The Impact of Information System Security Requirements on Open Source Software Business Model

碩士 === 國立臺灣科技大學 === 資訊管理系 === 97 === There are two noticeable debates for open source software: one is whether or not there is any successful business model for it; the other is whether it is secure enough. From enterprise users’ point of view, is it true that open source is not secure enough to be...

Full description

Bibliographic Details
Main Authors: Chia-Hsin Cheng, 鄭嘉信
Other Authors: Tzong-Chen Wu
Format: Others
Language:zh-TW
Published: 2009
Online Access:http://ndltd.ncl.edu.tw/handle/07595510172407072901
id ndltd-TW-097NTUS5396014
record_format oai_dc
spelling ndltd-TW-097NTUS53960142015-10-13T14:49:22Z http://ndltd.ncl.edu.tw/handle/07595510172407072901 The Impact of Information System Security Requirements on Open Source Software Business Model 資訊系統安全需求對開放原始碼軟體商業模式之影響 Chia-Hsin Cheng 鄭嘉信 碩士 國立臺灣科技大學 資訊管理系 97 There are two noticeable debates for open source software: one is whether or not there is any successful business model for it; the other is whether it is secure enough. From enterprise users’ point of view, is it true that open source is not secure enough to be used in the mission-critical system? Shall such security issues on applying open source software on critical applications make the vendors of open source unable to be profitable from their business? Trying to survey the reasons why some enterprises choose open source software, and enumerating the requirements on building their secure information systems by open source software, we find the fact that the information security requirements do have real impact on the open source software business model. To obtain more meaningful research results, we also go further from the understanding of such impact to figure out the information security requirement details for the enterprise while using open source software. The purpose of the detailed research achievement shall be helpful on improving the business model of the current open source software vendors. Before the conclusion, we will compare the existing working model of a successful open source firm, Red Hat, Inc., to ensure the security impact and requirements we found are really significant to the open source business. This study is expected to be considered in more details for the tuning of open source vendors’ strategies. With the improvement on security issues of open source software, the vendors might find out their own suitable or new business model. Tzong-Chen Wu 吳宗成 2009 學位論文 ; thesis 64 zh-TW
collection NDLTD
language zh-TW
format Others
sources NDLTD
description 碩士 === 國立臺灣科技大學 === 資訊管理系 === 97 === There are two noticeable debates for open source software: one is whether or not there is any successful business model for it; the other is whether it is secure enough. From enterprise users’ point of view, is it true that open source is not secure enough to be used in the mission-critical system? Shall such security issues on applying open source software on critical applications make the vendors of open source unable to be profitable from their business? Trying to survey the reasons why some enterprises choose open source software, and enumerating the requirements on building their secure information systems by open source software, we find the fact that the information security requirements do have real impact on the open source software business model. To obtain more meaningful research results, we also go further from the understanding of such impact to figure out the information security requirement details for the enterprise while using open source software. The purpose of the detailed research achievement shall be helpful on improving the business model of the current open source software vendors. Before the conclusion, we will compare the existing working model of a successful open source firm, Red Hat, Inc., to ensure the security impact and requirements we found are really significant to the open source business. This study is expected to be considered in more details for the tuning of open source vendors’ strategies. With the improvement on security issues of open source software, the vendors might find out their own suitable or new business model.
author2 Tzong-Chen Wu
author_facet Tzong-Chen Wu
Chia-Hsin Cheng
鄭嘉信
author Chia-Hsin Cheng
鄭嘉信
spellingShingle Chia-Hsin Cheng
鄭嘉信
The Impact of Information System Security Requirements on Open Source Software Business Model
author_sort Chia-Hsin Cheng
title The Impact of Information System Security Requirements on Open Source Software Business Model
title_short The Impact of Information System Security Requirements on Open Source Software Business Model
title_full The Impact of Information System Security Requirements on Open Source Software Business Model
title_fullStr The Impact of Information System Security Requirements on Open Source Software Business Model
title_full_unstemmed The Impact of Information System Security Requirements on Open Source Software Business Model
title_sort impact of information system security requirements on open source software business model
publishDate 2009
url http://ndltd.ncl.edu.tw/handle/07595510172407072901
work_keys_str_mv AT chiahsincheng theimpactofinformationsystemsecurityrequirementsonopensourcesoftwarebusinessmodel
AT zhèngjiāxìn theimpactofinformationsystemsecurityrequirementsonopensourcesoftwarebusinessmodel
AT chiahsincheng zīxùnxìtǒngānquánxūqiúduìkāifàngyuánshǐmǎruǎntǐshāngyèmóshìzhīyǐngxiǎng
AT zhèngjiāxìn zīxùnxìtǒngānquánxūqiúduìkāifàngyuánshǐmǎruǎntǐshāngyèmóshìzhīyǐngxiǎng
AT chiahsincheng impactofinformationsystemsecurityrequirementsonopensourcesoftwarebusinessmodel
AT zhèngjiāxìn impactofinformationsystemsecurityrequirementsonopensourcesoftwarebusinessmodel
_version_ 1717758436447354880