SlideShare une entreprise Scribd logo
1  sur  22
Télécharger pour lire hors ligne
海外與國內資通信產業拓展經驗分享
行政院科技會報「產業國際拓銷」專家座談會

Kenny Huang, Ph.D.

黃勝雄博士

亞太網路資訊中心APNIC 董事
台灣網路資訊中心TWNIC 董事
huangksh@gmail.com
2013 Dec 26
Reciprocity
ECO System

Foreign Aid
Applications

2
Synergy Value
Strategic value
(contributed by foreign
country)
Earnings from cross
procurement (contributed
by TW bidder)

Capture by Taiwan

Value in use (contributed
by foreign country)
20/80 leverage
(contributed by foreign
country)
Baseline project value
(contributed by foreign
country)

Taiwan’s
Foreign Aid
Source of
Value

Distribution
of Value
3
STRENGTHS

我國
SWOT分析

先進電子化政府推動經驗
優異資通信技術
成熟國際合作計畫經驗

國際專案經驗不足
ICT品牌
Language ?

整合政府/產業資源共同拓
展海外資通信市場
邦交國對我國ICT技術需求

國際標案競爭激烈
應收款 A/R延遲風險
訴訟管轄權法院所在地

OPPORTUNITIES

Policy Environment

友邦
PBST分析

WEAKNESSES

執政黨與在野黨政策方向
與我國邦交情況
ICT政策與法規環境

Business Environment

GDP 成長
主要產業和外匯來源
政府資訊服務供應商概況

THREATS

Society Environment

人口,土地面積及首都
文化,教育,宗教情況
風土民情,社會發展

Technology Environment

電信網路市場概況
網際網路普及度
資通訊政策主導部會

4
Changed Tendering Mechanism
BEFORE

AFTER

Taiwan
local tender offer

Foreign country
international tender
offer

Competitive process
for contract

Competitive process
for contract

Oversea project
implementation

Oversea project
implementation

Taiwan
local payment

Foreign country
A/R via single A/C

Single A/C
避免資源閒置
顯示即時資訊
保留完整記錄
直接撥款給境外供應商
政府指定銀行託管
Web追蹤專款流向

5
Columbia Obstruction Device
Hungry
rodent

Cheese
Electric grid
Shock

Cheese size

More

No go

Go
6
Business Opportunity Assessment
GEL 構面分析

GREAT CUSTOMERS

Characteristics
Value to You

EASY SALES

Value to Customer

LONG LIFE

Profit per Sale

Customer
Acquisition Cost

Investment
Required

Number
+
Ease of Finding
Spending Patterns
?
$Value of Sale
+
Repeat Sales
Ongoing Sales Support
-
How Important
+
Competitive Advantage
+
Price/Value Relationship
?
Entry Points
+
-
Sales Support Required
-
Promotional Activities
+
Margins
Up-Selling and Cross-Selling-
Selling Cost per Sale
?
+
To Enter Business
+
To Keep Market Share
To Stay on the Cutting Edge +
7
Case Study : Requirement Engineering
Problem Tree

Human right
infringement

Restrict national
competency

Jeopardize
innovation

Limit access to
information &
knowledge

Inefficient
business processes

Limit network
services

Low Internet
penetration

Inadequate
Internet access

Poor
infrastructure

Inadequate skills
in network
operation

High access cost

Small market

Market failure

8
Case Study : Project Identification
Alternatives Analysis

Equal access to the
Internet

Improve national
competitiveness

Stimulate
innovation

Increase business
productivity

Human right
infringement

Restrict national
competency

Jeopardize
innovation

Inefficient
business processes

Enable knowledge
&information
sharing

Limit access to
information &
knowledge

Criteria (Socioeconomic): Universal access

Enrich Internet
accessibility

Limit network
services

Low Internet
penetration

New net-enabled
innovations and
services

High access cost

Neutralize access
cost

appropriate
Internet
penetration

Inadequate
Internet access

Poor
infrastructure

Inadequate skills
in network
operation

Small market

Market failure

Enabling
Infrastructure

Capacity building

Consultation on
stimulus planning

Consultation on
Govt. intervention
strategy
9
Design Summary

Performance
Targets/Indicators

Impact

The internet penetration
increased from **% to **% at
the end of project
implementation at year 4.

Outcome

The Internet infrastructure
expanded to 5 districts with **
sq. KM wireless service coverage
at the end of project
implementation.
Internet users in the 5 selected
districts increased ** at the end
of project implementation.

