SlideShare a Scribd company logo
1 of 14
Socio-Economic Services for  European Research Projects (SESERV) European Seventh Framework   CSA FP7-2010-ICT-258138 A SESERV methodology for tussle analysis in Future Internet technologies  Introduction and motivation Costas Kalogiros, Costas Courcoubetis, George D. Stamoulis {ckalog, courcou, gstamoul}@aueb.gr Athens University of Economics and Business September 2011
Internet as a platform for stakeholders’ interactions Stakeholders with varying  socio-economic interests … End-users ASPs Regulators ISPs Internet Socio- Economic  layer Real-world socio-economic transactions Technology choices(including investments, configurations) Internet  Technology  layer Technology outputs  (connectivity, QoS, mobility,  security, etc.)  Internet  applications middleboxes Technology  components Firewalls Internet protocols links switches servers routers 3G towers Socio-Economic layer is governed by laws of socio-economics,  while technology layer by laws of physics
Basic socio-economic technology cycle Longer  Internet Socio- Economic layer Adopt technology ISP Dimension resources Adaptation timescale Stakeholders’ strategies  / policies with respect to  a specific technology  (functionality) Configure technology Use technology Shorter  tussle outcome At each stage conflicting incentives may exist at the socio-economic layer.  The combination of actors’ strategies lead to a tussle outcome, which is characterized by the benefit that stakeholders get.
Tussle evolution (1/2) If the tussle outcome is considered “unfair” by a subset of stakeholders, they can react by: Leaving the system Adopting another technology/ reconfiguring the selected one Asking the regulator to intervene by restricting other stakeholders’ policies … hence making the outcome unstable Even though a tussle outcome can be considered “fair” by all stakeholders of that particular functionality, it can destabilize other functionalities (spillover effect to other tussles) Analyzing the anticipated tussles can shorten unstable periods & help the long-term success of a technology
Tussle evolution (2/2) Functionality A Functionality A Functionality A Tussle A1 Tussle A2 Functionality B Functionality B Functionality B … Tussle B1 Tussle B2 Functionality C Functionality C Functionality C Tussle C2 Tussle C1 … … T0 (initial tussle outcomes) T1 T2 Legend TA Time A Stable outcome Evolves Functionality Affects Initial state Unstable outcome Transfers
Purpose of Tussle Analysis ,[object Object]
Why a new technology is needed today?
What are the interests of existing stakeholders today?
What options do existing technologies offer to stakeholders?
What are the properties of existing outcome in terms of performance & stability?
What would be the effect of a new technology to the ecosystem in the future?
How would the interests of existing and new stakeholders be affected?
How would the options of existing and new stakeholders be affected?
Can this technology help reaching a “fairer” outcome regarding this functionality, or increase efficiency in case of an already stable outcome? ,[object Object]

More Related Content

Viewers also liked

Socioeconomic Tussles Analysis of the ETICS Approach for Providing QoS-enable...
Socioeconomic Tussles Analysis of the ETICS Approach for Providing QoS-enable...Socioeconomic Tussles Analysis of the ETICS Approach for Providing QoS-enable...
Socioeconomic Tussles Analysis of the ETICS Approach for Providing QoS-enable...ictseserv
 
Collective and participative experiences in real-world and online communities
Collective and participative experiences in real-world and online communitiesCollective and participative experiences in real-world and online communities
Collective and participative experiences in real-world and online communitiesictseserv
 
How Disruptive Technologies Influence the FI Ecosystem
How Disruptive Technologies Influence the FI EcosystemHow Disruptive Technologies Influence the FI Ecosystem
How Disruptive Technologies Influence the FI Ecosystemictseserv
 
Business models for dynamic optical infrastructures
Business models for dynamic optical infrastructures Business models for dynamic optical infrastructures
Business models for dynamic optical infrastructures ictseserv
 
Seserv concertation-01
Seserv concertation-01Seserv concertation-01
Seserv concertation-01ictseserv
 
Update on Recent SESERV Results and Upcoming Events
Update on Recent SESERV Results and Upcoming EventsUpdate on Recent SESERV Results and Upcoming Events
Update on Recent SESERV Results and Upcoming Eventsictseserv
 
Aims2012
Aims2012Aims2012
Aims2012ictseserv
 
Cooperative Database Caching within Cloud Environments
Cooperative Database Caching within Cloud EnvironmentsCooperative Database Caching within Cloud Environments
Cooperative Database Caching within Cloud Environmentsictseserv
 

Viewers also liked (8)

Socioeconomic Tussles Analysis of the ETICS Approach for Providing QoS-enable...
Socioeconomic Tussles Analysis of the ETICS Approach for Providing QoS-enable...Socioeconomic Tussles Analysis of the ETICS Approach for Providing QoS-enable...
Socioeconomic Tussles Analysis of the ETICS Approach for Providing QoS-enable...
 
