Marketing Strategy of Secure Flash in the IoT Industry
碩士 === 國立交通大學 === 管理學院科技管理學程 === 106 === With the advent of the Internet of Things, we are entering, or going to enter, a smart life full of digitization and intelligence. However, when all the information is transmitted through the Internet, and then through the cloud to provide convenient services...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Published: |
2018
|
Online Access: | http://ndltd.ncl.edu.tw/handle/xhu7ba |
id |
ndltd-TW-106NCTU5230026 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-106NCTU52300262019-05-16T01:24:31Z http://ndltd.ncl.edu.tw/handle/xhu7ba Marketing Strategy of Secure Flash in the IoT Industry 安全快閃記憶體在物聯網產業的市場行銷策略 Cheng, Yi-Chen 鄭怡貞 碩士 國立交通大學 管理學院科技管理學程 106 With the advent of the Internet of Things, we are entering, or going to enter, a smart life full of digitization and intelligence. However, when all the information is transmitted through the Internet, and then through the cloud to provide convenient services, it also represents our security and privacy are exposed on this open network platform, thus we may be attacked by the hackers at anytime and anywhere. Therefore, along with the progress of the Internet of Things, both terminal devices and cloud services are actively seeking cost-effective security solutions. Is the existing program sufficient to withstand most hacking attacks? Can cost-effectiveness continue to be optimized? It has also become one of the topics most concerned by the Internet of Things industry. However, referring to security, most of people would intuitively believe that relying on the main chip or secure element can solve all security problems, but often overlooked one of the key components of on the PCBA - flash memory. This study analyzes the possible threats of Internet of Things through secondary data analysis, and other primary data case studies and in-depth interviews with experts. Based on the Harvard Business School's description in note of marketing strategies, from market analysis 5C’s, STP, 4P’s, gradually deriving the marketing strategy of secure flash memory in the Internet of Things industry. I also hope that the Internet of Things industry will come out more cost-effective products in the near future to improve our safety and quality while facilitating our lives. Huang, Shih-Ping 黃仕斌 2018 學位論文 ; thesis 51 zh-TW |
collection |
NDLTD |
language |
zh-TW |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 國立交通大學 === 管理學院科技管理學程 === 106 === With the advent of the Internet of Things, we are entering, or going to enter, a smart life full of digitization and intelligence. However, when all the information is transmitted through the Internet, and then through the cloud to provide convenient services, it also represents our security and privacy are exposed on this open network platform, thus we may be attacked by the hackers at anytime and anywhere. Therefore, along with the progress of the Internet of Things, both terminal devices and cloud services are actively seeking cost-effective security solutions. Is the existing program sufficient to withstand most hacking attacks? Can cost-effectiveness continue to be optimized? It has also become one of the topics most concerned by the Internet of Things industry. However, referring to security, most of people would intuitively believe that relying on the main chip or secure element can solve all security problems, but often overlooked one of the key components of on the PCBA - flash memory. This study analyzes the possible threats of Internet of Things through secondary data analysis, and other primary data case studies and in-depth interviews with experts. Based on the Harvard Business School's description in note of marketing strategies, from market analysis 5C’s, STP, 4P’s, gradually deriving the marketing strategy of secure flash memory in the Internet of Things industry. I also hope that the Internet of Things industry will come out more cost-effective products in the near future to improve our safety and quality while facilitating our lives.
|
author2 |
Huang, Shih-Ping |
author_facet |
Huang, Shih-Ping Cheng, Yi-Chen 鄭怡貞 |
author |
Cheng, Yi-Chen 鄭怡貞 |
spellingShingle |
Cheng, Yi-Chen 鄭怡貞 Marketing Strategy of Secure Flash in the IoT Industry |
author_sort |
Cheng, Yi-Chen |
title |
Marketing Strategy of Secure Flash in the IoT Industry |
title_short |
Marketing Strategy of Secure Flash in the IoT Industry |
title_full |
Marketing Strategy of Secure Flash in the IoT Industry |
title_fullStr |
Marketing Strategy of Secure Flash in the IoT Industry |
title_full_unstemmed |
Marketing Strategy of Secure Flash in the IoT Industry |
title_sort |
marketing strategy of secure flash in the iot industry |
publishDate |
2018 |
url |
http://ndltd.ncl.edu.tw/handle/xhu7ba |
work_keys_str_mv |
AT chengyichen marketingstrategyofsecureflashintheiotindustry AT zhèngyízhēn marketingstrategyofsecureflashintheiotindustry AT chengyichen ānquánkuàishǎnjìyìtǐzàiwùliánwǎngchǎnyèdeshìchǎngxíngxiāocèlüè AT zhèngyízhēn ānquánkuàishǎnjìyìtǐzàiwùliánwǎngchǎnyèdeshìchǎngxíngxiāocèlüè |
_version_ |
1719175458285682688 |