docs/diploma

diff thesis/tex/2-MarketAnalysis.tex @ 212:bbbaf7b328f8

improved swot analysis texts
author meillo@marmaro.de
date Sun, 04 Jan 2009 11:22:21 +0100
parents f2b8481789f6
children 9f30e6625164
line diff
     1.1 --- a/thesis/tex/2-MarketAnalysis.tex	Sun Jan 04 10:28:40 2009 +0100
     1.2 +++ b/thesis/tex/2-MarketAnalysis.tex	Sun Jan 04 11:22:21 2009 +0100
     1.3 @@ -123,45 +123,46 @@
     1.4  
     1.5  A \NAME{SWOT} analysis regards the strengths and weaknesses of a subject against the opportunities and threats of its market. The slightly altered form called \name{Dialectical {\smaller SWOT} analysis}, which is used here, is described in \cite{powerof2x2}. \NAME{SWOT} analysis should always focus on a specific specific goal to reach with the product. In this case, the main goal is to make email future-safe.
     1.6  
     1.7 +The two dimension---a subject and the market---are regarded in relation to each other by the analysis. Here the analysis shall be driven by the market's dimension. Thus first opportunities of the market are identified and split into being stengths or weaknesses of email. Then the same is done for threats of the market.
     1.8 +
     1.9 +\subsubsection*{Threats}
    1.10 +
    1.11  The market's main threat is \emph{spam}, also named \name{junk mail} or \name{unsolicited commercial email} (\NAME{UCE}). Panda Security and Commtouch state in their \name{Email Threats Trend Report} for the second Quarter of 2008: ``Spam levels throughout the second quarter averaged 77\%, ranging from a low of 64\% to a peak of 94\% of all email [...]''\cite[page 4]{panda:email-threats}. The report sees the main reason in the bot nets consisting of zombie computers: ``Spam and malware levels remain high for yet another quarter, powered by the brawny yet agile networks of zombie \NAME{IP}s.''\cite[page 1]{panda:email-threats} This is supported by IronPort Systems: ``More than 80 percent of spam now comes from a `zombie'---an infected \NAME{PC}, typically in a consumer broadband network, that has been hijacked by spammers.''\cite{ironport:zombie-computers}. Positive for \MTA{}s is, that they are not the main source for spam, but it is only a small delight. Spam is a general weakness of the email system, because it can not prevent it.
    1.12  
    1.13 -\begin{quote}
    1.14 -Since receivers pay the bulk of the costs for spam (including most obviously their time to delete all that incoming spam), spam use will continue to rise until effective technical and legal countermeasures are deployed, or until people can no longer use email.
    1.15 -\url{http://www.dwheeler.com/guarded-email/guarded-email.html}
    1.16 -\end{quote}
    1.17  
    1.18 ----
    1.19 +\subsubsection*{Opportunities}
    1.20  
    1.21 -Spam is a major threat nowadays and the goal is to reduce it to a bearable level (see section \ref{sec:swot-analysis}). Spam fighting is a war are where the good guys tend to lose. Putting too much effort there will result in few gain. Real success will only be possible with new---better---protocols and abandonning the weak legacy technologies. Hence \masqmail\ should be able to provide state-of-the-art spam protection, but not more.
    1.22 +Opportunities of the market are large data transfers, coming from multimedia content, which becomes popular. If email is used as basis for unified messaging, lots of voice and video mail will need to be transferred. Email is weak related to that kind of data: the data needs to be encoded to \NAME{ASCII} and stresses mail servers a lot.
    1.23  
    1.24 -Spam is a major threat to email, as described in section \ref{sec:swot-analysis}. The two main problems are forgable sender addresses and that it is cheap to send hundreds of thousands of messages. Hence, spam senders can operate in disguise and have minimal cost.
    1.25 -
    1.26 ----
    1.27 -
    1.28 -% fixme: hashcash
    1.29 -
    1.30 -Opportunities of the market are large data transfers, coming from multimedia content, which becomes popular. If email is used as basis for unified messaging, lots of voice and video mail will need to be transferred. Email is weak related to that kind of data: the data needs to be encoded to \NAME{ASCII} and and stresses mail servers a lot.