Collective and participative experiences in real-world and online communities
Collective and participative experiences in real-world and online communitiesCollective and participative experiences in real-world and online communities
Collective and participative experiences in real-world and online communities
 
How Disruptive Technologies Influence the FI Ecosystem
How Disruptive Technologies Influence the FI EcosystemHow Disruptive Technologies Influence the FI Ecosystem
How Disruptive Technologies Influence the FI Ecosystem
 
Business models for dynamic optical infrastructures
Business models for dynamic optical infrastructures Business models for dynamic optical infrastructures
Business models for dynamic optical infrastructures
 
Seserv concertation-01
Seserv concertation-01Seserv concertation-01
Seserv concertation-01
 
Update on Recent SESERV Results and Upcoming Events
Update on Recent SESERV Results and Upcoming EventsUpdate on Recent SESERV Results and Upcoming Events
Update on Recent SESERV Results and Upcoming Events
 
Aims2012
Aims2012Aims2012
Aims2012
 
Cooperative Database Caching within Cloud Environments
Cooperative Database Caching within Cloud EnvironmentsCooperative Database Caching within Cloud Environments
Cooperative Database Caching within Cloud Environments
 

Similar to A SESERV methodology for tussle analysis in Future Internet technologies - Introduction and motivation

Seserv workshop costas courcoubetis - introduction to tussle analysis metho...
Seserv workshop   costas courcoubetis - introduction to tussle analysis metho...Seserv workshop   costas courcoubetis - introduction to tussle analysis metho...
Seserv workshop costas courcoubetis - introduction to tussle analysis metho...ictseserv
 
Future Profiles of e-Research
Future Profiles of e-Research Future Profiles of e-Research
Future Profiles of e-Research Ian Miles
 
Seserv dp-workshop
Seserv dp-workshopSeserv dp-workshop
Seserv dp-workshopIoanna Papafili
 
IoT-Lite: A Lightweight Semantic Model for the Internet of Things
IoT-Lite:  A Lightweight Semantic Model for the Internet of ThingsIoT-Lite:  A Lightweight Semantic Model for the Internet of Things
IoT-Lite: A Lightweight Semantic Model for the Internet of ThingsPayamBarnaghi
 
chapter 3.docx
chapter 3.docxchapter 3.docx
chapter 3.docxSami Siddiqui
 
A Social Welfare Approach in Increasing the Benefits from the Internet in Dev...
A Social Welfare Approach in Increasing the Benefits from the Internet in Dev...A Social Welfare Approach in Increasing the Benefits from the Internet in Dev...
A Social Welfare Approach in Increasing the Benefits from the Internet in Dev...IDES Editor
 
IRJET- Decentralized E-Voting System
IRJET-  	  Decentralized E-Voting SystemIRJET-  	  Decentralized E-Voting System
IRJET- Decentralized E-Voting SystemIRJET Journal
 
Analysis and assessment software for multi-user collaborative cognitive radi...
Analysis and assessment software for multi-user collaborative  cognitive radi...Analysis and assessment software for multi-user collaborative  cognitive radi...
Analysis and assessment software for multi-user collaborative cognitive radi...IJECEIAES
 
IRJET- Pervasive Computing Service Discovery in Secure Framework Environment
IRJET- Pervasive Computing Service Discovery in Secure Framework EnvironmentIRJET- Pervasive Computing Service Discovery in Secure Framework Environment
IRJET- Pervasive Computing Service Discovery in Secure Framework EnvironmentIRJET Journal
 
An Agent Future For Network Control
An Agent Future For Network ControlAn Agent Future For Network Control
An Agent Future For Network ControlSara Alvarez
 
CHARACTERIZING BEHAVIOUR
CHARACTERIZING BEHAVIOURCHARACTERIZING BEHAVIOUR
CHARACTERIZING BEHAVIOURcsk selva
 
Dynamic Semantics for Semantics for Dynamic IoT Environments
Dynamic Semantics for Semantics for Dynamic IoT EnvironmentsDynamic Semantics for Semantics for Dynamic IoT Environments
Dynamic Semantics for Semantics for Dynamic IoT EnvironmentsPayamBarnaghi
 
Chi2011 Case Study: Interactive, Dynamic Sparklines
Chi2011 Case Study: Interactive, Dynamic SparklinesChi2011 Case Study: Interactive, Dynamic Sparklines
Chi2011 Case Study: Interactive, Dynamic SparklinesLeo Frishberg
 

Similar to A SESERV methodology for tussle analysis in Future Internet technologies - Introduction and motivation (20)

Seserv workshop costas courcoubetis - introduction to tussle analysis metho...
Seserv workshop   costas courcoubetis - introduction to tussle analysis metho...Seserv workshop   costas courcoubetis - introduction to tussle analysis metho...
Seserv workshop costas courcoubetis - introduction to tussle analysis metho...
 
