政大機構典藏-National Chengchi University Institutional Repository(NCCUR):Item 140.119/38381
English  |  正體中文  |  简体中文  |  Post-Print筆數 : 27 |  Items with full text/Total items : 113318/144297 (79%)
Visitors : 51072685      Online Users : 958
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version
    Please use this identifier to cite or link to this item: https://nccur.lib.nccu.edu.tw/handle/140.119/38381


    Title: 電腦病毒特性與病毒/防毒廠商互動研究
    The Computer Virus Pattern and Interaction of Virus & Anti-Virus Companies
    Authors: 吳宣諭
    Contributors: 李仁芳
    吳宣諭
    Keywords: 電腦病毒
    防毒
    駭客
    動態競爭策略
    創新管理
    創造力
    Computer Virus
    Anti-virus
    Hacker
    Dynamic Competitive Strategy
    innovation management
    creativity
    Date: 2007
    Issue Date: 2010-04-08 16:06:54 (UTC+8)
    Abstract: 傳統商學院論文所探討的競爭態勢多半聚焦於廠商間的競爭,著重組織對組織、集團對集團的互動過程,本研究提出競爭的另一種型態,描述由個體所組成的非正規群體(駭客)與組織集團(廠商)的競爭,以病毒與防毒軟體廠商的互動過程為例,透過歷史的描述呈現電腦病毒、防毒廠商、戰爭三個構面。

    本研究以病毒為描述主體作為邪惡的反方角色,並且深入探討其背後的核心操控者:駭客們的動機與行為,之後將相對應的正方角色:防毒公司拉進來,詮釋病毒與防毒軟體的互動過程。最後,整理出在歷史的演進之下,病毒/防毒戰爭過程中的脈絡與攻防特性,並演譯歸納出病毒的五大創新特點:技術Deeper、影響範圍Bigger、傳播速度Faster、病毒行為Smarter、產業結構Robuster。

    綜觀國內外商學院論文,尚無類似論述,其突破性貢獻有三:其一,本研究提出以病毒負效用的特性作為創新的論述,至今無人提出,雖可議卻也空前;其二,本研究突破過去討論病毒相關議題僅考量單項變數的限制,以全面性的系統觀點探討其特性;其三,此類議題的相關論文處理方式多半以量化、實作亦或次級資料整理為主,本研究則進行深入訪談的田野調查。

    基於創新來自於邊陲的概念,本論文希望排除道德的限制,單純從特性上加以考量其創新,並非鼓勵或褒揚之意。希望提供企業以另一個層次的角度思考本文所提出之創新觀點,應用於研發管理、創新管理、行銷管理、策略管理等領域,興許能有不同的創新解決方案。
    Most papers from the traditional business school discuss the competitions among manufacturers, and focus on the interactions between organizations and between groups. However, in this paper, we propose another type of competition - the competition between the hacker (composed by the individuals or non-regular organization) and the manufacturer (organizations or groups). Here, we take the interaction between virus and anti-virus software manufacturers as example to describe the 3 dimensions among computer virus, anti-virus software manufactures and their contests.

    In this thesis, we take virus as the evil side and expect to dig out the motivation and behavior of the hackers, and then we take the anti-virus software manufactures as the counter side to discuss the interaction between virus and anti-virus software. Finally, we sum up the 5 innovative characteristics of the virus: the skill is deeper, the incidence is bigger, the spreading speed is faster, the virus behavior is smarter and the industrial structure is more robust.

    In this thesis, there are 3 unprecedented distributions: first, we propose the innovative concept by using the disutility characteristic of virus; second, we breakthrough the restriction that only taking the single parameter into consideration, and we take the total system viewpoints into consideration to discuss its characteristics; third, instead of quantification, experimentation, and sub-data collection, we do the research through the interview and the field work.

