Font Size: a A A

S2i Technology Application And Business Model

Posted on:2013-11-22Degree:MasterType:Thesis
Country:ChinaCandidate:Z J YeFull Text:PDF
GTID:2248330395459174Subject:Business Administration
Abstract/Summary:PDF Full Text Request
This paper based on two-dimensional security image technology in the digitalcontent protection and information security research in the field of security and itsbusiness model of reasoning,that the s2i technology can better conform to theChinese market demand,can match with national1025plan new sensor network andmobile electronic business strategic plan, make domestic professional networkintegrated services platform of testing,mobile phone content networking securitycrack down on counterfeit goods inquires the platform and e-commerce platform,toprovide the best solution of the credit system,And then integrated security,crackdown on counterfeit goods,printing and so on industry resources,based on China,radiation global market,set up a public trust the brand,then for countries and peopleto do a little contribution.This paper mainly uses the case analysis,through the theory expounded andempirical research,combining using commercial mode,modular and stakeholdertheory,through consulting,research,on-the-spot investigation methods for s2itechnology application and business model is studied.This paper first puts forward the research background and realistic significance.Then this paper expounds the s2i technology development situation, market generalsituation and competitive advantage. Then through using the theory of businessmodel,this paper analyzes the s2i technology innovation, and on the current s2itechnology existing business model were summarized and studied, and combined withthe development of the enterprise itself, and put forward the transverse, longitudinaland commercial chain profit mode choice, and the business risk and countermeasuresto carry on the thorough analysis. Finally, proposed in this foundation s2i technologyapplication feasibility suggestions.
Keywords/Search Tags:s2i Technology, Anti-fake, Business model
PDF Full Text Request
Related items