1 Scope
2 References
3 Definitions
3.1 Terms defined elsewhere
3.2 Terms defined in this Recommendation
4 Abbreviations and acronyms
5 Conventions
6 Overview of voice spam
6.1 Voice communication scenarios
6.2 Characteristics of voice spam
7 Technologies for countering voice spam
7.1 General aspects
7.2 Network-side technologies
7.3 User-side technologies
7.4 Collaboration mechanism
7.5 Proposed solutions
Appendix I – Comprehensive measures on countering voice spam
Appendix II – A suggested solution for interactive verification
Appendix III – Policy considerations in countering voice spam
III.1 Users
III.2 Operators
III.3 Management entities and third-party organizations
Bibliography