The Internet penetration of has
improved

The population in target districts
use advanced wireless services.

Outputs

1 Enabling infrastructure
2 Capacity building

Activities

The wireless service coverage
increases ** sq. KM in year 2.
The Internet users increased
from ** in year 3, to ** in year 4.

1.1 site survey
1.2 conceptual design (device approved by NTRC)
1.3 Base station colocation and leasing
1.4 detail design (spectrum approved by NTRC)
1.5 infrastructure implementation
1.6 service activation
2.1 site survey look and see
2.2 network engineering training
2.3 help desk training
2.4 remote hands and eyes SOP
2.5 network operation training

Data Sources/
Reporting Mechanisms

Assumptions (A) /
Risks (R)

Annual Internet statistics report .
International
Telecommunication Union (ITU)

A: The Ministry's policy
regarding the provision of public
network services remains
unchanged.

Project Report , Ministry of
Public Service

Records of Project Management
Office, NICTO

A: The NICTO ensures that the
wireless network is well
maintained, following
a maintenance standard.
A: Operating expenses remain
stable

R: The spectrum registration or
wireless service application
rejected by NTRC
R: The existing towers of base
station can't be shared for
colcation of new system.

Inputs

Donor – $2.3 million (80% )
•Consulting - $0.3 million
•Personnel - $0.45 million
•Equipment - $1.2 million
•Training - $0.25 million
•Contingencies - $0.1 million
Government - $0.47 million
(20%)
•Personnel - $0.2 million
•Transport and logistics - $0.1
million (NTRC; BS colocation)
•Operating expenses – $0.07
million
•Civil work – $0.1 million

10
Case Study :
Project Value
**% increase

**
**
KM2

KM2

**%
**%

WiFi
Coverage

Civil Work
Project Staffs

Penetration

GDP

Estimated Value

RoV: Return on Value

11
Multi-layer Expectations
Political Layer
President

Impact

ICT Infrastructure Development

1. Minimize digital divide
2. Improve employment opportunities
3. Stimulate innovation

Economical Layer

ICT Infrastructure Development

Outcome

1. Improve ICT infrastructure penetration
2. Create jobs through project implementation

Business Layer

ICT Infrastructure Development

Minister

Project Officer

Output

1. Implement ICT Infrastructure
12
Foreign Aid Project Procedure
Pre-Contract

Project Management

Customer Service

Billing
request

Bill

Customer
Satisfaction
Report

Customer
Billing
Report

Marketing

• Quotation
• Price negotiation
• Contract complete

Resource
Estimation

Customer
Satisfaction
Analysis

Sales

Contract

Confirmation

Actual
Bill (P*Q)
• Bill calculation and filing

Project
Manager

Procurement
Requirement

Procurement
Requirement

Ordering

Installation

Customer
Cares

Testing &
Confirmation

• Complaints
• Satisfactions
• Emergency
• Q&A

Finance

Actual
Bill (Q)

Operation

• Consumption

Billing

Billing
Follow up

• Issue invoice • Monitor billing status
• Control A/R

13
Cash Flow
Standard project cash flow behavior
Profit
TIME
Cash Flow
Breakeven
Cash Flow
AID project cash flow behavior
Profit
1 COGS
2

TIME
3 A/R time frame

Cash Flow
Breakeven
14
Case Study : Regulatory Framework
CODE IS LAW
LAW

NORM

MARKET

NORM
ARCHITECTURE

(Lawrence Lessig, 2000)

RFC2527,RFC3647 specifies requirements for CPs (Certificate Policies).
CPs are contractual documents. This could cause issue in many jurisdictions.

15
Case Study : Policy Hierarchy Considerations

Principles

Pros: Legitimacy
Cons: Hard to achieve &
inflexibility

Policies
Standards

PKI CA Architecture
Specifications

Guidelines
Procedures

Pros: Agility
Cons: Ad Hoc Topology
First Mover Advantage?

