A Framework for Measuring the Deployment of Internet Protocols

2015 ◽  
pp. 809-835
Author(s):  
Tapio Levä ◽  
Antti Riikonen ◽  
Juuso Töyli ◽  
Heikki Hämmäinen

Internet protocols spread to potential adopters through several successive phases of implementation, commercialization, acquisition, and adoption of the protocol. This process of protocol deployment involves several stakeholders and varies depending on the deployment environment and the protocol in question. This complexity and the lack of comprehensive measurement studies call for a further conceptualization of measuring protocol diffusion along the whole deployment process. Therefore, this article develops a framework for measuring the deployment of Internet protocols, consisting of deployment steps, deployment models, deployment measures, and data sources. The measures are further linked to each other through deployment gaps and delays. In order to demonstrate the framework, it is used to assess how a set of pre-installed protocols spread in the Finnish mobile market. The framework highlights the differences between the deployment models and the importance to use both the deployment measures and gaps in the analysis of protocol success. Furthermore, the illustrative results indicate that protocol deployment is driven by applications, and show the existence of large deployment gaps between the protocol possession and usage. The results are relevant especially to researchers interested in holistically analyzing protocol deployment and protocol developers for measuring and improving the success of their protocols.

Author(s):  
Tapio Levä ◽  
Antti Riikonen ◽  
Juuso Töyli ◽  
Heikki Hämmäinen

Internet protocols spread to potential adopters through several successive phases of implementation, commercialization, acquisition, and adoption of the protocol. This process of protocol deployment involves several stakeholders and varies depending on the deployment environment and the protocol in question. This complexity and the lack of comprehensive measurement studies call for a further conceptualization of measuring protocol diffusion along the whole deployment process. Therefore, this article develops a framework for measuring the deployment of Internet protocols, consisting of deployment steps, deployment models, deployment measures, and data sources. The measures are further linked to each other through deployment gaps and delays. In order to demonstrate the framework, it is used to assess how a set of pre-installed protocols spread in the Finnish mobile market. The framework highlights the differences between the deployment models and the importance to use both the deployment measures and gaps in the analysis of protocol success. Furthermore, the illustrative results indicate that protocol deployment is driven by applications, and show the existence of large deployment gaps between the protocol possession and usage. The results are relevant especially to researchers interested in holistically analyzing protocol deployment and protocol developers for measuring and improving the success of their protocols.


Author(s):  
Tapio Levä ◽  
Antti Riikonen ◽  
Juuso Töyli ◽  
Heikki Hämmäinen

Internet protocols and traffic are the foundation of the internet and reflect the on-going digital transformation in the society. Internet protocols spread to potential adopters through several successive phases of implementation, commercialization, acquisition, and adoption. This protocol deployment process involves several stakeholders and varies depending on the deployment environment and the protocol in question. This complexity and the lack of comprehensive measurement studies call for a further conceptualization of measuring protocol diffusion along the whole deployment process. Therefore, this chapter develops a framework for measuring the deployment of internet protocols, consisting of deployment steps, deployment models, deployment measures, and data sources. The illustrative results indicate that protocol deployment is driven by applications, and show the existence of large deployment gaps between the protocol possession and usage.


2012 ◽  
Author(s):  
M. Riemer ◽  
M. M. Athay ◽  
L. Bickman ◽  
C. Breda ◽  
S. D. Kelley ◽  
...  

2012 ◽  
Author(s):  
Leigh Z. Gilchrist ◽  
Alexandra Ernst
Keyword(s):  

Author(s):  
I. D. Rudinskiy ◽  
D. Ya. Okolot

The article discusses aspects of the formation of information security culture of college students. The relevance of the work is due to the increasing threats to the information security of the individual and society due to the rapid increase in the number of information services used. Based on this, one of the important problems of the development of the information society is the formation of a culture of information security of the individual as part of the general culture in its socio-technical aspect and as part of the professional culture of the individual. The study revealed the structural components of the phenomenon of information security culture, identified the reasons for the interest in the target group of students. It justifies the need for future mid-level specialists to form an additional universal competency that ensures the individual’s ability and willingness to recognize the need for certain information, to identify and evaluate the reliability and reliability of data sources. As a result of the study, recommendations were formulated on the basis of which a culture of information security for college students can be formed and developed and a decomposition of this process into enlarged stages is proposed. The proposals on the list of disciplines are formulated, within the framework of the study of which a culture of information security can develop. The authors believe that the recommendations developed will help future mid-level specialists to master the universal competency, consisting in the ability and willingness to recognize the need for certain information, to identify and evaluate the reliability and reliability of data sources, as well as to correctly access the necessary information and its further legitimate use, which ultimately forms a culture of information security.


Sign in / Sign up

Export Citation Format

Share Document