CONTENTS

 1     Introduction
        1.1     Purpose and scope
 2     References
 3     Definitions
        3.5     Role-related definitions
 4     Abbreviations and acronyms
        4.1     Conventions
 5     Security Management Service
        5.1     Security issues
        5.2     Management Service description
 6     Management high-level requirements
        6.1     Management Service overview
        6.2     Telecommunication resources
                  6.2.1     Fraud Information Gathering System (FIGS)
                  6.2.2     Visited Network
                  6.2.3     Home Network Fraud Detection System (HN-FDS)
        6.3     Fraud Information Gathering use cases
                  6.3.1     Fraud Alert use case
                  6.3.2     Activate Information Gathering use case
                  6.3.3     Report FIGS use case
                  6.3.4     Deactivate Information Gathering use case
                  6.3.5     Modify FIGS Report use case
                  6.3.6     Advise Suspend FIGS Monitoring use case
                  6.3.7     Advise Resume FIGS Monitoring use case
 7     Management Functions analysis
        7.1     Fraud Information Gathering Function set
        7.2     Object Classes and State Chart
        7.3     Fraud Information Gathering functions and sequence diagrams
                  7.3.1     Fraud Alert function
                  7.3.2     Activate Information Gathering function
                  7.3.3     Report FIGS function
                  7.3.4     Deactivate Information Gathering function
                  7.3.5     Modify FIGS Report function
                  7.3.6     Advise Suspend FIGS Monitoring function
                  7.3.7     Advise Resume FIGS Monitoring function
Annex A – Fraud Management criteria
Annex B – Information transferred by the Visited Network