(Dominic Steinitz, 2002)

16
Housekeeping

Language Distribution of Diplomatic Allies
Portuguese,
4.5%

Italian, 4.5%

French, 9.1%

English, 50.0%
Spanish, 31.8%
English
Spanish
French
Portuguese
Italian
17
風險因應策略
可行性/
有效性

非系統性風險

因應模式

專案管理與協調

事前防護

*MoU註記限制地理區(台灣/當地國)
採購, 人員篩選, 能力建構,

高/高

系統整合技術

事中應變

*緊急應變窗口, 外館/團部行政支援

高/中

國際標案競爭力

事後復原

*調整SOP流程, 改進方案與建議

高/中

系統性風險

因應模式

策略方案

可行性/
有效性

應收款AR風險

事前防護

*ICT協定加註免稅項目,擴大當地國採
購項目

高/中

高銷貨成本COGS

事中應變

*合約管理, 外館/團部行政支援

高/低

非履約項目

事後復原

*合約管理, 策略規劃, 多元需求管理

高/低

策略方案

說明: 系統性風險為廠商自身無法控制之風險

18
Business Potential Growth Strategy

ICT Service
Expansion

1. increase ICT infrastructure scale
3. expand ICT service coverage

Portfolio
Expansion

1. tiered services/value-added services
2. New business model

Quality
Enhancement

1. in-depth system resilient provision
2. SLA/KPI development
3. Helpdesk support systems

19
Recommendations (1/2) : e-Gov Alliance
2004.Oct.09 第一屆行政院政府資訊主管策略營/黃勝雄

Strategic
Vehicle

1. Sharing e-Gov experience among different
jurisdictions as a strategic vehicle

e-Gov
Technologies

1. Promote e-Gov technologies
2. Aggressively standardizing e-Gov technologies
3. Opensource e-Gov technologies

e-Gov
Partnership

1. Certifies e-Gov vendors
2. e-Gov vendor forum

20
Recommendations (2/2)

Get Ready
Helping
Others

1. Collaboration with Government agencies and
suppliers
2. Tax exemption and AR should be well evaluated.
1. Core value of the Foreign Aid Program
2. Helping others is a natural extension of every
business leader’s responsibilities.

21
22

Contenu connexe

En vedette (7)

What are policies procedures guidelines standards
What are policies procedures guidelines standardsWhat are policies procedures guidelines standards
What are policies procedures guidelines standards
 
Information Security Policies and Standards
Information Security Policies and StandardsInformation Security Policies and Standards
Information Security Policies and Standards
 
What is the difference between a Policy, Process, and Procedure
What is the difference between a Policy, Process, and ProcedureWhat is the difference between a Policy, Process, and Procedure
What is the difference between a Policy, Process, and Procedure
 
Writing Effective Policies & Procedures
Writing Effective  Policies & ProceduresWriting Effective  Policies & Procedures
Writing Effective Policies & Procedures
 
3 Ps Of Policy Process And Procedure
3 Ps Of Policy Process And Procedure3 Ps Of Policy Process And Procedure
3 Ps Of Policy Process And Procedure
 
How to Prepare a Policy and Procedure Manual
How to Prepare a Policy and Procedure ManualHow to Prepare a Policy and Procedure Manual
How to Prepare a Policy and Procedure Manual
 
Policy, Process, Procedure, Guidelines
Policy, Process, Procedure, GuidelinesPolicy, Process, Procedure, Guidelines
Policy, Process, Procedure, Guidelines
 

Similaire à Policy for Exporting Taiwan ICT Capacity

Workplace Technology Devices (WTD) Initiative
Workplace Technology Devices (WTD) InitiativeWorkplace Technology Devices (WTD) Initiative
Workplace Technology Devices (WTD) InitiativeKBIZEAU
 
IRJET-The Benefits of Information and Communication Technology Adoption in Co...
IRJET-The Benefits of Information and Communication Technology Adoption in Co...IRJET-The Benefits of Information and Communication Technology Adoption in Co...
IRJET-The Benefits of Information and Communication Technology Adoption in Co...IRJET Journal
 
Managing corruption risks in infrastructure... - Gavin Hayman, CoST
Managing corruption risks in infrastructure... - Gavin Hayman, CoSTManaging corruption risks in infrastructure... - Gavin Hayman, CoST
Managing corruption risks in infrastructure... - Gavin Hayman, CoSTOECD Governance
 
Network barometer report 2014
Network barometer report 2014Network barometer report 2014
Network barometer report 2014Mūniū Karanja
 
InteGrid SRA & Replication Roadmap (02/06/2020)
InteGrid SRA & Replication Roadmap (02/06/2020)InteGrid SRA & Replication Roadmap (02/06/2020)
InteGrid SRA & Replication Roadmap (02/06/2020)Sergio Potenciano Menci
 
Dr Tariq Badsha It Ministry
Dr Tariq Badsha It MinistryDr Tariq Badsha It Ministry
Dr Tariq Badsha It Ministrymunnagill
 