Atva05
Atva05Atva05
Atva05
 
Future Profiles of e-Research
Future Profiles of e-Research Future Profiles of e-Research
Future Profiles of e-Research
 
Seserv dp-workshop
Seserv dp-workshopSeserv dp-workshop
Seserv dp-workshop
 
IoT-Lite: A Lightweight Semantic Model for the Internet of Things
IoT-Lite:  A Lightweight Semantic Model for the Internet of ThingsIoT-Lite:  A Lightweight Semantic Model for the Internet of Things
IoT-Lite: A Lightweight Semantic Model for the Internet of Things
 
chapter 3.pdf
chapter 3.pdfchapter 3.pdf
chapter 3.pdf
 
chapter 3.docx
chapter 3.docxchapter 3.docx
chapter 3.docx
 
Probabilistic Polling System Approach for IoT Secure Routing
Probabilistic Polling System Approach for IoT Secure RoutingProbabilistic Polling System Approach for IoT Secure Routing
Probabilistic Polling System Approach for IoT Secure Routing
 
A Social Welfare Approach in Increasing the Benefits from the Internet in Dev...
A Social Welfare Approach in Increasing the Benefits from the Internet in Dev...A Social Welfare Approach in Increasing the Benefits from the Internet in Dev...
A Social Welfare Approach in Increasing the Benefits from the Internet in Dev...
 
Probabilistic Polling System Approach for IoT Secure Routing
Probabilistic Polling System Approach for IoT Secure RoutingProbabilistic Polling System Approach for IoT Secure Routing
Probabilistic Polling System Approach for IoT Secure Routing
 
IRJET- Decentralized E-Voting System
IRJET-  	  Decentralized E-Voting SystemIRJET-  	  Decentralized E-Voting System
IRJET- Decentralized E-Voting System
 
Analysis and assessment software for multi-user collaborative cognitive radi...
Analysis and assessment software for multi-user collaborative  cognitive radi...Analysis and assessment software for multi-user collaborative  cognitive radi...
Analysis and assessment software for multi-user collaborative cognitive radi...
 
IRJET- Pervasive Computing Service Discovery in Secure Framework Environment
IRJET- Pervasive Computing Service Discovery in Secure Framework EnvironmentIRJET- Pervasive Computing Service Discovery in Secure Framework Environment
IRJET- Pervasive Computing Service Discovery in Secure Framework Environment
 
An Agent Future For Network Control
An Agent Future For Network ControlAn Agent Future For Network Control
An Agent Future For Network Control
 
CHARACTERIZING BEHAVIOUR
CHARACTERIZING BEHAVIOURCHARACTERIZING BEHAVIOUR
CHARACTERIZING BEHAVIOUR
 
Dynamic Semantics for Semantics for Dynamic IoT Environments
Dynamic Semantics for Semantics for Dynamic IoT EnvironmentsDynamic Semantics for Semantics for Dynamic IoT Environments
Dynamic Semantics for Semantics for Dynamic IoT Environments
 
Marta de la Cruz-Informe Final
Marta de la Cruz-Informe FinalMarta de la Cruz-Informe Final
Marta de la Cruz-Informe Final
 
1720 1724
1720 17241720 1724
1720 1724
 
1720 1724
1720 17241720 1724
1720 1724
 
Chi2011 Case Study: Interactive, Dynamic Sparklines
Chi2011 Case Study: Interactive, Dynamic SparklinesChi2011 Case Study: Interactive, Dynamic Sparklines
Chi2011 Case Study: Interactive, Dynamic Sparklines
 

More from ictseserv

Socio-Economic Aware Design of Future Network Technology (Y.FNsocioeconomic)
Socio-Economic Aware Design of Future Network Technology (Y.FNsocioeconomic)Socio-Economic Aware Design of Future Network Technology (Y.FNsocioeconomic)
Socio-Economic Aware Design of Future Network Technology (Y.FNsocioeconomic)ictseserv
 
Eunice2012
Eunice2012Eunice2012
Eunice2012ictseserv
 
Burkhard stiller cloiuds-fu-nems-2012
Burkhard stiller cloiuds-fu-nems-2012Burkhard stiller cloiuds-fu-nems-2012
Burkhard stiller cloiuds-fu-nems-2012ictseserv
 
Fia aalborg-statement-iopapafi-v0.5
Fia aalborg-statement-iopapafi-v0.5Fia aalborg-statement-iopapafi-v0.5
Fia aalborg-statement-iopapafi-v0.5ictseserv
 
Vesa terava net neutrality in europe - seserv se workshop june 2012
Vesa terava   net neutrality in europe - seserv se workshop june 2012Vesa terava   net neutrality in europe - seserv se workshop june 2012
Vesa terava net neutrality in europe - seserv se workshop june 2012ictseserv
 
Stephen minton tech transformation in the age of uncertainty - seserv se wo...
Stephen minton   tech transformation in the age of uncertainty - seserv se wo...Stephen minton   tech transformation in the age of uncertainty - seserv se wo...
Stephen minton tech transformation in the age of uncertainty - seserv se wo...ictseserv
 
