The effect of destructive innovation on network security industries
碩士 === 國立臺灣大學 === 工業工程學研究所 === 104 === With the popularity of internet applications, various application systems use the TCP/IP protocol (Transmission Control Protocol/Protocol) being a standard signal transmission, such as electricity, water, air conditioning, temperature control, lighting control,...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Published: |
2016
|
Online Access: | http://ndltd.ncl.edu.tw/handle/58222169440871927968 |
id |
ndltd-TW-104NTU05030057 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-104NTU050300572017-05-14T04:32:18Z http://ndltd.ncl.edu.tw/handle/58222169440871927968 The effect of destructive innovation on network security industries 破壞式創新對網路安全產業之影響 Eng-Wen Lin 林應穩 碩士 國立臺灣大學 工業工程學研究所 104 With the popularity of internet applications, various application systems use the TCP/IP protocol (Transmission Control Protocol/Protocol) being a standard signal transmission, such as electricity, water, air conditioning, temperature control, lighting control, etc. The advantage is the standardization and simplification among various application systems. The disadvantage is that the network hackers and virus attack application systems via TCP/IP. In order to deal with hackers, network information security industries continue to improve their anti-hack technique. Although a variety of information security devices can prevent hacker from attacks, but not every enterprises or government unit is affordable of all the information security protective equipment. This study utilizes the theory of destructive innovation (Christensen 1997) as a tool to analyze the competitive advantage in three aspects: technology, price, innovative business model Finally, the findings of the study are : 1. Firewall to the UTM Firewall is a way of disruptive innovation, and is also the information security device trend; 2. through the disruptive innovation of middle and low-end UTM firewall devices, the device can be more popular; 3. Customers can benefit from a lower price of a high-end UTM firewall through the disruptive innovation of business model. I-Hsuan Hong 洪一薰 2016 學位論文 ; thesis 49 zh-TW |
collection |
NDLTD |
language |
zh-TW |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 國立臺灣大學 === 工業工程學研究所 === 104 === With the popularity of internet applications, various application systems use the TCP/IP protocol (Transmission Control Protocol/Protocol) being a standard signal transmission, such as electricity, water, air conditioning, temperature control, lighting control, etc. The advantage is the standardization and simplification among various application systems. The disadvantage is that the network hackers and virus attack application systems via TCP/IP. In order to deal with hackers, network information security industries continue to improve their anti-hack technique. Although a variety of information security devices can prevent hacker from attacks, but not every enterprises or government unit is affordable of all the information security protective equipment. This study utilizes the theory of destructive innovation (Christensen 1997) as a tool to analyze the competitive advantage in three aspects: technology, price, innovative business model Finally, the findings of the study are : 1. Firewall to the UTM Firewall is a way of disruptive innovation, and is also the information security device trend; 2. through the disruptive innovation of middle and low-end UTM firewall devices, the device can be more popular; 3. Customers can benefit from a lower price of a high-end UTM firewall through the disruptive innovation of business model.
|
author2 |
I-Hsuan Hong |
author_facet |
I-Hsuan Hong Eng-Wen Lin 林應穩 |
author |
Eng-Wen Lin 林應穩 |
spellingShingle |
Eng-Wen Lin 林應穩 The effect of destructive innovation on network security industries |
author_sort |
Eng-Wen Lin |
title |
The effect of destructive innovation on network security industries |
title_short |
The effect of destructive innovation on network security industries |
title_full |
The effect of destructive innovation on network security industries |
title_fullStr |
The effect of destructive innovation on network security industries |
title_full_unstemmed |
The effect of destructive innovation on network security industries |
title_sort |
effect of destructive innovation on network security industries |
publishDate |
2016 |
url |
http://ndltd.ncl.edu.tw/handle/58222169440871927968 |
work_keys_str_mv |
AT engwenlin theeffectofdestructiveinnovationonnetworksecurityindustries AT línyīngwěn theeffectofdestructiveinnovationonnetworksecurityindustries AT engwenlin pòhuàishìchuàngxīnduìwǎnglùānquánchǎnyèzhīyǐngxiǎng AT línyīngwěn pòhuàishìchuàngxīnduìwǎnglùānquánchǎnyèzhīyǐngxiǎng AT engwenlin effectofdestructiveinnovationonnetworksecurityindustries AT línyīngwěn effectofdestructiveinnovationonnetworksecurityindustries |
_version_ |
1718449275042529280 |