PrepData4Mobilty (Building Blocks) Methodological approach and Roadmap.pptx
PrepData4Mobilty (Building Blocks)  Methodological approach and Roadmap.pptxPrepData4Mobilty (Building Blocks)  Methodological approach and Roadmap.pptx
PrepData4Mobilty (Building Blocks) Methodological approach and Roadmap.pptxFIWARE
 
Real Option or Quasar
Real Option or QuasarReal Option or Quasar
Real Option or Quasardtc100842
 
Q3 2014 earnings presentation
Q3 2014 earnings presentationQ3 2014 earnings presentation
Q3 2014 earnings presentationUSCellular
 
Webinar - How to Get Real-Time Network Management Right?
Webinar - How to Get Real-Time Network Management Right?Webinar - How to Get Real-Time Network Management Right?
Webinar - How to Get Real-Time Network Management Right?ManageEngine
 
Results Presentation 1Q15
Results Presentation 1Q15Results Presentation 1Q15
Results Presentation 1Q15TIM RI
 
Project-Allocation-Reporting-Analysis-Admin-Support-for-Learing-Telecom-Utili...
Project-Allocation-Reporting-Analysis-Admin-Support-for-Learing-Telecom-Utili...Project-Allocation-Reporting-Analysis-Admin-Support-for-Learing-Telecom-Utili...
Project-Allocation-Reporting-Analysis-Admin-Support-for-Learing-Telecom-Utili...Anil
 
4G Business Case Analysis Tool
4G Business Case Analysis Tool4G Business Case Analysis Tool
4G Business Case Analysis ToolAndrea Calcagno
 
Presentation 23 11_10.34265106 (1)
Presentation 23 11_10.34265106 (1)Presentation 23 11_10.34265106 (1)
Presentation 23 11_10.34265106 (1)Juman Mohammed Azad
 
2015 2H Outlook: Korean Telecom service industry
2015 2H Outlook: Korean Telecom service industry2015 2H Outlook: Korean Telecom service industry
2015 2H Outlook: Korean Telecom service industryJeehyun Moon
 

Similaire à Policy for Exporting Taiwan ICT Capacity (20)

Workplace Technology Devices (WTD) Initiative
Workplace Technology Devices (WTD) InitiativeWorkplace Technology Devices (WTD) Initiative
Workplace Technology Devices (WTD) Initiative
 
IRJET-The Benefits of Information and Communication Technology Adoption in Co...
IRJET-The Benefits of Information and Communication Technology Adoption in Co...IRJET-The Benefits of Information and Communication Technology Adoption in Co...
IRJET-The Benefits of Information and Communication Technology Adoption in Co...
 
Managing corruption risks in infrastructure... - Gavin Hayman, CoST
Managing corruption risks in infrastructure... - Gavin Hayman, CoSTManaging corruption risks in infrastructure... - Gavin Hayman, CoST
Managing corruption risks in infrastructure... - Gavin Hayman, CoST
 
Taking stock and mapping communications futures for African countries
Taking stock and mapping communications futures for African countriesTaking stock and mapping communications futures for African countries
Taking stock and mapping communications futures for African countries
 
Network barometer report 2014
Network barometer report 2014Network barometer report 2014
Network barometer report 2014
 
Introduction to IPv6
Introduction to IPv6Introduction to IPv6
Introduction to IPv6
 
InteGrid SRA & Replication Roadmap (02/06/2020)
InteGrid SRA & Replication Roadmap (02/06/2020)InteGrid SRA & Replication Roadmap (02/06/2020)
InteGrid SRA & Replication Roadmap (02/06/2020)
 
Dr Tariq Badsha It Ministry
Dr Tariq Badsha It MinistryDr Tariq Badsha It Ministry
Dr Tariq Badsha It Ministry
 
PrepData4Mobilty (Building Blocks) Methodological approach and Roadmap.pptx
PrepData4Mobilty (Building Blocks)  Methodological approach and Roadmap.pptxPrepData4Mobilty (Building Blocks)  Methodological approach and Roadmap.pptx
PrepData4Mobilty (Building Blocks) Methodological approach and Roadmap.pptx
 
Real Option or Quasar
Real Option or QuasarReal Option or Quasar
Real Option or Quasar
 
Growth on ICT Enterprise Horizon
Growth on ICT Enterprise HorizonGrowth on ICT Enterprise Horizon
Growth on ICT Enterprise Horizon
 
Q3 2014 earnings presentation
Q3 2014 earnings presentationQ3 2014 earnings presentation
Q3 2014 earnings presentation
 
Q3 2014 earnings presentation
Q3 2014 earnings presentationQ3 2014 earnings presentation
Q3 2014 earnings presentation
 
Webinar - How to Get Real-Time Network Management Right?
Webinar - How to Get Real-Time Network Management Right?Webinar - How to Get Real-Time Network Management Right?
Webinar - How to Get Real-Time Network Management Right?
 