Sara de freitas the gamification of everyday life - seserv se workshop june...
Sara de freitas   the gamification of everyday life - seserv se workshop june...Sara de freitas   the gamification of everyday life - seserv se workshop june...
Sara de freitas the gamification of everyday life - seserv se workshop june...ictseserv
 
Javier salcedo cloud computing - seserv se workshop june 2012
Javier salcedo   cloud computing - seserv se workshop june 2012Javier salcedo   cloud computing - seserv se workshop june 2012
Javier salcedo cloud computing - seserv se workshop june 2012ictseserv
 
Falk von bornstaedt networks perspectives and analysis in the future intern...
Falk von bornstaedt   networks perspectives and analysis in the future intern...Falk von bornstaedt   networks perspectives and analysis in the future intern...
Falk von bornstaedt networks perspectives and analysis in the future intern...ictseserv
 
Brian pickering introduction to seserv - seserv se workshop june 2012
Brian pickering   introduction to seserv - seserv se workshop june 2012Brian pickering   introduction to seserv - seserv se workshop june 2012
Brian pickering introduction to seserv - seserv se workshop june 2012ictseserv
 
Andrea Glorioso: No Disconnect Strategy - SESERV Workshop, June 2012
Andrea Glorioso: No Disconnect Strategy - SESERV Workshop, June 2012Andrea Glorioso: No Disconnect Strategy - SESERV Workshop, June 2012
Andrea Glorioso: No Disconnect Strategy - SESERV Workshop, June 2012ictseserv
 
Alessandro bogliolo workshop introduction - seserv se workshop june 2012
Alessandro bogliolo   workshop introduction - seserv se workshop june 2012Alessandro bogliolo   workshop introduction - seserv se workshop june 2012
Alessandro bogliolo workshop introduction - seserv se workshop june 2012ictseserv
 
Aleksandra kuczerawy privacy issues in future internet - seserv se workshop...
Aleksandra kuczerawy   privacy issues in future internet - seserv se workshop...Aleksandra kuczerawy   privacy issues in future internet - seserv se workshop...
Aleksandra kuczerawy privacy issues in future internet - seserv se workshop...ictseserv
 
Alan hartman trust measurement and management - seserv se workshop june 2012
Alan hartman   trust measurement and management - seserv se workshop june 2012Alan hartman   trust measurement and management - seserv se workshop june 2012
Alan hartman trust measurement and management - seserv se workshop june 2012ictseserv
 
Socio-Economic Aware Design of Future Network Technology (Y.FNsocioeconomic)
Socio-Economic Aware Design of Future Network Technology (Y.FNsocioeconomic)Socio-Economic Aware Design of Future Network Technology (Y.FNsocioeconomic)
Socio-Economic Aware Design of Future Network Technology (Y.FNsocioeconomic)ictseserv
 
Fia presentatie
Fia presentatieFia presentatie
Fia presentatieictseserv
 
Socio-Economic Aware Design of Future Network Technology (Y.FNsocioeconomic)
Socio-Economic Aware Design of Future Network Technology (Y.FNsocioeconomic)Socio-Economic Aware Design of Future Network Technology (Y.FNsocioeconomic)
Socio-Economic Aware Design of Future Network Technology (Y.FNsocioeconomic)ictseserv
 
Seserv workshop manos dramitinos - tussle analysis from etics project
Seserv workshop   manos dramitinos - tussle analysis from etics projectSeserv workshop   manos dramitinos - tussle analysis from etics project
Seserv workshop manos dramitinos - tussle analysis from etics projectictseserv
 
Seserv workshop costas kalogiros - tussle analysis examples dns-tcp
Seserv workshop   costas kalogiros - tussle analysis examples dns-tcpSeserv workshop   costas kalogiros - tussle analysis examples dns-tcp
Seserv workshop costas kalogiros - tussle analysis examples dns-tcpictseserv
 
Sending party network pays
Sending party network paysSending party network pays
Sending party network paysictseserv
 

More from ictseserv (20)

Socio-Economic Aware Design of Future Network Technology (Y.FNsocioeconomic)
Socio-Economic Aware Design of Future Network Technology (Y.FNsocioeconomic)Socio-Economic Aware Design of Future Network Technology (Y.FNsocioeconomic)
Socio-Economic Aware Design of Future Network Technology (Y.FNsocioeconomic)
 
Eunice2012
Eunice2012Eunice2012
Eunice2012
 
Burkhard stiller cloiuds-fu-nems-2012
Burkhard stiller cloiuds-fu-nems-2012Burkhard stiller cloiuds-fu-nems-2012
Burkhard stiller cloiuds-fu-nems-2012
 
Fia aalborg-statement-iopapafi-v0.5
Fia aalborg-statement-iopapafi-v0.5Fia aalborg-statement-iopapafi-v0.5
Fia aalborg-statement-iopapafi-v0.5
 
Vesa terava net neutrality in europe - seserv se workshop june 2012
Vesa terava   net neutrality in europe - seserv se workshop june 2012Vesa terava   net neutrality in europe - seserv se workshop june 2012
Vesa terava net neutrality in europe - seserv se workshop june 2012
 
Stephen minton tech transformation in the age of uncertainty - seserv se wo...
Stephen minton   tech transformation in the age of uncertainty - seserv se wo...Stephen minton   tech transformation in the age of uncertainty - seserv se wo...
Stephen minton tech transformation in the age of uncertainty - seserv se wo...
 
