による不正管理:概要

  • 通信事業者による不正管理
  • 不正管理戦略
    • エンパワーメント
    • 管理の範囲
    • オーナーシップ
    • 責任の溝
  • 不正管理戦略の基礎
    • プロセス
    • 技術
  • 不正管理システム(FMS)
    • 不正管理システム(FMS)のメリット
    • M2Mにおける不正管理

第3章 M2Mの概要

  • M2Mの導入
    • モバイル事業者の役割
    • M2Mとスマートグリッド
    • 輸送
    • 道路交通
    • パーキングメーター
    • コンテナ
    • セキュリティシステム
    • 医療
    • "ビッグデータ"アナリティクス
  • M2M技術
    • セルラー技術
    • 衛星
    • WI-FI
    • BLUETOOTH
    • ZIGBEE
    • 支払い許容範囲の位置情報
    • 低コスト専用センサー
    • 支払い許容範囲の統合専用デバイス

第4章 M2Mにおけるリスク管理と収益保証の課題

  • 収益保証
    • SIMカードの紛失
    • 問題
    • ソリューション
  • リスク管理
    • M2Mにおけるセキュリティ
    • エンドツーエンドのセキュリティのニーズ
  • M2Mセキュリティ:各種産業にとっての鍵
    • M2Mにおけるプライバシー

第5章 企業とソリューション

  • NETEZZA / IBM
  • TEREDATA
  • ORACLE
  • SAP
  • SAS
  • AGILIS INTERNATIONAL
  • TABLEAU
  • WEDO TECHNOLOGIES
  • TEOCO
  • CVIDYA
  • MACH
  • 総合分析
  • 市場調査結果

第6章 市場の展望

  • M2Mソリューション市場の成長推進因子の分析
  • 世界のセルラーM2Mモジュール価格の推移と予測
  • 世界のM2M市場の販売収益のの推移と予測
  • 世界のM2Mソフトウェア市場の収益の推移と予測
  • 世界のM2M市場の競合環境
  • M2M不正・収益漏出市場の展望
  • M2Mのビジネスインパクト

図表

目次

The forecast for Machine-to-Machine (M2M) is set to nearly triple through 2018. One of the great allures of M2M is the many and varied use cases including everything from smart meters, interactive kiosks, surveillance cameras, and more. The business drivers include everything from proactive maintenance, production assurance, theft reduction, productivity improvement, etc.

It important to note that the steep growth curve is yet to begin, as M2M is expected to take off significantly with the so-called Internet of Things (IoT). M2M has become much more complex and “smart” due to major advances in semiconductor and software with the potential to be embedded in virtually any asset or object requiring monitoring and control throughout the enterprise. By way of example, industry giant Cisco is aggressively forecasting about 50 billion devices will be connected by 2020, after coming out with an earlier analysis in January that claimed 8.7 billion connected devices in 2012.

With this dramatic growth expectation, there is a critical need to focus on potential lost revenue and fraud that may occur within various portions of the M2M ecosystem. This research assesses risk management issues in M2M, key companies, solutions, and market positioning. The report provides a market driver analysis along with anticipated revenues through 2020.

Table of Contents

1.0. EXECUTIVE SUMMARY

2.0. OVERVIEW OF TELECOM FRAUD MANAGEMENT

  • 2.1. FRAUD MANAGEMENT FOR TELECOM OPERATORS
  • 2.2. FRAUD MANAGEMENT STRATEGY
    • 2.2.1. EMPOWERMENT
    • 2.2.2. CONTROLS COVERAGE
    • 2.2.3. OWNERSHIP
    • 2.2.4. RESPONSIBILITY GAP
  • 2.3. BASICS OF FRAUD MANAGEMENT STRATEGIES
    • 2.3.1. PEOPLE
    • 2.3.2. PROCESS
    • 2.3.3. TECHNOLOGY
  • 2.4. FRAUD MANAGEMENT SYSTEM (FMS)
    • 2.4.1. ADVANTAGES OF FRAUD MANAGEMENT SYSTEM (FMS)
    • 2.4.2. FRAUD MANAGEMENT IN M2M

3.0. OVERVIEW OF M2M

  • 3.1. M2M APPLICATIONS
    • 3.1.1. MOBILE OPERATORS ROLE
    • 3.1.2. M2M AND SMART GRID
    • 3.1.3. TRANSPORTATION
    • 3.1.4. ROAD TRAFFIC
    • 3.1.5. PARKING METERS
    • 3.1.6. CONTAINER
    • 3.1.7. SECURITY SYSTEMS
    • 3.1.8. HEALTHCARE
    • 3.1.9. “BIG DATA” ANALYTICS
  • 3.2. M2M TECHNOLOGIES
    • 3.2.1. CELLULAR TECHNOLOGIES
    • 3.2.2. SATELLITE
    • 3.2.3. WI-FI
    • 3.2.4. BLUETOOTH
    • 3.2.5. ZIGBEE
    • 3.2.6. AFFORDABLE GEO-LOCATION
    • 3.2.7. LOWER COST SPECIALIZED SENSORS
    • 3.2.8. AFFORDABLE INTEGRATED, SPECIAL-PURPOSE DEVICES

4.0. RISK MANAGEMENT AND REVENUE ASSURANCE ISSUES IN M2M

  • 4.1. REVENUE ASSURANCE
    • 4.1.1. LOST SIM CARDS
    • 4.1.2. THE PROBLEM
    • 4.1.3. SOLUTIONS
  • 4.2. RISK MANAGEMENT
    • 4.2.1. SECURITY IN M2M
    • 4.2.2. NEED FOR END-TO-END SECURITY
  • 4.3. M2M SECURITY IS KEY TO INDUSTRY VERTICALS
    • 4.3.1. PRIVACY IN M2M

