Table of Contents

 1     Scope          
 2     References
 3     Definitions 
        3.1     Terms defined elsewhere        
        3.2     Terms defined in this Recommendation            
 4     Abbreviations and acronyms             
 5     Conventions             
 6     Overview of voice spam      
        6.1     Voice communication scenarios            
        6.2     Characteristics of voice spam  
 7     Technologies for countering voice spam      
        7.1     General aspects           
        7.2     Network-side technologies     
        7.3     User-side technologies             
        7.4     Collaboration mechanism         
        7.5     Proposed solutions     
Appendix I – Comprehensive measures on countering voice spam    
Appendix II – A suggested solution for interactive verification    
Appendix III – Policy considerations in countering voice spam    
      III.1     Users 
      III.2     Operators        
      III.3     Management entities and third-party organizations     
Bibliography