Results Presentation 1Q15
Results Presentation 1Q15Results Presentation 1Q15
Results Presentation 1Q15
 
Project-Allocation-Reporting-Analysis-Admin-Support-for-Learing-Telecom-Utili...
Project-Allocation-Reporting-Analysis-Admin-Support-for-Learing-Telecom-Utili...Project-Allocation-Reporting-Analysis-Admin-Support-for-Learing-Telecom-Utili...
Project-Allocation-Reporting-Analysis-Admin-Support-for-Learing-Telecom-Utili...
 
Q2 2015 Presentation
Q2 2015 PresentationQ2 2015 Presentation
Q2 2015 Presentation
 
4G Business Case Analysis Tool
4G Business Case Analysis Tool4G Business Case Analysis Tool
4G Business Case Analysis Tool
 
Presentation 23 11_10.34265106 (1)
Presentation 23 11_10.34265106 (1)Presentation 23 11_10.34265106 (1)
Presentation 23 11_10.34265106 (1)
 
2015 2H Outlook: Korean Telecom service industry
2015 2H Outlook: Korean Telecom service industry2015 2H Outlook: Korean Telecom service industry
2015 2H Outlook: Korean Telecom service industry
 

Plus de Kenny Huang Ph.D.

Taiwan Internet Intermediaries and Cyber Norms
Taiwan Internet Intermediaries and Cyber NormsTaiwan Internet Intermediaries and Cyber Norms
Taiwan Internet Intermediaries and Cyber NormsKenny Huang Ph.D.
 
Internet Governance Model in Taiwan
Internet Governance Model in TaiwanInternet Governance Model in Taiwan
Internet Governance Model in TaiwanKenny Huang Ph.D.
 
Cyberspace and Digital Diplomacy
Cyberspace and Digital DiplomacyCyberspace and Digital Diplomacy
Cyberspace and Digital DiplomacyKenny Huang Ph.D.
 
網路治理概念、組織及案例
網路治理概念、組織及案例網路治理概念、組織及案例
網路治理概念、組織及案例Kenny Huang Ph.D.
 
Ethical Considerations in AI
Ethical Considerations in AIEthical Considerations in AI
Ethical Considerations in AIKenny Huang Ph.D.
 
創新網路服務產業發展條例建議草案
創新網路服務產業發展條例建議草案創新網路服務產業發展條例建議草案
創新網路服務產業發展條例建議草案Kenny Huang Ph.D.
 
共享經濟關鍵議題之探討
共享經濟關鍵議題之探討共享經濟關鍵議題之探討
共享經濟關鍵議題之探討Kenny Huang Ph.D.
 
Cybersecurity and Internet Governance
Cybersecurity and Internet GovernanceCybersecurity and Internet Governance
Cybersecurity and Internet GovernanceKenny Huang Ph.D.
 
談已發展與發展中國家數位落差
談已發展與發展中國家數位落差談已發展與發展中國家數位落差
談已發展與發展中國家數位落差Kenny Huang Ph.D.
 
IoT Security and Privacy Considerations
IoT Security and Privacy ConsiderationsIoT Security and Privacy Considerations
IoT Security and Privacy ConsiderationsKenny Huang Ph.D.
 
Smart Vehicle and Data Service Provisioning
Smart Vehicle and Data Service ProvisioningSmart Vehicle and Data Service Provisioning
Smart Vehicle and Data Service ProvisioningKenny Huang Ph.D.
 
物聯網與工業4.0情境分析
物聯網與工業4.0情境分析物聯網與工業4.0情境分析
物聯網與工業4.0情境分析Kenny Huang Ph.D.
 
Cloud Computing Business Models Review
Cloud Computing Business Models ReviewCloud Computing Business Models Review
Cloud Computing Business Models ReviewKenny Huang Ph.D.
 
