Font Size: a A A

Mobile Security Software Solutions For Operation

Posted on:2012-12-30Degree:MasterType:Thesis
Country:ChinaCandidate:L YinFull Text:PDF
GTID:2219330338453192Subject:Business Administration
Abstract/Summary:PDF Full Text Request
With the mobile operator's 3G network construction, the gradual improvement of mobile Internet is gradually penetrate into people's lives and work in various fields. Include to picture and ring download, mobile music, mobile games and video applications, mobile payment, location services, a variety of mobile applications have the rapid development. Although the development of mobile Internet had gone through some twists and turns, and finally, it ushered in a new climax.With the climax of the development of mobile Internet, a variety of mobile Internet applications have the explosive growth. The "smart phone" has become increasingly prominent security issues, a variety of new mobile phone virus, malware, spam, privacy disclosure, malicious security events and other mobile phone chargeback frequent outbreaks. It is because the mobile handset is the Internet entrance and the first guardian of the mobile Internet portal, the first for a variety of virus; mobile phone has become a fortress. Meanwhile, according to latest data released by IDC, the first quarter of 2011 compared to last year, the global smart phone market has been the expansion of 79.7%, showing that penetration of smart phones in 2011 will increase rapidly, information terminal for the user's value will reflect the more obvious and more mobile Internet users will suffer the threat of security incidents. So when people enjoy the convenience of mobile Internet, some mobile applications will be needed for protecting mobile phone security. As the mobile Internet security issues are becoming increasingly serious domestic and foreign security companies have been extending their reach to this field, a variety of mobile security products have emerged. Mobile Internet is a derivative of the traditional Internet, the business model adopted and inherited most of the traditional Internet model, the profit model are generally three kinds:the first is charged to the end-user; the second is through advertising and promotion to customers and advertisers; the third is through industry cooperation, the cooperation of handset makers, built-in software on the mobile phone charges. Compare to the traditional Internet security products, the new mobile Internet security products are relatively large differences and can not copy the business model of traditional products. The current business model of mobile security products is not yet ripe, most companies adopt two strategies:First, free strategies, such as 360 security guards, Kingsoft, Rising and other traditional vendors, they are still in the free phase of the strategy. Although free strategy can attract customers, but as security products is very professional, requiring a large number of inputs, and free will directly affect the company's investment in its resources, which restricts the growth of products; Second, the standard package pricing model, some overseas PC security vendors take only the standard model for charging package, such as Kaspersky, F-Secure and so on, but its drawbacks is that a single product portfolio and fees, will damage the user's initiative, the number of users development will be limited.Taking these two strategies, at present, few mature vendors have become a combination of free and paid business model based on their user needs and demands. This model retains customers by free service, and through different services lets user pay, it become a healthy business model. With the mobile security market gradually matured, the combination of free and paid business models may be more popular. Due to get started, "A combination of free and paid business model" faces so many questions, the most crucial question is that how to draw up the product operations solution.To solve these problems, combined with the author's experience in the mobile internet, this article studies the product of the operation solution for "a combination of free and paid business model"On the issues, the article is divided into five chapters:ChapterⅠ:Introduction to mobile security client, the whole chapter is divided into two parts.The first section is the background and significance of topics, including the mobile security market introduction, market demand, market opportunities and profit model. The second section of the research method:includes literature research, case analysis, questionnaire survey, etc.ChapterⅡ:First, an overview of the research paper cited theories, including the 4Cs,4Ps and Maslow's needs theory, and then make mobile security client operations must face some kind of problem, including:the promotion of model building to obtain the target user, pricing and marketing strategy, pay continuing research. Finally, each type of problem combined with the theoretical basis and proposes solutions.ChapterⅢ:The A's mobile anti-virus client software as an example, the client operating status and outstanding problems, through the second chapter of conclusions and reality, the solution put forward specific ideas, and through operational test, data analysis and user research methods such as, further optimization of the operation and determine the final solution.ChapterⅣ:detailed account of the A cell phone antivirus software company paid the loss of the user's research programs, and conclusions for the enterprise client products to improve the follow-up ideas suggested.Chapter Five:Summary and Implications of the results...
Keywords/Search Tags:mobile internet, mobile security, mobile client, operation solution
PDF Full Text Request
Related items