    In this thesis, we wish to eliminate morals constraints, just consider its innovative concept, and not mean to encourage or commend it. Furthermore, we expect to provide the enterprises another way to think about this new concept, and apply it in research and development management, innovation management, marketing management, strategy management, and so on. We believe that there will be some other different innovative solutions.
    Reference: 一、英文部分
    1. Benjamin Lewin(2003), Genes VIII, Addison-Wesley.
    2. Chen, Ming-Jer, Smith, Ken G., and Grimm, C. M.(1992), "Action Characteristics as Predictors of Competitive Response", Managent Science, 38:439-455.
    3. Chen, Ming-Jer, and MacMillan, Ian C.(1992), "Nonresponse and Delayed Response to Competitive Moves: The Roles of Competitor Dependence and Action Irreversibility," Academy of Management Journal, 35(3):539-570.
    4. Chen, Ming-Jer, and Miller(1994), "Competitive Attack,Retaliation and Performance: An Expectancy-Valence Framework", Strategic Management Journal, 15:85-102.
    5. Ed Skoudis, Lenny Zeltser(2003) "Malware: Fighting Malicious Code" ,PrenticeHall PTR.
    6. Fred Cohen(1984), "Computer Viruses Theory and Experiments," in Proc. Conf. on National Computer Security, pp. 240-263.
    7. Steube, Gerard(2004), "A logistic regression model to distinguish white hat and black hat hackers", Capella University.
    8. Steve Levy(1994), "Hackers:Heroes of the Computer Revolution", Polachek.
    二、中文部分
    碩博士論文
    1. 吳欣怡(2005), 駭客文化與教育,臺北市立教育大學國民教育研究所碩士論文
    2. 林志宗(2004), 軟體對抗病毒自我防衛技術實作之研究, 中國文化大學資訊管理研究所碩士論文
    3. 張德仁(2000), 電腦病毒變體引擎之研製, 國防大學中正理工學院電子工程研究所碩士論文
    4. 黃厚銘(2005), 資訊時代的科技、權力與自由─網路空間、駭客精神與Foucault的逾越問題, 國立政治大學社會學研究所碩士論文
    5. 劉雨菁(2002), 防毒軟體效能評估因素之研究, 中央員警大學資訊管理研究所碩士論文
    期刊/報章雜誌
    1. Scott Berinato(2008/2), 駭客服務業, 中文版哈佛商業評論.
    2. 生方林、熊忠(2005),生物學通報第34卷第1期,浙江大學生物系.
    3. 李忠存(2007/8), 拆解網絡病毒黑金交易, IT時代週刊, 廣東省電子學會.
    4. 李盈穎(2005/9), 駭客帝國, 商業週刊930期.
    5. 高雅欣(2005/03/09), 寫病毒已經由「興趣」轉為「職業」, iThome 每日新聞報.
    6. 紀孟宏(2001/10),電腦病毒之惡性程式進化論, e趨勢季刊,趨勢網路軟體教育基金會.
    7. 周偉、吳其冰(2008/01/29), 誰在批量生產駭客, 中國, 經濟參考報.
    8. 林克倫(2007/7/31), 大陸駭客大爆創富秘辛, 中國時報/兩岸新聞/A17版.
    9. 陳錫仁(1999), 當「工程倫理」不彰「道德風險」很高, 《聯合報》1999/05/03/ 15版/民意論壇.
    10. 楊直(1999), CIH所揭露的資訊黑社會危機,《聯合報》1999年5月3日, 頁15.
    書籍
    1. Adam L. Penenberg & Marc Barry(2000), "Spooked:espionage in corporate America", 劉孟華譯, 圈套、搜密、駭客, 遠流出版公司.
    2. Bruce Schneier(2001), Secrets and Lies: Digital Security in a Networked World, 吳蔓玲譯, 秘密與謊言:如何建構網路安全防衛系統, 商周出版社.
    3. Jon Katz(2002), "Geeks: How Two Lost Boys Rode the Internet out of Idaho", 李芳齡譯, 網路小子, 聯經出版社
    4. Kate Hafner(1994), Cyberpunk : outlaws and hackers on the computer frontier, 尚青松譯, 電腦叛客, 天下文化.
    5. Pekka Himanen(2002), "The hacker ethic, and the spirit of the information age", 劉瓊雲譯,駭客倫理與資訊時代精神,大塊文化.
    6. Paul Graham(2006), Hackers & Painters - Big Ideas from the Computer Age, 莊友欣、莊惠淳譯, 駭客與畫家, 歐萊禮.
    7. Pekka Himanen(2002), "The hacker ethic, and the spirit of the information age", 劉瓊云譯,駭客倫理與資訊時代精神,大塊文化.
    8. Stephen Segaller(2004), The Wealth of Knowledge, 劉孟華譯, 鬼才2.0.1:連接世界的網路書呆子, 遠流出版社.
    9. 施威銘(1990), 電腦病毒徹底研究, 旗標出版社.
    10. 陳明哲(2008), 動態競爭策略探微:理論、實證與應用, 智勝出版社
    11. 陳清芳(2002), 電腦病毒紅皮書, 趨勢網路軟體教育基金會.
    12. 麥留芳(1991), 個體與集體犯罪-系統犯罪學初探, 巨流圖書公司.
    13. 廖婉茹(2007), 分子生物學(Molecular Biology), 五南出版社.
    三、網頁部分
    1. CIH病毒, 維基百科, http://zh.wikipedia.org/wiki/CIH病毒
    2. Consumer Reports(2007/9), U.S. Consumers Lose More Than $7 Billion to Online Threats, http://www.consumerreports.org/cro/cu-press-room/pressroom/archive/2007/09/0709_eng0709stn.htm
    3. GettyImages, http://www.gettyimages.com/Home.aspx
    4. Hannah Clark(2005/6/23), Jobs Of The Future, Forbes, http://www.forbes.com/2006/05/20/jobs-future-work_cx_hc_06work_0523jobs.html
    5. Trend Micro Inc. http://www.trendmicro.com.tw
    6. 三十六計, 維基百科, http://zh.wikipedia.org/wiki/三十六計
    7. 中國瑞星反病毒中心, http://www.rising.com.cn/
    8. 王應達(2008/3),另一種經濟:數位黑市,資訊安全龍捲風(ZDNet) http://www.zdnet.com.tw/enterprise/column/security/
    9. 王應達(2008/3),駭客世界的商業模式,資訊安全龍捲風(ZDNet) http://www.zdnet.com.tw/enterprise/column/security/
    10. 台大資工系1997年語言課程之電腦病毒專題報告, http://www.csie.ntu.edu.tw/~wcchen/asm98/asm/asm98.htm
    11. 忘川(2008/05/20), 網路黑色產業鏈蓄勢待發, 賽迪網, http://news.ccidnet.com/art/1032/20080520/1453525_1.html
    12. 防毒總體檢-病毒家族大掃描, http://www.digitimes.com.tw/Ext/Ext.asp?BigExtID=446
    13. 於達維,張敏(2007), 黑色的病毒產業, 人民網,
    http://media.people.com.cn/BIG5/22114/46419/83623/5739817.html
    14. 孫子兵法, 維基百科, http://zh.wikipedia.org/wiki/孫子兵法
    15. 陳芳丹(2007年4月2日), 揭秘病毒產業鏈, 計算機世界報http://www2.ccw.com.cn/07/0712/c/0712c04_1.html
    16. 電腦病毒發展史話, 新華網, http://big5.xinhuanet.com/gate/big5/news.xinhuanet.com/internet/2008-03/04/content_7713661.htm
    17. 彭梧(2008), 網遊行竊直指「產業化」方向, 新京報, http://www.gmw.cn/content/2008-03/14/content_748361.htm
    18. 新華社(2007/2/16),「熊貓燒香」案解密網絡病毒產業鏈, http://big5.xinhuanet.com/gate/big5/news.xinhuanet.com/legal/2007-02/16/content_57 45932.htm
    19. 電腦病毒與防治專題, http://www.ascc.sinica.edu.tw/nl/86/1316/05.txt
    20. 網易學院(2007-03),「灰鴿子」木馬背後龐大的黑色產業鏈條, http://tech.163.com/07/0316/00/39LRA85B00091KUI.html
    21. 蔡學鏞(2001), 香雞排三部曲, http://jerrylovesrebol.blogspot.com/
    22. 鍾元凱(1998), 電腦病毒世界探秘, http://www.csie.ntu.edu.tw/~wcchen/asm98/asm/proj/b85202030/a12.txt
    Description: 碩士
    國立政治大學
    科技管理研究所
    95359009
    96
    Source URI: http://thesis.lib.nccu.edu.tw/record/#G0095359009
    Data Type: thesis
    Appears in Collections:[Graduate Institute of Technology and Innovation Management] Theses

