Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Dominerande affärsmodeller inom området informationssäkerhet
Blekinge Institute of Technology, School of Management.
Blekinge Institute of Technology, School of Management.
2009 (Swedish)Independent thesis Advanced level (degree of Master (One Year))Student thesisAlternative title
Business models within information security. (Which are the dominant in the area?) (English)
Abstract [sv]

Computers together with Internet have been growing enormously, during the last decade and the area of information technology has been growing in the same speed. As long as the surrounding environment evolves, the business models must within the IT-area, keep the same pace. So, how do business corporations handle this change to attract customers? How do the dominant business models look like? In many cases, they are apparently much the same. But what differences can we see and what areas can be improved? We have showed that the IT area isn’t just one, it consist of several segments. These segments are pretty different but can still in many ways use similar business models. To have a chance to explore existing dominant business models, we decided to simplify existing models. The result of our simplified model showed that “a packaged solution” is one business model that companies utilize in large extent. We could also confirm that education is something that has been left behind. (This was confirmed already 2002 by M. Gustafsson and C. Heed). If companies have the possibility to integrate education in their existing models, they could attain much greater market shares. This work will show what segments information technology consists of and which kind of dominant business models that is in use. It will also provide knowledge for further examinations, which we also see as necessary.

Place, publisher, year, edition, pages
2009. , p. 78
Keywords [sv]
Business models, Information Security, IT-Security, Administrative Security
National Category
Computer Sciences Business Administration
Identifiers
URN: urn:nbn:se:bth-1196Local ID: oai:bth.se:arkivex8CE6A46992472681C1257648006DB380OAI: oai:DiVA.org:bth-1196DiVA, id: diva2:828359
Uppsok
Technology
Supervisors
Available from: 2015-05-22 Created: 2009-10-07 Last updated: 2018-01-11Bibliographically approved

Open Access in DiVA

fulltext(720 kB)259 downloads
File information
File name FULLTEXT01.pdfFile size 720 kBChecksum SHA-512
e62543e12282e004f744b206c1f8475229f8f791aa9ebb1f2ca778f731d5dfb6cf6a04b97010acea89463a339cf93d6766a400c69e7665a1901f5ec575d57b32
Type fulltextMimetype application/pdf

By organisation
School of Management
Computer SciencesBusiness Administration

Search outside of DiVA

GoogleGoogle Scholar
Total: 260 downloads
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

urn-nbn

Altmetric score

urn-nbn
Total: 144 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf