e3value user guide
In a fraud scenario, we mark some actors as trusted. All actors have agreed on the value model, but non-trusted actors may do things that violate the value model. Trusted actors always conform to the value model.
Given a selection of trusted actors, a fraud scenario contains three elements not present in a normal market scenario (figure 8.2):
In the fraud scenario of figure 8.2, the three fraudulent activities are present.. In this scenario, Provider A is trusted. The model has been quantified in such a way that User B now has a revenue-sharing subscription with Provider B, in which User B receives a small share of the revenue that Provider B gets from the interconnection fee. This is unknown to Provider A. User B colludes with User A by by sharing the revenue that it receives from Provider B.
With a flat-rate subscription, User A can call people for a flat rate per month, within a fair use policy (e.g. at most 500 calls per month). In our scenario, User A calls User B the maximum number of times within its fair use restriction and colludes with User B in sharing the revenue that User B receives from Provider B. On top of that, User A does not pay Provider A for the flat rate subscription.