Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Internet Tussles involving Information


Published on

This talk provides a summary of the Tussle Analysis methodology for the economic assessment of Future Internet architectures. The talk was presented at the Future Internet Assembly, Ghent by George StamStamoulis from AUEB.

Published in: Technology
  • Be the first to comment

  • Be the first to like this

Internet Tussles involving Information

  1. 1. Socio-Economic Services forEuropean Research Projects (SESERV)European Seventh Framework CSA FP7-2010-ICT-258138 Internet Tussles involving Information UZH, IT Innovation, AUEB, UOX, ALBLF, AOSAE Information as an Economic GoodGeorge D. Stamoulis Ghent Sessionand Kostas Kalogiros, AUEB December 17, 2010 © 2010 The SESERV Consortium 1
  2. 2. The SESERV CSA Socio-Economics Service for European Research Projects Main topic: the socio-economic impact of tussles in FI Tussle investigation methodology:– Identify stakeholders for a certain functionality & tussles among them– Then, identify distribution of control across stakeholders– If control is imbalanced: assess the socio-economic impact– Identify potential gains of disadvantaged stakeholders by using other protocols/tricks • And possible negative impact on other functionalities (tussle spill-over)– For each new protocol/trick, apply the methodology again. © 2010 The SESERV Consortium 2
  3. 3. Tussle Taxonomy: Main PatternsContention over a resource: – Consumer – consumer or provider – providerRepurposing of a resource: – Consumer – providerControl of the selection of a complementary resource: – Consumer/provider – providerResponsibility for the misuse of a resource: – Provider – providerC. Kalogiros, C. Courcoubetis, G. D. Stamoulis, M. Boniface, E. T. Meyer,M. Waldburger, D. Field and B. Stiller, “An Approach to Investigating Socio-economic Tussles Arising from Building the Future Internet“, in FIA Book 2011© 2010 The SESERV Consortium 3
  4. 4. Information AsymmetryISPs have private access to information– This can be used for controlling the service outcome in a distributed scenarioSharing of SLA-monitoring info: responsibility tussle:– In case of SLA violation, ISPs have no incentive to report truthfully their effort for inter-domain service provisionPropagation of routing information: contention tussle– An ISP can manipulate BGP routing advertisements, in order to attract more traffic • i.e. by announcing de-aggregated prefixes © 2010 The SESERV Consortium 4
  5. 5. Information MonetizationProviders can collect personaldata from consumer activity – This data can be turned into Interest Interest valuable information by identifying consumer behaviour patterns Provider – E.g.: Recommendation of products based on consumer’s R1 purchasing and search history ConsumerRepurposing tussle betweenproviders and consumers Interestregarding how their data isexploited© 2010 The SESERV Consortium 5
  6. 6. Thank you for your attention!© 2010 The SESERV Consortium 6