Sara de freitas the gamification of everyday life - seserv se workshop june...
Sara de freitas   the gamification of everyday life - seserv se workshop june...Sara de freitas   the gamification of everyday life - seserv se workshop june...
Sara de freitas the gamification of everyday life - seserv se workshop june...
 
Javier salcedo cloud computing - seserv se workshop june 2012
Javier salcedo   cloud computing - seserv se workshop june 2012Javier salcedo   cloud computing - seserv se workshop june 2012
Javier salcedo cloud computing - seserv se workshop june 2012
 
Falk von bornstaedt networks perspectives and analysis in the future intern...
Falk von bornstaedt   networks perspectives and analysis in the future intern...Falk von bornstaedt   networks perspectives and analysis in the future intern...
Falk von bornstaedt networks perspectives and analysis in the future intern...
 
Brian pickering introduction to seserv - seserv se workshop june 2012
Brian pickering   introduction to seserv - seserv se workshop june 2012Brian pickering   introduction to seserv - seserv se workshop june 2012
Brian pickering introduction to seserv - seserv se workshop june 2012
 
Andrea Glorioso: No Disconnect Strategy - SESERV Workshop, June 2012
Andrea Glorioso: No Disconnect Strategy - SESERV Workshop, June 2012Andrea Glorioso: No Disconnect Strategy - SESERV Workshop, June 2012
Andrea Glorioso: No Disconnect Strategy - SESERV Workshop, June 2012
 
Alessandro bogliolo workshop introduction - seserv se workshop june 2012
Alessandro bogliolo   workshop introduction - seserv se workshop june 2012Alessandro bogliolo   workshop introduction - seserv se workshop june 2012
Alessandro bogliolo workshop introduction - seserv se workshop june 2012
 
Aleksandra kuczerawy privacy issues in future internet - seserv se workshop...
Aleksandra kuczerawy   privacy issues in future internet - seserv se workshop...Aleksandra kuczerawy   privacy issues in future internet - seserv se workshop...
Aleksandra kuczerawy privacy issues in future internet - seserv se workshop...
 
Alan hartman trust measurement and management - seserv se workshop june 2012
Alan hartman   trust measurement and management - seserv se workshop june 2012Alan hartman   trust measurement and management - seserv se workshop june 2012
Alan hartman trust measurement and management - seserv se workshop june 2012
 
Socio-Economic Aware Design of Future Network Technology (Y.FNsocioeconomic)
Socio-Economic Aware Design of Future Network Technology (Y.FNsocioeconomic)Socio-Economic Aware Design of Future Network Technology (Y.FNsocioeconomic)
Socio-Economic Aware Design of Future Network Technology (Y.FNsocioeconomic)
 
Fia presentatie
Fia presentatieFia presentatie
Fia presentatie
 
Socio-Economic Aware Design of Future Network Technology (Y.FNsocioeconomic)
Socio-Economic Aware Design of Future Network Technology (Y.FNsocioeconomic)Socio-Economic Aware Design of Future Network Technology (Y.FNsocioeconomic)
Socio-Economic Aware Design of Future Network Technology (Y.FNsocioeconomic)
 
Seserv workshop manos dramitinos - tussle analysis from etics project
Seserv workshop   manos dramitinos - tussle analysis from etics projectSeserv workshop   manos dramitinos - tussle analysis from etics project
Seserv workshop manos dramitinos - tussle analysis from etics project
 
Seserv workshop costas kalogiros - tussle analysis examples dns-tcp
Seserv workshop   costas kalogiros - tussle analysis examples dns-tcpSeserv workshop   costas kalogiros - tussle analysis examples dns-tcp
Seserv workshop costas kalogiros - tussle analysis examples dns-tcp
 
Sending party network pays
Sending party network paysSending party network pays
Sending party network pays
 

Recently uploaded

A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 

Recently uploaded (20)

A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 

A SESERV methodology for tussle analysis in Future Internet technologies - Introduction and motivation