    Files in This Item:

    File Description SizeFormat
    900901.pdf388KbAdobe PDF2875View/Open
    900902.pdf970KbAdobe PDF2837View/Open
    900903.pdf394KbAdobe PDF2883View/Open
    900904.pdf483KbAdobe PDF2904View/Open
    900905.pdf1852KbAdobe PDF22723View/Open
    900906.pdf412KbAdobe PDF21501View/Open
    900907.pdf414KbAdobe PDF21830View/Open


    All items in 政大典藏 are protected by copyright, with all rights reserved.


    社群 sharing

    著作權政策宣告 Copyright Announcement
    1.本網站之數位內容為國立政治大學所收錄之機構典藏,無償提供學術研究與公眾教育等公益性使用,惟仍請適度,合理使用本網站之內容,以尊重著作權人之權益。商業上之利用,則請先取得著作權人之授權。
    The digital content of this website is part of National Chengchi University Institutional Repository. It provides free access to academic research and public education for non-commercial use. Please utilize it in a proper and reasonable manner and respect the rights of copyright owners. For commercial use, please obtain authorization from the copyright owner in advance.

    2.本網站之製作,已盡力防止侵害著作權人之權益,如仍發現本網站之數位內容有侵害著作權人權益情事者,請權利人通知本網站維護人員(nccur@nccu.edu.tw),維護人員將立即採取移除該數位著作等補救措施。
    NCCU Institutional Repository is made to protect the interests of copyright owners. If you believe that any material on the website infringes copyright, please contact our staff(nccur@nccu.edu.tw). We will remove the work from the repository and investigate your claim.
    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback