The Impact of Information System Security Requirements on Open Source Software Business Model
碩士 === 國立臺灣科技大學 === 資訊管理系 === 97 === There are two noticeable debates for open source software: one is whether or not there is any successful business model for it; the other is whether it is secure enough. From enterprise users’ point of view, is it true that open source is not secure enough to be...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Published: |
2009
|
Online Access: | http://ndltd.ncl.edu.tw/handle/07595510172407072901 |
id |
ndltd-TW-097NTUS5396014 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-097NTUS53960142015-10-13T14:49:22Z http://ndltd.ncl.edu.tw/handle/07595510172407072901 The Impact of Information System Security Requirements on Open Source Software Business Model 資訊系統安全需求對開放原始碼軟體商業模式之影響 Chia-Hsin Cheng 鄭嘉信 碩士 國立臺灣科技大學 資訊管理系 97 There are two noticeable debates for open source software: one is whether or not there is any successful business model for it; the other is whether it is secure enough. From enterprise users’ point of view, is it true that open source is not secure enough to be used in the mission-critical system? Shall such security issues on applying open source software on critical applications make the vendors of open source unable to be profitable from their business? Trying to survey the reasons why some enterprises choose open source software, and enumerating the requirements on building their secure information systems by open source software, we find the fact that the information security requirements do have real impact on the open source software business model. To obtain more meaningful research results, we also go further from the understanding of such impact to figure out the information security requirement details for the enterprise while using open source software. The purpose of the detailed research achievement shall be helpful on improving the business model of the current open source software vendors. Before the conclusion, we will compare the existing working model of a successful open source firm, Red Hat, Inc., to ensure the security impact and requirements we found are really significant to the open source business. This study is expected to be considered in more details for the tuning of open source vendors’ strategies. With the improvement on security issues of open source software, the vendors might find out their own suitable or new business model. Tzong-Chen Wu 吳宗成 2009 學位論文 ; thesis 64 zh-TW |
collection |
NDLTD |
language |
zh-TW |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 國立臺灣科技大學 === 資訊管理系 === 97 === There are two noticeable debates for open source software: one is whether or not there is any successful business model for it; the other is whether it is secure enough. From enterprise users’ point of view, is it true that open source is not secure enough to be used in the mission-critical system? Shall such security issues on applying open source software on critical applications make the vendors of open source unable to be profitable from their business? Trying to survey the reasons why some enterprises choose open source software, and enumerating the requirements on building their secure information systems by open source software, we find the fact that the information security requirements do have real impact on the open source software business model. To obtain more meaningful research results, we also go further from the understanding of such impact to figure out the information security requirement details for the enterprise while using open source software. The purpose of the detailed research achievement shall be helpful on improving the business model of the current open source software vendors. Before the conclusion, we will compare the existing working model of a successful open source firm, Red Hat, Inc., to ensure the security impact and requirements we found are really significant to the open source business. This study is expected to be considered in more details for the tuning of open source vendors’ strategies. With the improvement on security issues of open source software, the vendors might find out their own suitable or new business model.
|
author2 |
Tzong-Chen Wu |
author_facet |
Tzong-Chen Wu Chia-Hsin Cheng 鄭嘉信 |
author |
Chia-Hsin Cheng 鄭嘉信 |
spellingShingle |
Chia-Hsin Cheng 鄭嘉信 The Impact of Information System Security Requirements on Open Source Software Business Model |
author_sort |
Chia-Hsin Cheng |
title |
The Impact of Information System Security Requirements on Open Source Software Business Model |
title_short |
The Impact of Information System Security Requirements on Open Source Software Business Model |
title_full |
The Impact of Information System Security Requirements on Open Source Software Business Model |
title_fullStr |
The Impact of Information System Security Requirements on Open Source Software Business Model |
title_full_unstemmed |
The Impact of Information System Security Requirements on Open Source Software Business Model |
title_sort |
impact of information system security requirements on open source software business model |
publishDate |
2009 |
url |
http://ndltd.ncl.edu.tw/handle/07595510172407072901 |
work_keys_str_mv |
AT chiahsincheng theimpactofinformationsystemsecurityrequirementsonopensourcesoftwarebusinessmodel AT zhèngjiāxìn theimpactofinformationsystemsecurityrequirementsonopensourcesoftwarebusinessmodel AT chiahsincheng zīxùnxìtǒngānquánxūqiúduìkāifàngyuánshǐmǎruǎntǐshāngyèmóshìzhīyǐngxiǎng AT zhèngjiāxìn zīxùnxìtǒngānquánxūqiúduìkāifàngyuánshǐmǎruǎntǐshāngyèmóshìzhīyǐngxiǎng AT chiahsincheng impactofinformationsystemsecurityrequirementsonopensourcesoftwarebusinessmodel AT zhèngjiāxìn impactofinformationsystemsecurityrequirementsonopensourcesoftwarebusinessmodel |
_version_ |
1717758436447354880 |