The IT Law Wiki
No edit summary
Line 14: Line 14:
   
 
'''Penetration''' is "the degree to which a technology has been adopted by a community."<ref>Information Technologies Group Center for International Development at Harvard University, Glossary ([http://cyber.law.harvard.edu/readinessguide/glossary.html full-text]).</ref>
 
'''Penetration''' is "the degree to which a technology has been adopted by a community."<ref>Information Technologies Group Center for International Development at Harvard University, Glossary ([http://cyber.law.harvard.edu/readinessguide/glossary.html full-text]).</ref>
  +
  +
== Overview ==
  +
  +
Penetration is "normally calculated by dividing the number of [[subscriber]]s to a particular service by the population and multiplying by 100."<ref>ITU Glossary of Mobile Cellular Terms 3 (1999) ([http://www.itu.int/osg/spu/ni/fmi/glossary/Glossary_WTDR.pdf full-text]).</ref>}}
   
 
== References ==
 
== References ==

Revision as of 03:20, 3 August 2012

Definitions

Broadband

Penetration is the number or percentage of broadband subscribers per capita or per household.

Security

Penetration is

the unauthorized act of bypassing the security mechanisms of a cryptographic system.[1]

Society

Penetration is "the degree to which a technology has been adopted by a community."[2]

Overview

Penetration is "normally calculated by dividing the number of subscribers to a particular service by the population and multiplying by 100."[3]}}

References

  1. Federal Standard 1037C: Glossary (2000).
  2. Information Technologies Group Center for International Development at Harvard University, Glossary (full-text).
  3. ITU Glossary of Mobile Cellular Terms 3 (1999) (full-text).

See also