{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T18:13:10Z","timestamp":1654107190475},"reference-count":57,"publisher":"IGI Global","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,1,1]]},"abstract":"<p>Internet protocols spread to potential adopters through several successive phases of implementation, commercialization, acquisition, and adoption of the protocol. This process of protocol deployment involves several stakeholders and varies depending on the deployment environment and the protocol in question. This complexity and the lack of comprehensive measurement studies call for a further conceptualization of measuring protocol diffusion along the whole deployment process. Therefore, this article develops a framework for measuring the deployment of Internet protocols, consisting of deployment steps, deployment models, deployment measures, and data sources. The measures are further linked to each other through deployment gaps and delays. In order to demonstrate the framework, it is used to assess how a set of pre-installed protocols spread in the Finnish mobile market. The framework highlights the differences between the deployment models and the importance to use both the deployment measures and gaps in the analysis of protocol success. Furthermore, the illustrative results indicate that protocol deployment is driven by applications, and show the existence of large deployment gaps between the protocol possession and usage. The results are relevant especially to researchers interested in holistically analyzing protocol deployment and protocol developers for measuring and improving the success of their protocols.<\/p>","DOI":"10.4018\/ijitsr.2014010103","type":"journal-article","created":{"date-parts":[[2014,7,28]],"date-time":"2014-07-28T18:42:25Z","timestamp":1406572945000},"page":"38-62","source":"Crossref","is-referenced-by-count":0,"title":["A Framework for Measuring the Deployment of Internet Protocols"],"prefix":"10.4018","volume":"12","author":[{"given":"Tapio","family":"Lev\u00e4","sequence":"first","affiliation":[{"name":"Department of Communications and Networking, Aalto University, Espoo, Finland"}]},{"given":"Antti","family":"Riikonen","sequence":"additional","affiliation":[{"name":"Department of Communications and Networking, Aalto University, Espoo, Finland"}]},{"given":"Juuso","family":"T\u00f6yli","sequence":"additional","affiliation":[{"name":"Department of Marketing and International Business, Turku School of Economics, Turku, Finland"}]},{"given":"Heikki","family":"H\u00e4mm\u00e4inen","sequence":"additional","affiliation":[{"name":"Department of Communications and Networking, Aalto University, Espoo, Finland"}]}],"member":"2432","reference":[{"key":"ijitsr.2014010103-0","doi-asserted-by":"publisher","DOI":"10.1111\/j.1468-2370.2006.00119.x"},{"key":"ijitsr.2014010103-1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2004.832973"},{"key":"ijitsr.2014010103-2","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.45.12.1613"},{"key":"ijitsr.2014010103-3","doi-asserted-by":"publisher","DOI":"10.1257\/jep.8.2.117"},{"key":"ijitsr.2014010103-4","doi-asserted-by":"publisher","DOI":"10.1016\/S0378-7206(00)00065-3"},{"key":"ijitsr.2014010103-5","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2005.850224"},{"key":"ijitsr.2014010103-6","doi-asserted-by":"crossref","unstructured":"Colitti, L., Gunderson, S. H., Kline, E., & Refice, T. (2010). Evaluating IPv6 adoption in the Internet. In Proc. Passive and Active Measurement (pp. 141\u2013150). Springer Berlin Heidelberg.","DOI":"10.1007\/978-3-642-12334-4_15"},{"key":"ijitsr.2014010103-7","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.36.2.123"},{"key":"ijitsr.2014010103-8","unstructured":"Eggert, L. (2013). Deployment trends of IPv6, SIP, XMPP, DNSSEC, DKIM, and SPF. Retrieved from http:\/\/eggert.org\/"},{"key":"ijitsr.2014010103-9","doi-asserted-by":"publisher","DOI":"10.1007\/s00191-004-0220-1"},{"key":"ijitsr.2014010103-10","doi-asserted-by":"publisher","DOI":"10.1287\/isre.10.3.255"},{"key":"ijitsr.2014010103-11","unstructured":"Ficora. (2012). Consumer survey on communications services. Retrieved from