5.0. COMPANIES AND SOLUTIONS

  • 5.1. NETEZZA / IBM
    • 5.1.1. COMPANY OVERVIEW
    • 5.1.2. LOCATION
    • 5.1.3. INDUSTRY CLASSIFICATION
    • 5.1.4. BUSINESS DESCRIPTION
    • 5.1.5. COMPANY HISTORY
    • 5.1.6. KEY PEOPLE
    • 5.1.7. COMPANY UPDATES
    • 5.1.8. KEY DEVELOPMENTS
    • 5.1.9. MERGERS AND ACQUISITIONS
    • 5.1.10. COMPANY ANALYSIS
    • 5.1.11. SWOT ANALYSIS
    • 5.1.12. STRENGTHS
    • 5.1.13. WEAKNESSES
    • 5.1.14. OPPORTUNITIES
    • 5.1.15. THREATS
    • 5.1.16. INTERVIEW WITH MIND COMMERCE
    • 5.1.17. COMPANY'S ANALYSIS
    • 5.1.18. NETEZZA AND M2M FRAUD AND REVENUE LEAKAGE
  • 5.2. TEREDATA
    • 5.2.1. COMPANY OVERVIEW
    • 5.2.2. LOCATION
    • 5.2.3. INDUSTRY CLASSIFICATION
    • 5.2.4. BUSINESS DESCRIPTION
    • 5.2.5. COMPANY HISTORY
    • 5.2.6. KEY PEOPLE
    • 5.2.7. COMPANY UPDATES
    • 5.2.8. KEY DEVELOPMENTS
    • 5.2.9. MERGERS AND ACQUISITIONS
    • 5.2.10. COMPANY ANALYSIS
    • 5.2.11. SWOT ANALYSIS
    • 5.2.12. STRENGTHS
    • 5.2.13. WEAKNESSES
    • 5.2.14. OPPORTUNITIES
    • 5.2.15. THREATS
    • 5.2.16. COMPANY'S BUSINESS STRATEGY
    • 5.2.1. INTERVIEW WITH MIND COMMERCE
    • 5.2.2. COMPANY'S ANALYSIS
  • 5.3. ORACLE
    • 5.3.1. COMPANY INFORMATION
    • 5.3.2. LOCATION
    • 5.3.1. BUSINESS DESCRIPTION
    • 5.3.2. COMPANY HISTORY
    • 5.3.3. KEY PEOPLE
    • 5.3.4. MERGERS AND ACQUISITIONS
    • 5.3.5. COMPANY ANALYSIS
    • 5.3.6. SWOT ANALYSIS
    • 5.3.7. STRENGTHS
    • 5.3.8. WEAKNESSES
    • 5.3.9. OPPORTUNITIES
    • 5.3.10. THREATS
    • 5.3.1. COMPANY'S ANALYSIS
  • 5.4. SAP
    • 5.4.1. COMPANY OVERVIEW
    • 5.4.2. LOCATION
    • 5.4.3. INDUSTRY CLASSIFICATION
    • 5.4.4. BUSINESS DESCRIPTION
    • 5.4.5. COMPANY HISTORY
    • 5.4.6. KEY PEOPLE
    • 5.4.7. MERGERS AND ACQUISITIONS
    • 5.4.8. COMPANY ANALYSIS
    • 5.4.9. SWOT ANALYSIS
    • 5.4.10. STRENGTHS
    • 5.4.11. WEAKNESSES
    • 5.4.12. OPPORTUNITIES
    • 5.4.13. THREATS
    • 5.4.14. COMPANY'S BUSINESS STRATEGY
    • 5.4.1. INTERVIEW WITH MIND COMMERCE
    • 5.4.2. COMPANY'S ANALYSIS
  • 5.5. SAS
    • 5.5.1. COMPANY OVERVIEW
    • 5.5.2. LOCATION
    • 5.5.3. INDUSTRY CLASSIFICATION
    • 5.5.4. BUSINESS DESCRIPTION
    • 5.5.5. COMPANY HISTORY
    • 5.5.6. KEY PEOPLE
    • 5.5.7. COMPANY UPDATES
    • 5.5.8. MERGERS AND ACQUISITIONS
    • 5.5.9. COMPANY ANALYSIS
    • 5.5.10. SWOT ANALYSIS
    • 5.5.11. STRENGTHS
    • 5.5.12. WEAKNESSES
    • 5.5.13. OPPORTUNITIES
    • 5.5.14. THREATS
    • 5.5.1. INTERVIEW WITH MIND COMMERCE
    • 5.5.2. COMPANY'S ANALYSIS
  • 5.6. AGILIS INTERNATIONAL
    • 5.6.1. COMPANY OVERVIEW
    • 5.6.2. LOCATION
    • 5.6.3. INDUSTRY CLASSIFICATION
    • 5.6.4. BUSINESS DESCRIPTION
    • 5.6.5. KEY PEOPLE
    • 5.6.6. COMPANY UPDATES
    • 5.6.7. MERGERS AND ACQUISITIONS
    • 5.6.8. COMPANY ANALYSIS
    • 5.6.9. SWOT ANALYSIS
    • 5.6.10. STRENGTHS
    • 5.6.11. WEAKNESSES
    • 5.6.12. OPPORTUNITIES
    • 5.6.13. THREATS
    • 5.6.14. COMPANY'S BUSINESS STRATEGY
    • 5.6.1. INTERVIEW WITH MIND COMMERCE
    • 5.6.2. COMPANY'S ANALYSIS
  • 5.7. TABLEAU
    • 5.7.1. COMPANY OVERVIEW
    • 5.7.2. LOCATION
    • 5.7.3. INDUSTRY CLASSIFICATION
    • 5.7.4. BUSINESS DESCRIPTION
    • 5.7.5. COMPANY HISTORY
    • 5.7.6. KEY PEOPLE
    • 5.7.7. COMPANY ANALYSIS
    • 5.7.8. SWOT ANALYSIS
    • 5.7.9. STRENGTHS
    • 5.7.10. WEAKNESSES
    • 5.7.11. OPPORTUNITIES
    • 5.7.12. THREATS
    • 5.7.13. COMPANY'S BUSINESS STRATEGY
    • 5.7.1. INTERVIEW WITH MIND COMMERCE
    • 5.7.2. COMPANY'S ANALYSIS
  • 5.8. WEDO TECHNOLOGIES
    • 5.8.1. COMPANY OVERVIEW
    • 5.8.2. LOCATION
    • 5.8.3. INDUSTRY CLASSIFICATION
    • 5.8.4. BUSINESS DESCRIPTION
    • 5.8.5. COMPANY HISTORY
    • 5.8.6. KEY PEOPLE
    • 5.8.7. MERGERS AND ACQUISITIONS
    • 5.8.8. COMPANY ANALYSIS
    • 5.8.9. SWOT ANALYSIS
    • 5.8.10. STRENGTHS
    • 5.8.11. WEAKNESSES
    • 5.8.12. OPPORTUNITIES
    • 5.8.13. THREATS
    • 5.8.14. INTERVIEW WITH MIND COMMERCE
  • 5.9. TEOCO
    • 5.9.1. COMPANY OVERVIEW
    • 5.9.2. LOCATION
    • 5.9.3. INDUSTRY CLASSIFICATION
    • 5.9.4. BUSINESS DESCRIPTION
    • 5.9.5. COMPANY HISTORY
    • 5.9.6. KEY PEOPLE
    • 5.9.7. MERGERS AND ACQUISITIONS
    • 5.9.8. COMPANY ANALYSIS
    • 5.9.9. SWOT ANALYSIS
    • 5.9.10. STRENGTHS
    • 5.9.11. WEAKNESSES
    • 5.9.12. OPPORTUNITIES
    • 5.9.13. THREATS
    • 5.9.1. COMPANY'S BUSINESS STRATEGY
    • 5.9.1. INTERVIEW WITH MIND COMMERCE
  • 5.10. CVIDYA
    • 5.10.1. COMPANY OVERVIEW
    • 5.10.2. LOCATION
    • 5.10.1. INDUSTRY CLASSIFICATION
    • 5.10.2. BUSINESS DESCRIPTION
    • 5.10.3. SERVICE OFFERINGS
    • 5.10.4. KEY DEVELOPMENTS
    • 5.10.5. SWOT ANALYSIS
  • 5.11. MACH
    • 5.11.1. COMPANY OVERVIEW
    • 5.11.2. LOCATION
    • 5.11.3. INDUSTRY CLASSIFICATION
    • 5.11.4. BUSINESS DESCRIPTION
    • 5.11.5. COMPANY HISTORY
    • 5.11.6. KEY PEOPLE
    • 5.11.7. MERGERS AND ACQUISITIONS
    • 5.11.8. COMPANY ANALYSIS
    • 5.11.9. SWOT ANALYSIS
    • 5.11.10. STRENGTHS
    • 5.11.11. WEAKNESSES
    • 5.11.12. OPPORTUNITIES
    • 5.11.13. THREATS
    • 5.11.14. COMPANY'S BUSINESS STRATEGY
    • 5.11.1. INTERVIEW WITH MIND COMMERCE
  • 5.12. OVERALL ANALYSIS
  • 5.13. MARKET SURVEY RESULTS

