The Impact of Information System Security Requirements on Open Source Software Business Model

碩士 === 國立臺灣科技大學 === 資訊管理系 === 97 === There are two noticeable debates for open source software: one is whether or not there is any successful business model for it; the other is whether it is secure enough. From enterprise users’ point of view, is it true that open source is not secure enough to be...

Full description

Bibliographic Details
Main Authors: Chia-Hsin Cheng, 鄭嘉信
Other Authors: Tzong-Chen Wu
Format: Others
Language:zh-TW
Published: 2009
Online Access:http://ndltd.ncl.edu.tw/handle/07595510172407072901
Description
Summary:碩士 === 國立臺灣科技大學 === 資訊管理系 === 97 === There are two noticeable debates for open source software: one is whether or not there is any successful business model for it; the other is whether it is secure enough. From enterprise users’ point of view, is it true that open source is not secure enough to be used in the mission-critical system? Shall such security issues on applying open source software on critical applications make the vendors of open source unable to be profitable from their business? Trying to survey the reasons why some enterprises choose open source software, and enumerating the requirements on building their secure information systems by open source software, we find the fact that the information security requirements do have real impact on the open source software business model. To obtain more meaningful research results, we also go further from the understanding of such impact to figure out the information security requirement details for the enterprise while using open source software. The purpose of the detailed research achievement shall be helpful on improving the business model of the current open source software vendors. Before the conclusion, we will compare the existing working model of a successful open source firm, Red Hat, Inc., to ensure the security impact and requirements we found are really significant to the open source business. This study is expected to be considered in more details for the tuning of open source vendors’ strategies. With the improvement on security issues of open source software, the vendors might find out their own suitable or new business model.