Democracy 3.0 Experiences From Taiwan; Internet Empowerment in Taiwan Sunflow...
Democracy 3.0 Experiences From Taiwan; Internet Empowerment in Taiwan Sunflow...Democracy 3.0 Experiences From Taiwan; Internet Empowerment in Taiwan Sunflow...
Democracy 3.0 Experiences From Taiwan; Internet Empowerment in Taiwan Sunflow...Kenny Huang Ph.D.
 
Big Data : Risks and Opportunities
Big Data : Risks and OpportunitiesBig Data : Risks and Opportunities
Big Data : Risks and OpportunitiesKenny Huang Ph.D.
 

Plus de Kenny Huang Ph.D. (20)

Taiwan Internet Intermediaries and Cyber Norms
Taiwan Internet Intermediaries and Cyber NormsTaiwan Internet Intermediaries and Cyber Norms
Taiwan Internet Intermediaries and Cyber Norms
 
Internet Governance Model in Taiwan
Internet Governance Model in TaiwanInternet Governance Model in Taiwan
Internet Governance Model in Taiwan
 
Cyberspace and Digital Diplomacy
Cyberspace and Digital DiplomacyCyberspace and Digital Diplomacy
Cyberspace and Digital Diplomacy
 
Internet Routing Security
Internet Routing SecurityInternet Routing Security
Internet Routing Security
 
網路治理概念、組織及案例
網路治理概念、組織及案例網路治理概念、組織及案例
網路治理概念、組織及案例
 
Ethical Considerations in AI
Ethical Considerations in AIEthical Considerations in AI
Ethical Considerations in AI
 
創新網路服務產業發展條例建議草案
創新網路服務產業發展條例建議草案創新網路服務產業發展條例建議草案
創新網路服務產業發展條例建議草案
 
APNIC44 Briefing
APNIC44 BriefingAPNIC44 Briefing
APNIC44 Briefing
 
共享經濟關鍵議題之探討
共享經濟關鍵議題之探討共享經濟關鍵議題之探討
共享經濟關鍵議題之探討
 
Cybersecurity and Internet Governance
Cybersecurity and Internet GovernanceCybersecurity and Internet Governance
Cybersecurity and Internet Governance
 
網路中立性簡介
網路中立性簡介網路中立性簡介
網路中立性簡介
 
談已發展與發展中國家數位落差
談已發展與發展中國家數位落差談已發展與發展中國家數位落差
談已發展與發展中國家數位落差
 
Spectrum Policy
Spectrum PolicySpectrum Policy
Spectrum Policy
 
IoT Security and Privacy Considerations
IoT Security and Privacy ConsiderationsIoT Security and Privacy Considerations
IoT Security and Privacy Considerations
 
Smart Energy
Smart EnergySmart Energy
Smart Energy
 
Smart Vehicle and Data Service Provisioning
Smart Vehicle and Data Service ProvisioningSmart Vehicle and Data Service Provisioning
Smart Vehicle and Data Service Provisioning
 
物聯網與工業4.0情境分析
物聯網與工業4.0情境分析物聯網與工業4.0情境分析
物聯網與工業4.0情境分析
 
Cloud Computing Business Models Review
Cloud Computing Business Models ReviewCloud Computing Business Models Review
Cloud Computing Business Models Review
 
Democracy 3.0 Experiences From Taiwan; Internet Empowerment in Taiwan Sunflow...
Democracy 3.0 Experiences From Taiwan; Internet Empowerment in Taiwan Sunflow...Democracy 3.0 Experiences From Taiwan; Internet Empowerment in Taiwan Sunflow...
Democracy 3.0 Experiences From Taiwan; Internet Empowerment in Taiwan Sunflow...
 
Big Data : Risks and Opportunities
Big Data : Risks and OpportunitiesBig Data : Risks and Opportunities
Big Data : Risks and Opportunities
 

Dernier

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 

Dernier (20)

