天天看點

周日靜學(161):創新複刻論文之研究對象和關鍵詞定義

作者:LearningYard學苑
周日靜學(161):創新複刻論文之研究對象和關鍵詞定義

分享興趣,傳播快樂,

增長見聞,留下美好。

親愛的您,這裡是LearingYard學苑!

今天小編為您帶來創新複刻論文之研究對象和關鍵詞定義。

歡迎您的通路!

Share interest, spread happiness,

increase knowledge, and leave beautiful.

Dear, this is the LearingYard Academy!

Today, the editor brings “ Defining the research subject and key words for innovative replication papers".

Welcome to visit!

内容摘要:Abstract

本期推文将從思維導圖、精讀内容、知識補充三個方面介紹創新複刻論文之研究對象和關鍵詞定義。

This issue's tweet will introduce the journal article 《Supply chain operations considering fairness concerns and their negotiation rupture points》 from three aspects: mind mapping, detailed reading content, and supplementary knowledge, focusing on defining the research subject and key words for innovative replication papers.

思維導圖:Mind mapping

周日靜學(161):創新複刻論文之研究對象和關鍵詞定義

精讀内容:Intensive reading content

一、研究對象 Research subject

創新複刻論文的研究對象為軟體治理成本。

The research subject of the innovative replication paper is the cost of software governance.

二、關鍵詞定義 Keywords definition

1、軟體供應鍊 Software supply chain

軟體供應鍊是指軟體從軟體供應商到達使用者手中并被使用者使用的整個過程中相關環節的連接配接,從軟體設計幵始,到代碼編寫與軟體生成,再到軟體分發與使用者下載下傳,并最終由使用者使用的一個軟體供應商與軟體使用者之間,緊密圍繞軟體,由幵發環節,傳遞環節和使用環節三大環節所組成的鍊狀結構。

The software supply chain refers to the connections between the relevant links in the entire process from the software supplier to the user who uses it. Starting from software design, to code writing and software generation, then to software distribution and user download, and finally used by the user, it is a chain-like structure closely centered on software between software suppliers and software users, consisting of three major links: development, delivery, and usage.

2、資訊洩露 Information leakage

資訊洩露是指未經授權的任一方檢視資訊時發生的情況。洩露可能是意外行為、惡意的内部人員或外部人員操作,或者是丢失或被盜的裝置中包含敏感資訊且未加密或被解鎖。軟體供應鍊的資訊洩露是指在軟體開發和分發過程中,敏感資訊、源代碼、憑證等被未經授權的第三方通路或竊取。

Information leakage refers to the incidents that occur when any unauthorized party views the information. Leaks can be accidental actions, malicious operations by internal or external individuals, or sensitive information contained in lost or stolen devices that are not encrypted or locked. Information leakage in the software supply chain refers to the access or theft of sensitive information, source code, credentials, etc. by unauthorized third parties during the software development and distribution process.

3、資訊安全 Information security

軟體供應鍊中的資訊安全包括各階段自身的編碼、工具、裝置以及軟體供應鍊上遊企業、社群或個人的代碼、子產品及服務的安全,以及軟體傳遞、應用安全的總和。

Information security in the software supply chain encompasses the security of coding, tools, and devices at each stage, as well as the code, modules, and services from upstream enterprises, communities, or individuals in the software supply chain, and the overall security of software delivery and application.

4、軟體治理 Software Governance

面對如今越來越複雜的軟體供應鍊攻擊以及企業在軟體供應鍊安全治理中存在的困難,需要建構覆寫軟體供應鍊全生命周期的安全治理體系,在軟體全生命周期内加強安全治理水準,提升軟體系統的安全營運和風險抵抗能力。

In response to the increasingly complex software supply chain attacks and the difficulties that enterprises face in managing software supply chain security, it is necessary to establish a comprehensive security governance system that covers the entire lifecycle of the software supply chain. This system should enhance the level of security governance throughout the entire lifecycle of the software, improving the operational security and risk resilience of software systems.