  • 1. Socio-Economic Services for European Research Projects (SESERV) European Seventh Framework CSA FP7-2010-ICT-258138 A SESERV methodology for tussle analysis in Future Internet technologies Introduction and motivation Costas Kalogiros, Costas Courcoubetis, George D. Stamoulis {ckalog, courcou, gstamoul}@aueb.gr Athens University of Economics and Business September 2011
  • 2. Internet as a platform for stakeholders’ interactions Stakeholders with varying socio-economic interests … End-users ASPs Regulators ISPs Internet Socio- Economic layer Real-world socio-economic transactions Technology choices(including investments, configurations) Internet Technology layer Technology outputs (connectivity, QoS, mobility, security, etc.) Internet applications middleboxes Technology components Firewalls Internet protocols links switches servers routers 3G towers Socio-Economic layer is governed by laws of socio-economics, while technology layer by laws of physics
  • 3. Basic socio-economic technology cycle Longer Internet Socio- Economic layer Adopt technology ISP Dimension resources Adaptation timescale Stakeholders’ strategies / policies with respect to a specific technology (functionality) Configure technology Use technology Shorter tussle outcome At each stage conflicting incentives may exist at the socio-economic layer. The combination of actors’ strategies lead to a tussle outcome, which is characterized by the benefit that stakeholders get.
  • 4. Tussle evolution (1/2) If the tussle outcome is considered “unfair” by a subset of stakeholders, they can react by: Leaving the system Adopting another technology/ reconfiguring the selected one Asking the regulator to intervene by restricting other stakeholders’ policies … hence making the outcome unstable Even though a tussle outcome can be considered “fair” by all stakeholders of that particular functionality, it can destabilize other functionalities (spillover effect to other tussles) Analyzing the anticipated tussles can shorten unstable periods & help the long-term success of a technology
  • 5. Tussle evolution (2/2) Functionality A Functionality A Functionality A Tussle A1 Tussle A2 Functionality B Functionality B Functionality B … Tussle B1 Tussle B2 Functionality C Functionality C Functionality C Tussle C2 Tussle C1 … … T0 (initial tussle outcomes) T1 T2 Legend TA Time A Stable outcome Evolves Functionality Affects Initial state Unstable outcome Transfers
  • 6.
  • 7. Why a new technology is needed today?
  • 8. What are the interests of existing stakeholders today?
  • 9. What options do existing technologies offer to stakeholders?
  • 10. What are the properties of existing outcome in terms of performance & stability?
  • 11. What would be the effect of a new technology to the ecosystem in the future?
  • 12. How would the interests of existing and new stakeholders be affected?
  • 13. How would the options of existing and new stakeholders be affected?
  • 14.
  • 15. Functionality I Functionality II Step 1: Identify all primary stakeholder roles and their characteristics for the functionality under investigation spillover new iteration Step 2: Identify tussles among identified stakeholders tussle tussle tussle tussle Step 3: For each tussleassess the impact to each stakeholder and potential spillovers A high-level view of the SESERV tussle analysis methodology
  • 16. A guide to applying the SESERV tussle analysis methodology
  • 17. More Information Don’t hesitate to contact us if your research project is interested in performing a tussle analysis for understanding the existing (and/or future) socio-economic issues related to your proposed Future Internet technologies. http://www.seserv.org getinvolved@seserv.org http://www.linkedin.com/groups?about=&gid=3870856 http://www.twitter.com/seserv
  • 19. Design For Tussle A tussle-aware Internet protocol should lead to a stable outcome by allowing all involved stakeholders to express their interests and affect the outcome (“Design for Choice” Principle) It does not impose one particular outcome because no one can guess it avoid spillovers to other functionalities (“Modularize along the tussle boundaries” Principle) Clark, D. D., Wroclawski, J., Sollins, K. R., and Braden, R.: Tussle in Cyberspace: Defining Tomorrow’s Internet. IEEE/ ACM Trans. Networking 13, 3, pp. 462-475, June 2005
  • 20.
  • 21. “Exposure of list of choices” suggesting that the stakeholders involved must be given the opportunity to express multiple alternative choices and which the other party should also consider.
  • 22. “Exchange of valuation” suggesting that the stakeholders involved should communicate their preferences in regard to the available set of choices (for instance by ranking them in descending order).
  • 23. “Exposure of choice’s impact” suggesting that the stakeholders involved should appreciate what the effects of their choices are on others
  • 24. “Visibility of choices made” suggesting that both the agent and the principal of an action must allow the inference of which of the available choices has been selected. Clark, D. D., Wroclawski, J., Sollins, K. R., and Braden, R.: Tussle in Cyberspace: Defining Tomorrow’s Internet. IEEE/ ACM Trans. Networking 13, 3, pp. 462-475, June 2005
  • 25. Towards avoiding tussle spillovers to other functionalities The “Modularize the design along tussle boundaries” principle helps in identifying whether tussle spillovers can appear. A protocol designer can check any of the following two conditions: “Stakeholder separation”, or whether the choices of one stakeholder group have significant side effects on stakeholders of another functionality (another tussle space), for example creates economic externalities between stakeholders of different tussle spaces. “Functional separation”, or whether different stakeholders use some functionality of the given technology in an unforeseen way to achieve a different goal in some other tussle space, i.e., the functionality of technology A interferes (and possibly cancels) with functionality of technology B. Clark, D. D., Wroclawski, J., Sollins, K. R., and Braden, R.: Tussle in Cyberspace: Defining Tomorrow’s Internet. IEEE/ ACM Trans. Networking 13, 3, pp. 462-475, June 2005