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 

Policy for Exporting Taiwan ICT Capacity

  • 3. Synergy Value Strategic value (contributed by foreign country) Earnings from cross procurement (contributed by TW bidder) Capture by Taiwan Value in use (contributed by foreign country) 20/80 leverage (contributed by foreign country) Baseline project value (contributed by foreign country) Taiwan’s Foreign Aid Source of Value Distribution of Value 3
  • 4. STRENGTHS 我國 SWOT分析 先進電子化政府推動經驗 優異資通信技術 成熟國際合作計畫經驗 國際專案經驗不足 ICT品牌 Language ? 整合政府/產業資源共同拓 展海外資通信市場 邦交國對我國ICT技術需求 國際標案競爭激烈 應收款 A/R延遲風險 訴訟管轄權法院所在地 OPPORTUNITIES Policy Environment 友邦 PBST分析 WEAKNESSES 執政黨與在野黨政策方向 與我國邦交情況 ICT政策與法規環境 Business Environment GDP 成長 主要產業和外匯來源 政府資訊服務供應商概況 THREATS Society Environment 人口,土地面積及首都 文化,教育,宗教情況 風土民情,社會發展 Technology Environment 電信網路市場概況 網際網路普及度 資通訊政策主導部會 4
  • 5. Changed Tendering Mechanism BEFORE AFTER Taiwan local tender offer Foreign country international tender offer Competitive process for contract Competitive process for contract Oversea project implementation Oversea project implementation Taiwan local payment Foreign country A/R via single A/C Single A/C 避免資源閒置 顯示即時資訊 保留完整記錄 直接撥款給境外供應商 政府指定銀行託管 Web追蹤專款流向 5
  • 6. Columbia Obstruction Device Hungry rodent Cheese Electric grid Shock Cheese size More No go Go 6
  • 7. Business Opportunity Assessment GEL 構面分析 GREAT CUSTOMERS Characteristics Value to You EASY SALES Value to Customer LONG LIFE Profit per Sale Customer Acquisition Cost Investment Required Number + Ease of Finding Spending Patterns ? $Value of Sale + Repeat Sales Ongoing Sales Support - How Important + Competitive Advantage + Price/Value Relationship ? Entry Points + - Sales Support Required - Promotional Activities + Margins Up-Selling and Cross-Selling- Selling Cost per Sale ? + To Enter Business + To Keep Market Share To Stay on the Cutting Edge + 7
  • 8. Case Study : Requirement Engineering Problem Tree Human right infringement Restrict national competency Jeopardize innovation Limit access to information & knowledge Inefficient business processes Limit network services Low Internet penetration Inadequate Internet access Poor infrastructure Inadequate skills in network operation High access cost Small market Market failure 8
  • 9. Case Study : Project Identification Alternatives Analysis Equal access to the Internet Improve national competitiveness Stimulate innovation Increase business productivity Human right infringement Restrict national competency Jeopardize innovation Inefficient business processes Enable knowledge &information sharing Limit access to information & knowledge Criteria (Socioeconomic): Universal access Enrich Internet accessibility Limit network services Low Internet penetration New net-enabled innovations and services High access cost Neutralize access cost appropriate Internet penetration Inadequate Internet access Poor infrastructure Inadequate skills in network operation Small market Market failure Enabling Infrastructure Capacity building Consultation on stimulus planning Consultation on Govt. intervention strategy 9
  • 10. Design Summary Performance Targets/Indicators Impact The internet penetration increased from **% to **% at the end of project implementation at year 4. Outcome The Internet infrastructure expanded to 5 districts with ** sq. KM wireless service coverage at the end of project implementation. Internet users in the 5 selected districts increased ** at the end of project implementation. The Internet penetration of has improved The population in target districts use advanced wireless services. Outputs 1 Enabling infrastructure 2 Capacity building Activities The wireless service coverage increases ** sq. KM in year 2. The Internet users increased from ** in year 3, to ** in year 4. 