https:\/\/www.viestintavirasto.fi\/en\/aboutthesector\/studiesandsurveys\/viestintapalvelujenkuluttajatutkimus.html"},{"key":"ijitsr.2014010103-12","doi-asserted-by":"publisher","DOI":"10.1080\/09537325.2011.592270"},{"key":"ijitsr.2014010103-13","first-page":"134","article-title":"3GPP mobile multimedia streaming standards.","author":"F.Gabin","year":"2010","journal-title":"IEEE Signal Processing Magazine"},{"key":"ijitsr.2014010103-14","doi-asserted-by":"publisher","DOI":"10.1057\/jit.2009.19"},{"key":"ijitsr.2014010103-15","doi-asserted-by":"publisher","DOI":"10.1111\/j.1365-2575.2004.00170.x"},{"key":"ijitsr.2014010103-16","unstructured":"Huston, G. (2013). IPv6 reports. Retrieved from http:\/\/bgp.potaroo.net\/index-v6.html"},{"key":"ijitsr.2014010103-17","doi-asserted-by":"publisher","DOI":"10.1007\/BF01202301"},{"key":"ijitsr.2014010103-18","doi-asserted-by":"crossref","unstructured":"Jin, Y., Sen, S., Gu\u00e9rin, R., Hosanagar, K., & Zhang, Z.-L. (2008). Dynamics of competition between incumbent and emerging network technologies. In Proceedings of the 3rd International Workshop on Economics of Networked Systems, Seattle, WA (pp. 49\u201354).","DOI":"10.1145\/1403027.1403039"},{"key":"ijitsr.2014010103-19","doi-asserted-by":"publisher","DOI":"10.1504\/IJAHUC.2005.008023"},{"key":"ijitsr.2014010103-20","doi-asserted-by":"crossref","unstructured":"Joseph, D., Shetty, N., Chuang, J., & Stoica, I. (2007, December 10-13). Modeling the adoption of new network architectures. In Proceedings of International Conference on Emerging Networking Experiments and Technologies (CoNEXT\u201907), New York, NY.","DOI":"10.1145\/1364654.1364661"},{"key":"ijitsr.2014010103-21","doi-asserted-by":"publisher","DOI":"10.1300\/J037v14n03_04"},{"key":"ijitsr.2014010103-22","doi-asserted-by":"publisher","DOI":"10.1086\/261409"},{"key":"ijitsr.2014010103-23","doi-asserted-by":"publisher","DOI":"10.1016\/j.techfore.2011.06.001"},{"key":"ijitsr.2014010103-24","unstructured":"Komu, M., Varjonen, S., Gurtov, A., & Tarkoma, S. (2012). Sockets and beyond: Assessing the source code of network applications. In Proceedings of the Linux Symposium, Ottawa, Canada (pp. 7\u201324)."},{"key":"ijitsr.2014010103-25","doi-asserted-by":"publisher","DOI":"10.1007\/s12599-009-0075-y"},{"key":"ijitsr.2014010103-26","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2012.11.024"},{"key":"ijitsr.2014010103-27","doi-asserted-by":"crossref","unstructured":"Lev\u00e4, T., & Riikonen, A. (2013, September 24-26). Diffusion of Internet protocols \u2013 Measurement framework and empirical analysis of the Finnish mobile market. In Proc. of the 8th IEEE Conference on Standardisation and Innovation in Information Technology (SIIT 2013), Sophia-Antipolis, France.","DOI":"10.1109\/SIIT.2013.6774578"},{"key":"ijitsr.2014010103-28","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2013.07.011"},{"issue":"3","key":"ijitsr.2014010103-29","first-page":"74","article-title":"Fulfilling the promises of CAD.","volume":"33","author":"J. K.Liker","year":"1992","journal-title":"Sloan Management Review"},{"key":"ijitsr.2014010103-30","doi-asserted-by":"publisher","DOI":"10.1108\/10610420210419540"},{"key":"ijitsr.2014010103-31","doi-asserted-by":"crossref","unstructured":"Lyytinen, K., & Damsgaard, J. (2001). What\u2019s Wrong with the diffusion of innovation theory? The case of a complex and networked technology. In Proceedings of the IFIP TC8 WG8.1 Fourth Working Conference on Diffusing Software Products and Process Innovations (pp. 173\u2013190).","DOI":"10.1007\/978-0-387-35404-0_11"},{"key":"ijitsr.2014010103-32","doi-asserted-by":"crossref","unstructured":"Maier, G., Feldmann, A., Paxson, V., & Allman, M. (2009). On dominant characteristics of residential broadband internet traffic. In Proceedings of the 9th ACM SIGCOMM conference on Internet measurement conference (IMC '09). New York, NY: ACM.","DOI":"10.1145\/1644893.1644904"},{"key":"ijitsr.2014010103-33","first-page":"121","article-title":"Evolving core capabilities of the Internet.","volume":"3","author":"J.Marcus","year":"2004","journal-title":"Journal on Telecommunications & High Technology Law"},{"key":"ijitsr.2014010103-34","unstructured":"MINTC. (2004). Mobile services market in Finland 2003, Ministry of Transport and Communications. Retrieved from http:\/\/www.lvm.fi\/fileserver\/24_2004.pdf"},{"key":"ijitsr.2014010103-35","doi-asserted-by":"publisher","DOI":"10.1023\/B:QMEC.0000017034.98302.44"},{"key":"ijitsr.2014010103-36","unstructured":"Open Mobile Alliance. (2002). WAP 2.0 - Technical White Paper."