5、軟體服務供應鍊 Software service supply chain

由軟體開發商與服務內建商、客戶企業組成的軟體服務供應鍊。軟體開發商向服務內建商提供軟體,以及相關的咨詢、需求分析、安裝測試、維護、更新等,服務內建商向客戶企業提供咨詢、需求分析等售前服務,并向客戶企業銷售軟體。

A software service supply chain composed of software developers, service integrators, and client enterprises. Software developers provide software to service integrators, along with related consulting, requirement analysis, installation testing, maintenance, upgrades, etc. Service integrators offer pre-sale services such as consulting and requirement analysis to client enterprises and sell software to them.

6、軟體授權 Software licensing

軟體授權是軟體保護概念的延伸和發展。其目标對象同時涵蓋了開發商和最終使用者兩個方面。其目的是在保護軟體不被盜版的同時,為開發商創造更友善、更靈活的銷售模式。

Software licensing is an extension and development of the software protection concept. Its target subjects include both developers and end-users. The goal is to protect software from piracy while creating more convenient and flexible sales models for developers.

軟體授權在實作軟體保護技術的基礎上,能夠提供從軟體授權的設計、開發內建、調試,到軟體授權的生成、分發、管理一整套完善的解決方案。從傳統的軟體保護過渡到軟體授權,不僅是軟體保護技術在網際網路時代發展的必然結果,也是開發商降低軟體的保護、發行、管理和維護成本,更快響應使用者需求和市場的變化的強烈願望。

Based on the implementation of software protection technology, software licensing can provide a complete set of solutions from the design, development integration, and debugging of software licenses to the generation, distribution, and management of software licenses. The transition from traditional software protection to software licensing is not only an inevitable result of the development of software protection technology in the internet age but also a strong desire of developers to reduce the costs of software protection, distribution, management, and maintenance, and to respond more quickly to user needs and market changes.

7、銷售政策 Sales strategy

銷售政策是指實施銷售計劃的各種因素,包括:産品、價格、廣告、管道、促銷及立地條件,是一種為了達成銷售目的之各種手段的最适組合而非最佳組合。銷售政策即公司産品/服務投放市場的理念。本文所研究的銷售政策是軟體開發商向軟體內建商和客戶銷售軟體産品的政策,包括“授權”和“授權+直銷”兩種政策。

Sales strategy refers to various factors implemented in a sales plan, including: product, price, advertising, channel, promotion, and location conditions. It represents the most suitable combination of various means to achieve sales objectives rather than the optimal combination. The sales strategy is the concept of how a company's products/services are introduced to the market. This article studies the sales strategies used by software developers to sell software products to software integrators and customers, including "licensing" and "licensing + direct sales" strategies.

知識補充:Knowledge supplement

1、軟體治理成本包括以下幾個方面:

1、The costs of software governance include the following aspects:

周日靜學(161):創新複刻論文之研究對象和關鍵詞定義
周日靜學(161):創新複刻論文之研究對象和關鍵詞定義

今天的分享就到這裡了。

如果您對今天的文章有獨特的想法,

歡迎給我們留言,

讓我們相約明天。

祝您今天過得開心快樂!

That's all for today's sharing.

If you have a unique idea about the article,

please leave us a message,

and let us meet tomorrow.

I wish you a nice day!

參考資料:百度、ChatGPT

本文由LearningYard學苑整理并發出,如有侵權請聯系删除。

參考文獻:[1] 周振飛. 軟體供應鍊污染機理與防禦研究 [D]. 北京: 北京郵電大學, 2018.

[2] 何熙巽, 張玉清, 劉奇旭. 軟體供應鍊安全綜述 [J]. 資訊安全學報, 2020, 5(1): 57-73.

[3] 任廷海, 周茂森, 曾能民. 軟體服務供應鍊中軟體開發商的授權銷售與市場入侵政策 [J/OL]. 中國管理科學, 2022, 1(1): 1-14.

文案|Whisper

排版|Whisper

稽核|Wang