1.1 site survey 1.2 conceptual design (device approved by NTRC) 1.3 Base station colocation and leasing 1.4 detail design (spectrum approved by NTRC) 1.5 infrastructure implementation 1.6 service activation 2.1 site survey look and see 2.2 network engineering training 2.3 help desk training 2.4 remote hands and eyes SOP 2.5 network operation training Data Sources/ Reporting Mechanisms Assumptions (A) / Risks (R) Annual Internet statistics report . International Telecommunication Union (ITU) A: The Ministry's policy regarding the provision of public network services remains unchanged. Project Report , Ministry of Public Service Records of Project Management Office, NICTO A: The NICTO ensures that the wireless network is well maintained, following a maintenance standard. A: Operating expenses remain stable R: The spectrum registration or wireless service application rejected by NTRC R: The existing towers of base station can't be shared for colcation of new system. Inputs Donor – $2.3 million (80% ) •Consulting - $0.3 million •Personnel - $0.45 million •Equipment - $1.2 million •Training - $0.25 million •Contingencies - $0.1 million Government - $0.47 million (20%) •Personnel - $0.2 million •Transport and logistics - $0.1 million (NTRC; BS colocation) •Operating expenses – $0.07 million •Civil work – $0.1 million 10
  • 11. Case Study : Project Value **% increase ** ** KM2 KM2 **% **% WiFi Coverage Civil Work Project Staffs Penetration GDP Estimated Value RoV: Return on Value 11
  • 12. Multi-layer Expectations Political Layer President Impact ICT Infrastructure Development 1. Minimize digital divide 2. Improve employment opportunities 3. Stimulate innovation Economical Layer ICT Infrastructure Development Outcome 1. Improve ICT infrastructure penetration 2. Create jobs through project implementation Business Layer ICT Infrastructure Development Minister Project Officer Output 1. Implement ICT Infrastructure 12
  • 13. Foreign Aid Project Procedure Pre-Contract Project Management Customer Service Billing request Bill Customer Satisfaction Report Customer Billing Report Marketing • Quotation • Price negotiation • Contract complete Resource Estimation Customer Satisfaction Analysis Sales Contract Confirmation Actual Bill (P*Q) • Bill calculation and filing Project Manager Procurement Requirement Procurement Requirement Ordering Installation Customer Cares Testing & Confirmation • Complaints • Satisfactions • Emergency • Q&A Finance Actual Bill (Q) Operation • Consumption Billing Billing Follow up • Issue invoice • Monitor billing status • Control A/R 13
  • 14. Cash Flow Standard project cash flow behavior Profit TIME Cash Flow Breakeven Cash Flow AID project cash flow behavior Profit 1 COGS 2 TIME 3 A/R time frame Cash Flow Breakeven 14
  • 15. Case Study : Regulatory Framework CODE IS LAW LAW NORM MARKET NORM ARCHITECTURE (Lawrence Lessig, 2000) RFC2527,RFC3647 specifies requirements for CPs (Certificate Policies). CPs are contractual documents. This could cause issue in many jurisdictions. 15
  • 16. Case Study : Policy Hierarchy Considerations Principles Pros: Legitimacy Cons: Hard to achieve & inflexibility Policies Standards PKI CA Architecture Specifications Guidelines Procedures Pros: Agility Cons: Ad Hoc Topology First Mover Advantage? (Dominic Steinitz, 2002) 16
  • 17. Housekeeping Language Distribution of Diplomatic Allies Portuguese, 4.5% Italian, 4.5% French, 9.1% English, 50.0% Spanish, 31.8% English Spanish French Portuguese Italian 17
  • 18. 風險因應策略 可行性/ 有效性 非系統性風險 因應模式 專案管理與協調 事前防護 *MoU註記限制地理區(台灣/當地國) 採購, 人員篩選, 能力建構, 高/高 系統整合技術 事中應變 *緊急應變窗口, 外館/團部行政支援 高/中 國際標案競爭力 事後復原 *調整SOP流程, 改進方案與建議 高/中 系統性風險 因應模式 策略方案 可行性/ 有效性 應收款AR風險 事前防護 *ICT協定加註免稅項目,擴大當地國採 購項目 高/中 高銷貨成本COGS 事中應變 *合約管理, 外館/團部行政支援 高/低 非履約項目 事後復原 *合約管理, 策略規劃, 多元需求管理 高/低 策略方案 說明: 系統性風險為廠商自身無法控制之風險 18
  • 19. Business Potential Growth Strategy ICT Service Expansion 1. increase ICT infrastructure scale 3. expand ICT service coverage Portfolio Expansion 1. tiered services/value-added services 2. New business model Quality Enhancement 1. in-depth system resilient provision 2. SLA/KPI development 3. Helpdesk support systems 19
  • 20. Recommendations (1/2) : e-Gov Alliance 2004.Oct.09 第一屆行政院政府資訊主管策略營/黃勝雄 Strategic Vehicle 1. Sharing e-Gov experience among different jurisdictions as a strategic vehicle e-Gov Technologies 1. Promote e-Gov technologies 2. Aggressively standardizing e-Gov technologies 3. Opensource e-Gov technologies e-Gov Partnership 1. Certifies e-Gov vendors 2. e-Gov vendor forum 20
  • 21. Recommendations (2/2) Get Ready Helping Others 1. Collaboration with Government agencies and suppliers 2. Tax exemption and AR should be well evaluated. 1. Core value of the Foreign Aid Program 2. Helping others is a natural extension of every business leader’s responsibilities. 21
  • 22. 22