},{"key":"ijitsr.2014010103-37","unstructured":"Open Mobile Alliance. (2006). User agent profile V2.0."},{"key":"ijitsr.2014010103-38","unstructured":"Ozment, A., & Schechter, S. E. (2006, June 26\u201328). Bootstrapping the adoption of internet security protocols. In Proceedings of the Fifth Workshop on the Economics of Information Security, Cambridge, UK."},{"key":"ijitsr.2014010103-39","doi-asserted-by":"publisher","DOI":"10.1108\/02635579710173185"},{"key":"ijitsr.2014010103-40","unstructured":"Riikonen, A., & Smura, T. (2013). Mobile handset population in Finland 2005 \u2013 2012. Technical report, April 11, 2013. Retrieved from http:\/\/momie.comnet.aalto.fi\/wp-uploads\/Mobile_Handset_Population_2005-2012.pdf"},{"key":"ijitsr.2014010103-41","doi-asserted-by":"publisher","DOI":"10.1016\/j.telpol.2012.07.011"},{"key":"ijitsr.2014010103-42","doi-asserted-by":"publisher","DOI":"10.1108\/07363760110398772"},{"key":"ijitsr.2014010103-43","author":"E. M.Rogers","year":"2003","journal-title":"Diffusion of innovations"},{"key":"ijitsr.2014010103-44","unstructured":"ScientiaMobile. (2012). WURFL repository v. 2.3.4, 8 Nov 2012. Retrieved from http:\/\/wurfl.sourceforge.net\/"},{"key":"ijitsr.2014010103-45","first-page":"106","article-title":"Versioning: The smart way to sell information.","author":"C.Shapiro","year":"1998","journal-title":"Harvard Business Review"},{"key":"ijitsr.2014010103-46","doi-asserted-by":"publisher","DOI":"10.1509\/jmkg.68.1.59.24029"},{"issue":"4","key":"ijitsr.2014010103-47","first-page":"53","article-title":"A framework for analysing the usage of mobile services. INFO - The Journal of Policy, Regulation and Strategy for Telecommunications","volume":"11","author":"T.Smura","year":"2009","journal-title":"Information and Media"},{"key":"ijitsr.2014010103-48","doi-asserted-by":"publisher","DOI":"10.1504\/IJEB.2011.040359"},{"key":"ijitsr.2014010103-49","doi-asserted-by":"publisher","DOI":"10.1016\/j.telpol.2007.08.007"},{"key":"ijitsr.2014010103-50","doi-asserted-by":"crossref","unstructured":"Thompson, K., Miller, G. J., & Wilder, R. (1997). Wide-area Internet traffic patterns and characteristics. Network, iEEE, 11(6), 10-23.","DOI":"10.1109\/65.642356"},{"key":"ijitsr.2014010103-51","volume":"Vol. 273","author":"L. G.Tornatzky","year":"1990","journal-title":"The processes of technological innovation"},{"key":"ijitsr.2014010103-52","doi-asserted-by":"publisher","DOI":"10.4018\/jebr.2008070103"},{"key":"ijitsr.2014010103-53","doi-asserted-by":"publisher","DOI":"10.1007\/s11066-011-9063-8"},{"issue":"1","key":"ijitsr.2014010103-54","doi-asserted-by":"crossref","first-page":"489","DOI":"10.2307\/25148770","article-title":"A unified economic model of standard diffusion: The impact of standardization cost, network effects, and network topology.","volume":"30","author":"T.Weitzel","year":"2006","journal-title":"Management Information Systems Quarterly"},{"key":"ijitsr.2014010103-55","doi-asserted-by":"publisher","DOI":"10.1016\/j.jsis.2005.07.007"},{"key":"ijitsr.2014010103-56","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.30.6.727"}],"container-title":["International Journal of IT Standards and Standardization Research"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=111334","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T17:49:59Z","timestamp":1654105799000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/ijitsr.2014010103"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2014,1,1]]},"references-count":57,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2014,1]]}},"URL":"https:\/\/doi.org\/10.4018\/ijitsr.2014010103","relation":{},"ISSN":["1539-3062","1539-3054"],"issn-type":[{"value":"1539-3062","type":"print"},{"value":"1539-3054","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,1,1]]}}}