6.0. MARKET OUTLOOK

  • 6.1. GROWTH DRIVER ANALYSIS OF M2M SOLUTION MARKET
    • 6.1.1. EMERGENCE OF ALLIANCES AND MARKET CONSOLIDATIONS WILL HELP END CONSUMER
    • 6.1.2. UNIFIED M2M DEVELOPMENT PLATFORMS
    • 6.1.3. GROWTH IN CONNECTED CONSUMER ELECTRONIC DEVICES
    • 6.1.4. LAUNCH OF NEW HOME AUTOMATION PRODUCTS AND DIY PRODUCTS
    • 6.1.5. GROWTH IN POTENTIAL END-USE APPLICATIONS WILL WIDEN M2M MARKET SCOPE
    • 6.1.6. SMART GRIDS MARKET WILL BE A MAJOR CONTRIBUTOR
    • 6.1.7. SATELLITE M2M COMMUNICATIONS GROWTH: REVENUE PROJECTION 2013-2018
    • 6.1.8. STANDARDS FOR CONNECTED CARS AND DEMAND FOR TELEMATICS SEGMENT
    • 6.1.9. GROWTH IN THE VAS APPLICATIONS MARKET
    • 6.1.10. DEPLOYMENT OF INDUSTRIAL WSNS TO BOOST OVERALL MARKET
  • 6.2. GLOBAL CELLULAR M2M MODULE PRICING 2014- 2018
  • 6.3. GLOBAL M2M MARKET SALES REVENUE 2014 - 2018
  • 6.4. GLOBAL M2M SOFTWARE MARKET REVENUE 2014 - 2018
  • 6.5. GLOBAL M2M MARKET COMPETITIVE LANDSCAPE 2013
  • 6.6. MARKET OUTLOOK FOR M2M FRAUD AND REVENUE LEAKAGE
  • 6.7. M2M MARKET GLOBAL BUSINESS IMPACT (BI)
    • 6.7.1. APAC M2M BUSINESS IMPACT REVENUE 2016-2020
    • 6.7.2. GLOBAL M2M BUSINESS IMPACT REVENUE IN REGIONS 2016 - 2020
    • 6.7.3. CHINA M2M BUSINESS IMPACT REVENUE 2016-2020
    • 6.7.4. JAPAN M2M BUSINESS IMPACT REVENUE 2016 - 2020
    • 6.7.5. INDIA M2M BUSINESS IMPACT REVENUE 2016-2020
    • 6.7.6. SOUTH KOREA M2M BUSINESS IMPACT REVENUE 2012-2020