Editor's Notes

  1. Internet is a platform which can be studied as a system composed of multiple technologies and an environment where multiple stakeholders interact in multiple ways (either by using or not technologies). At the socio-economic layer stakeholders have interests and incentives, expressed by making choices governed by laws of economics (e.g. supply and demand), politics, sociology, etc. that affect the technology layer.Such choices refer to what specific technologies will be introduced, how these will be dimensioned, configured, and finally, used. These collective decisions, together with the laws of physics, will determine how technology components will operate and produce outputs.For example the DNS (Domain Name System) associates domain names to network addresses in a distributed way, based on each administrator’s configuration of a local DNS server’s entries. These entries can affect the level of caching achieved and be used for other purposes, such as load balancing and optimized delivery of services and content to end-users. Technology outputs are assessed by each stakeholder individually and can affect existing real-world interactions or trigger new ones (payments, friendship, price competition, price regulation, etc.)
  2. When adding a new functionality in the Internet, it is natural that some stakeholders have conflicting interests when making technology decisions.The long-term goals of each stakeholder with respect to a specific Internet functionality define its strategy which is, finally, implemented by policies.Policies take into account the technology restrictions and other stakeholders’ socio-economic aspects.The decisions contained in these policies can be mostly grouped into the following categories (in practice):Adopt a suitable technology from the set of available ones for the functionality in questionDimension dedicated resources to support the goals of the stakeholderConfigure parameters of the technology that affect how functionality in general is providedConfigure parameters that affect how functionality for a specific instance is provided This process defines a “tussle” between the stakeholders, since they have in general conflicting goals.For example, end-users may:a) choose to use a specific application for content distribution based on its ability (or not) to download from multiple sources simultaneously. b) select the upper and lower limits of the upload/download capacity for that application (based on its connectivity profile)c) configure maximum number of TCP connections per downloaded filed) set priority for queued files based on popularityISPs may: measure the performance of web-browsing connections and observe that these obtain a small bandwidth shareadd capacity to alleviate the problemIn general, policies are applied in a sequence similar to the one presented above and may adapt using feedback from the evolution of the system. The timescales that such relatively minor adaptations (they don’t affect the basic technology and socio-economic context of the tussle) take place depend on the social and technical “inertia” of the system and the given technologies. Eventually we expect this to lead to a tussle outcome, which is characterized by the benefit that each stakeholder gets (defined by appropriate utility functions at the socio-economic layer). These benefits can vary substantially between stakeholders and different concepts of fairness may apply depending on the social context.What we defined so far is the structure of the basic cycle. As we will see next, if the given outcome is not stable, we expect it to trigger a new tussle cycle to take place, where some more radical changes take place in the space of the adopted technologies. We must emphasize to the reader that sometimes this separation of the socio-economic technology evolution into distinct cycles is not so clear, since cycles themselves may include some degree of technology adaptation. Many times it is a matter of judgment to define the boundaries between cycles and the corresponding tussle outcome for each cycle. Nevertheless we believe that such a process helps the analyst understand the complexity of the underlying system and predict its evolution.
  3. According to our previous discussion, tussle can be described as a process determined by the strategies of involved stakeholders to resolve their conflicts of interest in a particular technology context. We assumed that a tussle, after some adaptation from the stakeholders involved, leads to some outcome. In analogy to game theory, a tussle corresponds to a game where agents are the stakeholders in the given context. The outcome of the tussle may be a Nash equilibrium of the game. Our model of the Internet ecosystem assumes that tussles may evolve over time. Evolution occurs either because of instability or because of externalities.If the tussle outcome is considered “unfair” by a subset of stakeholders, it can evolve into a new tussle based on: socio-economic decisions alone (e.g. stop using that functionality, stop doing business, etc.), out-of-band actions (asking a regulator to intervene) or new socio-techno-economic decisions following the basic socio-economic technology cycle (introduce a radically different technology, new stakeholders enter the stage, etc.)All these reactions characterize an unstable tussle outcome.It is likely that unstable outcomes will lead to a new tussle and possibly destabilize other functionality spaces as well (called a “spillover effect”). It should be noted that stable tussle outcomes can also create spillovers to other functionalities, in case some users of the established functionality find some new uses of it, not anticipated before, which interfere with other functions of the ecosystem.We believe that analyzing the anticipated tussles can shorten unstable periods & help the long-term success of a technology.
  4. This slide illustrates how tussles can evolve inside a single functionality space or affect another functionality. Let us assume a discrete-time model and that initially only Functionality B is observed to be in a stable state. At some time T1 both tussles A1 and C1 (for Functionalities A and C respectively) reach equilibrium, but only the latter is a stable one. Furthermore, the unstable outcome of tussle A1 has a spillover effect and triggers a new tussle B1 in functionality B. At some later time T2 both tussles A2 and B1 have reached equilibrium. Even though Functionality A has now reached a new and stable outcome, it has a spillover to functionality C and makes the previously stable outcome of C1 unstable. Thus, the tussles of functionalities B and C evolve further in time (not shown).
