透過您的圖書館登入
IP:3.144.154.208
  • 學位論文

破壞式創新對網路安全產業之影響

The effect of destructive innovation on network security industries

指導教授 : 洪一薰

摘要


隨著網際網路應用的普及並且深入各個應用領域,當TCP/IP(Transmission Control Protocol /Internet Protocol)的使用標準化之後,各種應用系統都以TCP/IP當信號傳輸的協定,如電力、水力、空調、溫控、燈控等。優點是各應用系統的溝通標準化、簡單化。缺點是網路駭客入侵以及病毒的傳遞也順著TCP/IP的規範進行。為了應付駭客攻擊,網路資訊安全產業不斷地提升他們的防駭技術。多樣化的資安設備雖然可以防止駭客攻擊,但是並不是每一個企業或政府單位買得起所有的資安防護設備。本研究的目的主要是以Christensen(1997)所提出的破壞式創新理論的三個策略從技術、價格、商業模式的創新方法來驗證從防火牆到UTM(Unified Threat Management)防火牆的破壞式創新模式,尋找技術有效,價格合理的資訊安全設備。本研究結果為:1. 防火牆到UTM防火牆是一個破壞式創新的途徑,也成為後來資安設備的趨勢、2. UTM防火牆在中低階設備透過價格上的破壞性創新,使得設備更普及、3. UTM中高階防火牆可以透過商業模式的破壞式創新模式,達成價格降低全民受惠,並且建構更全面的防駭客攻擊的目的。

並列摘要


With the popularity of internet applications, various application systems use the TCP/IP protocol (Transmission Control Protocol/Protocol) being a standard signal transmission, such as electricity, water, air conditioning, temperature control, lighting control, etc. The advantage is the standardization and simplification among various application systems. The disadvantage is that the network hackers and virus attack application systems via TCP/IP. In order to deal with hackers, network information security industries continue to improve their anti-hack technique. Although a variety of information security devices can prevent hacker from attacks, but not every enterprises or government unit is affordable of all the information security protective equipment. This study utilizes the theory of destructive innovation (Christensen 1997) as a tool to analyze the competitive advantage in three aspects: technology, price, innovative business model Finally, the findings of the study are : 1. Firewall to the UTM Firewall is a way of disruptive innovation, and is also the information security device trend; 2. through the disruptive innovation of middle and low-end UTM firewall devices, the device can be more popular; 3. Customers can benefit from a lower price of a high-end UTM firewall through the disruptive innovation of business model.

參考文獻


蔡明忠(2016),產經新聞,破壞式創新才能生存
陳忠鴻(2004),應用於入侵偵測之創新樣式搜尋演算法
鍾啟川(2014),高科技Apple 蘋果公司及傳產衛浴成霖集團破壞式創新個案研究
韓燕甯(2008),從開放式創新觀點探討NTT DoCoMo平台型經營模式
參考文獻

被引用紀錄


張善存(2017)。智慧取貨服務之破壞式創新與商業模式分析〔碩士論文,朝陽科技大學〕。華藝線上圖書館。https://www.airitilibrary.com/Article/Detail?DocID=U0078-2712201714433675

延伸閱讀