Figures

  • Figure 1: M2M as a Fundamental Change Agent
  • Figure 2: Cellular Data Transmissions from Fixed or Mobile Assets
  • Figure 3: Sensors Networks in Practice
  • Figure 4: Wireless Sensor Communications Module by Libelium
  • Figure 5: Libelium's pre-configured sensor board optimized for agriculture applications
  • Figure 6: Global M2M Market: End Use Applications
  • Figure 7: Conceptual Rending of M2M Platform
  • Figure 8: Global Smart Meter M2M Connections units 2010 - 2020
  • Figure 9: Global Satellite M2M Market Revenue 2011 - 2016
  • Figure 10: Month to Month Timeline Track of oneM2M Standard 2011-2012
  • Figure 11: Comparison between High Value and Current Operator Service Model
  • Figure 12: Global M2M Market, VAS Applications Share by % 2013
  • Figure 13: Global Cellular M2M Module Pricing ($) 2010-2014
  • Figure 14: Global Cellular M2M Module Pricing ($) 2014-2018
  • Figure 15: Global M2M Market Sales Revenues in USD $ billion 2014 - 2018
  • Figure 16: Graphical Presentation of Global M2M Market, Competitive Landscape by % 2013
  • Figure 17: Asia Pacific M2M Business Impact Revenues 2012 - 2020
  • Figure 18: Global M2M Business Impact by Region 2012 - 2020
  • Figure 19: China M2M Business Impact Revenues by Industry 2012 - 2020
  • Figure 20: Japan M2M Business Impact Revenues by Industry 2012 - 2020
  • Figure 21: India M2M Business Impact Revenues by Industry 2012 - 2020
  • Figure 22: Korea M2M Business Impact Revenues by Industry 2012 - 2020

Tables

  • Table 1: OVERVIEW OF MAIN WIRELESS COMMUNICATIONS USED IN M2M
  • Table 2: Bluetooth and ZigBee Comparison
  • Table 3: Major M&A Events in Global M2M Market 2010 - 2012
  • Table 4: Global Smart Meter M2M Connections Unit in Million 2010 - 2020
  • Table 5: Global Satellite M2M Market Revenue in USD $ billion 2011 - 2016
  • Table 6: Global Satellite M2M Operator Companies
  • Table 7: VAS Applications Share by % in Global M2M Market 2013
  • Table 8: Global Cellular M2M Module Pricings in USD $ 2014- 2018
  • Table 9: Global M2M Market Sales Revenues in USD $ billion 2011 - 2017
  • Table 10: Global M2M Software Market Revenues in USD $ million 2014 - 2018
  • Table 11: Global M2M Market, Competitive Landscape by % 2013
  • Table 12: Asia Pacific M2M Business Impact Revenues in USD $ billion 2016 - 2020
  • Table 13: Global M2M Business Impact Revenues by Region $B 2016 - 2020
  • Table 14: China M2M Business Impact Revenues by Industry in USD $ billion 2016 - 2020
  • Table 15: Japan M2M Business Impact Revenues by Industry 2016 - 2020
  • Table 16: India M2M Business Impact Revenues by Industry, 2016 - 2020
  • Table 17: Korea M2M Business Impact Revenues in USD $ billion by Industry 2016 - 2020
Back to Top