    1.31 -
    1.32 -The use of various hardware to access mail is another opportunity of the market. The software and infrastructure needed to transfer mail within this network might be a weakness of the email system. %fixme: think about that
    1.33 +The use of various hardware to access mail is another opportunity of the market. But more hardware gets involved and the networks get more complex. Thus the software and infrastructure needed to transfer mail within the growing network might be a weakness of the email system. %fixme: think about that
    1.34  
    1.35  An opportunity of the market and at the same time a strength of electronic mail is its standardization. Few other communication technologies are standardized and thus freely available in a similar way. %fixme: ref
    1.36  Another opportunity and strength is the modular and extensible structure of electronic mail; it can easily evolve to new requirements. %fixme: ref
    1.37  
    1.38 -The increasing integration of communication channels, is an opportunity for the market. But deciding weather it is a weakness or strength of email is not so easy. It is a weakness because the not possible integration of stream data and the not good integration of large binary data. It is also a strength, because arbitrary asynchronous communication data already can be integrated. On the other hand, the integration might be a threat too, because it easily leads to complexity of software. Complex software is more error prone and thus less reliable. This could be a strength of electronic mail because of its modular design that decreases complexity, but real integration is harder to do than in monolithic systems.
    1.39 +The increasing integration of communication channels, is an opportunity for the market. But deciding whether it is a weakness or strength of email is difficult. It is a weakness because the impossible integration of synchronous stream data and the bad integration of large binary data. But it is also a strength, because arbitrary asynchronous communication data already can be integrated. On the other hand, the integration might be a threat too, because it often leads to complexity of software. Complex software is more error prone and thus less reliable. This however could again be a strength of electronic mail because of its modular design that decreases complexity.
    1.40  
    1.41 -Figure \ref{fig:email-swot} displays the \NAME{SWOT} analysis in a handy overview. It is easy to see, that the opportunities outweigh. This indicates a still increasing technology. %fixme: ref
    1.42 +Figure \ref{fig:email-swot} displays the \NAME{SWOT} analysis in a handy overview. It is obvious to see, that the opportunities outweigh. This is an indicator for a still increasing market. %fixme: ref
    1.43  
    1.44  \begin{figure}
    1.45  	\begin{center}
    1.46 -		%\input{input/email-swot.tex}
    1.47  		\includegraphics[scale=0.75]{img/email-swot.eps}
    1.48  	\end{center}
    1.49  	\caption{\NAME{SWOT} analysis for email}
    1.50  	\label{fig:email-swot}
    1.51  \end{figure}
    1.52  
    1.53 -The analysis shows what should be done to achieve the goal (Making email future-safe). Spam mail should be reduced as good as possible. Solutions for large data transfers and infrastructures with more nodes moving within the net should be developed, there is a lot of potential. Standardization, modularity and extendability should be used to go even further, these are the key advantages of email.
    1.54 -%fixme: a bit more concrete, see description of swot analysis
    1.55 +\subsubsection*{Conclusion}
    1.56 +
    1.57 +The result of a \NAME{SWOT} analysis are strategies to react on the identified opportunities and threats, dependent on whether they are strengths or weaknesses of the subject. These strategies are what should be done to achieve the overall goal---here making email future-safe.
    1.58 +
    1.59 +Threats of the market that are weaknesses of the subject should be avoided if possible, or one should prepare against them if they are impossible to avoid. As spam is unavoidable, email must prepare against them. The goal is to reduce spam to a bearable level. Spam fighting is a war where the good guys tend to lose. Putting too much effort there will result in few gain. Hence sufficient spam protection should be provided, but not more.
    1.60 +
    1.61 +Threats that are strengths of the subject should be confronted. Here non were identified.
    1.62 +
    1.63 +For opportunities of the market that are weaknesses of the subject, solutions should be searched. Large data transfers and infrastructures with nodes moving within the network, range here. As a lot of potential is present, it should be used by developing solutions to remove the weaknesses.
    1.64 +
    1.65 +Finally, opportunities that are strengths of the subject. These are standardization, modularity, and extendability. They should be exploited to go even further, these are the key advantages of email.
    1.66 +
    1.67  
    1.68  
    1.69  
    1.70 @@ -205,10 +206,19 @@
    1.71  %FIXME: add references for IM2000
    1.72  
    1.73  
    1.74 +---
    1.75 +
    1.76 +
    1.77  %add ``guarded email'' by dwheeler
    1.78 +\begin{quote}
    1.79 +Since receivers pay the bulk of the costs for spam (including most obviously their time to delete all that incoming spam), spam use will continue to rise until effective technical and legal countermeasures are deployed, or until people can no longer use email.
    1.80 +\url{http://www.dwheeler.com/guarded-email/guarded-email.html}
    1.81 +\end{quote}
    1.82 +
    1.83  
    1.84  %maybe add a third one
    1.85  
    1.86 +<< hashcash >>
    1.87  
    1.88  
    1.89  \subsection{Future-safety of email}