The Strategies of Competitiveness Development for Information Security Industry
碩士 === 國立臺灣大學 === 工業工程學研究所 === 106 === Following the application of information technology, information systems have been utilized by enterprises, the public authorities, individuals to information sharing. Those activities not only altered the values of information and its inertia of utilization, b...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Published: |
2018
|
Online Access: | http://ndltd.ncl.edu.tw/handle/6k75q5 |
id |
ndltd-TW-106NTU05030033 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-106NTU050300332019-05-30T03:50:56Z http://ndltd.ncl.edu.tw/handle/6k75q5 The Strategies of Competitiveness Development for Information Security Industry 資訊安全產業競爭發展策略 Mao-Hsun Huang 黃茂勲 碩士 國立臺灣大學 工業工程學研究所 106 Following the application of information technology, information systems have been utilized by enterprises, the public authorities, individuals to information sharing. Those activities not only altered the values of information and its inertia of utilization, but also reiterate the patterns of economic activities. Due to the endless of the issues of information security and the events of jeopardies of information security, the protection of information security has become the crucial consideration for global economic development and economic transformation. Companies of information security thus are competitive to strengthen the market shares of information security. In other words, how to build competitive development strategies is the key for those companies who engaged in information security business. Endpoint Security Vendor is the research object to scrutinize how superiorities, weakness, the business opportunities and the business threats of information Security Company build its competitive development strategies in information security industry. Synthesizing the four possible strategies in four business situations, Endpoint Security Vendor could advocate three competitive strategies for industry development: follow adaptive security strategy to development a detection and response professional system; to bridge professional partners through niche markets; to expedite information security investment market as well as expand the potential market. 吳政鴻 2018 學位論文 ; thesis 31 zh-TW |
collection |
NDLTD |
language |
zh-TW |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 國立臺灣大學 === 工業工程學研究所 === 106 === Following the application of information technology, information systems have been utilized by enterprises, the public authorities, individuals to information sharing. Those activities not only altered the values of information and its inertia of utilization, but also reiterate the patterns of economic activities. Due to the endless of the issues of information security and the events of jeopardies of information security, the protection of information security has become the crucial consideration for global economic development and economic transformation. Companies of information security thus are competitive to strengthen the market shares of information security. In other words, how to build competitive development strategies is the key for those companies who engaged in information security business. Endpoint Security Vendor is the research object to scrutinize how superiorities, weakness, the business opportunities and the business threats of information Security Company build its competitive development strategies in information security industry.
Synthesizing the four possible strategies in four business situations, Endpoint Security Vendor could advocate three competitive strategies for industry development: follow adaptive security strategy to development a detection and response professional system; to bridge professional partners through niche markets; to expedite information security investment market as well as expand the potential market.
|
author2 |
吳政鴻 |
author_facet |
吳政鴻 Mao-Hsun Huang 黃茂勲 |
author |
Mao-Hsun Huang 黃茂勲 |
spellingShingle |
Mao-Hsun Huang 黃茂勲 The Strategies of Competitiveness Development for Information Security Industry |
author_sort |
Mao-Hsun Huang |
title |
The Strategies of Competitiveness Development for Information Security Industry |
title_short |
The Strategies of Competitiveness Development for Information Security Industry |
title_full |
The Strategies of Competitiveness Development for Information Security Industry |
title_fullStr |
The Strategies of Competitiveness Development for Information Security Industry |
title_full_unstemmed |
The Strategies of Competitiveness Development for Information Security Industry |
title_sort |
strategies of competitiveness development for information security industry |
publishDate |
2018 |
url |
http://ndltd.ncl.edu.tw/handle/6k75q5 |
work_keys_str_mv |
AT maohsunhuang thestrategiesofcompetitivenessdevelopmentforinformationsecurityindustry AT huángmàoxūn thestrategiesofcompetitivenessdevelopmentforinformationsecurityindustry AT maohsunhuang zīxùnānquánchǎnyèjìngzhēngfāzhǎncèlüè AT huángmàoxūn zīxùnānquánchǎnyèjìngzhēngfāzhǎncèlüè AT maohsunhuang strategiesofcompetitivenessdevelopmentforinformationsecurityindustry AT huángmàoxūn strategiesofcompetitivenessdevelopmentforinformationsecurityindustry |
_version_ |
1719195821156597760 |