  5. When TCP (Transmission Control Protocol) was proposed in the early 80s, it was assumed that hosts would initiate a single connection for each session.The algorithm suggested for controlling how bandwidth is being shared can be considered fair in the sense that if k connections are instantaneously active in a bottleneck link, then each of them would take 1/k of the bandwidth .But this outcome cannot be considered stable, after the introduction of peer-to-peer applications for file sharing.Users of such applications (called Heavy users) can open multiple TCP connections for the same file and get disproportionate bandwidth share in relation to traditional users (called interactive).This new outcome cannot be considered stable since the ISPs’ ability to offer other services was threatened by the greatly increased traffic.ISPs introduced middleboxes (dedicated machines that Deep Packet Inspection techniques for inspecting data packets) in order to identify and throttle peer-to-peer traffic.Even though this new bandwidth allocation outcome can be considered fair, it is not stable either.Peer-to-peer applications started performing traffic obfuscation (e.g. by encryption) in order to decrease downloading time.At the same time, DPI technology allowed ISPs to identify traffic that directly competes with complementary services they offer.A famous example has been an ISP’s attempt to degrade quality of third-party VoIP services that threatened its traditional telephony services.This is an example of a spillover to another functionality, which was solved by asking the Regulator to intervene.Tussle analysis would try to understand the impact that a newly deployed technology (or set of technologies) would have on the stability of the tussle outcome for that particular functionality, on the stability of outcomes for other functionalities (spillovers to existing or new tussles) For example, what would happen if ISPs deployed congestion exposure technologies and congestion pricing schemes?The former technology (for example CONEX) would inform all parties along the path about the congestion that a packet would experience/cause.The latter technology would charge users based on the congestion they cause.Would the deployment of this technology set:a) lead to a stable outcome?b) create spillovers to other functionalities (e.g. routing)?
  6. This slide gives a high-level view of tussle analysis methodology. Each step is shown as a horizontal rectangle with arrows denoting transitions. All steps are applied in the context of one, or more, functionalities (rounded vertical rectangles). The first step suggests composing the socio-economic and technology layers of Slide2 for each particular functionality. Starting from the top of that figure identifying and studying the properties of the most important stakeholder roles is necessary. Besides recognizing the set of stakeholder roles their characteristics must be understood. The most important attribute of a role is the incentive to use this functionality. Finally technologies (complementary or substitute ones) that can be used for a service or application instance related to that functionality must be specified. These technologies, or technology sets, usually follow a different logic or may not even be designed for implementing this functionality.Identifying such alternative technology schemes will be useful in performing the second step, which refers to identifying tussles among the set of stakeholders. More specifically when a conflict of interest is found to exist between some stakeholders, we should seek for policies – enabled by thetechnologies – that these rational entities would select in order to meet their goals. Thus, this step is about instantiating Slide3 in the specific context of this functionality.The third step of the methodology aims to evaluate each tussle outcome from the perspective of each stakeholder (in order to infer the stability properties of the functionality under investigation) and understand its effects on the stability of other functionalities. It thus can be depicted using a diagram like the one in Slide5. In the ideal scenario of a tussle outcome is an equilibrium point, where: a) all stakeholders of this functionality derive a fair payoff (thus no one will select another policy) and; b) no stakeholder of another functionality, who was receiving a fair payoff before, gets an unfair payoff after this tussle equilibrium has been reached.If both conditions hold then the analysis of this particular tussle is completed and we can move on to the remaining tussles identified in Step2. In case condition (a) is not met, a new iteration of the methodology must be performed by making assumptions on the most probable policies adopted by unhappy stakeholders. Similarly, a new iteration must be performed for each spillover to other functionalities when condition (b) is not met.
  7. The following questionscan act as a guide in performing the tussle analysis:[Q1] Understand stakeholders’ interests in current ecosystem: Translating Slide2 into your context, which functionality/functionalities does your proposed technology performs and what are the interests of the main stakeholders?[Q2] Understand stakeholders’ interests in new ecosystem: Repeat all steps of Q1, if your technology is deployed.[Q3] Identify policies in current ecosystem: Using Slide3 for the desired functionality, can you identify the most probable policies of each main stakeholder enabled by existingtechnologies (if your technology is not deployed)?[Q4] Identify policies in new ecosystem: Repeat all steps of Q3, if yourtechnology is deployed.[Q5] Assess current ecosystem: Translating Slide5 into your context, can you foresee the stability of existingtussle outcome and potential spillovers to other functionalities, if your technology is not deployed? What about expected efficiency?[Q6] Assess new ecosystem: Repeat all steps of Q5, if yourtechnology is deployed.The SESERV project performs a survey about the technologies proposed by FP7 projects and the associated socio-economic issues that already exist or would appear after the deployment of those technologies.We would be happy to receive your project’s response on the questionnaire.These answers can be qualitative.If you are interested we could organize a 30 min. audio-conference
  8. Provide examples