張大明執行長,育睿科技(2012)創辦人,資訊教育及教育科技專家,淡江大學教育科技研究所,台灣首位4C/ID模式實證研究發表人,自2010年取得教育科技碩士學位後,持續在教育科技領域研究﹑設計與創新,實務驗證後應用於教學設計、訓練設計、培育服務發展等,積極在培育產業推廣、發展教育科技創新,2016提出歐倍特六動力(ALBITER Power 6,思翱倍力大數據人才培育服務)的設計發展原則:目標、方案、問題、引導、數據、時習。2018年以創業成果獲得淡大教科系推薦傑出系友代表。國際副價值工程專家AVS、美國ATD會員。
張大明執行長,育睿科技(2012)創辦人,資訊教育及教育科技專家,淡江大學教育科技研究所,台灣首位4C/ID模式實證研究發表人,自2010年取得教育科技碩士學位後,持續在教育科技領域研究﹑設計與創新,實務驗證後應用於教學設計、訓練設計、培育服務發展等,積極在培育產業推廣、發展教育科技創新,2016提出歐倍特六動力(ALBITER Power 6,思翱倍力大數據人才培育服務)的設計發展原則:目標、方案、問題、引導、數據、時習。2018年以創業成果獲得淡大教科系推薦傑出系友代表。國際副價值工程專家AVS、美國ATD會員。
The document discusses the history and development of smart energy and smart grids. It began with the 2003 Northeast blackout and was expanded by the 2007 Energy Independence and Security Act. The Act included titles on energy security, biofuels, transportation infrastructure, small business programs, and smart grids. Traditional electric utilities involved one-way energy flows with little information, while smart grids enable two-way communication and energy flows from various sources like solar and wind power. The document also discusses energy demand and pricing trends, wind energy growth in Denmark, various methods of energy storage, refrigerator and lighting energy usage trends in the US, goals to reduce CO2 emissions, the increase in energy regulation like the EPA's Clean Power Plan, the declining costs of
The document provides an overview of smart vehicle and connected car technologies. It discusses:
1) Gartner forecasts of 250 million connected vehicles by 2020 with increasing connectivity units and consumer spend.
2) The evolution of connected vehicles from embedded systems in the 1990s to infotainment systems in the 2000s to V2X capabilities today and autonomous vehicles by 2020.
3) Key technologies that enable connected vehicles like vehicle sensors, roadside computing, and Google's self-driving car project.
4) The document analyzes initial data on vehicles, mobile phones, and IP addresses in Taiwan and estimates typical data usage of connected vehicle apps would be less than 100kbps, representing an insignificant portion of mobile data
The document discusses several IoT security and privacy considerations, including using privacy by design principles to embed privacy into systems from the start, establishing accountability standards and open technology standards to build trust, and addressing common problems like lack of developer security experience, insecure communication protocols, and ensuring secure firmware updates throughout the lifecycle of IoT devices.
1. The document discusses the history and concepts of internet governance from the early ARPANET days to the present. It covers topics such as technical standards, naming architecture, numbering resources, multistakeholder model, and the IANA transition.
2. Cybersecurity concepts are also summarized, including the goals of information security around confidentiality, integrity and availability. Frameworks for cybersecurity management and defense like ISO 27001 are outlined.
3. Issues related to internet governance and cybersecurity are still evolving through initiatives at the UN and other multilateral organizations to address topics like critical internet resources, capacity building, and access.
The Taiwanese government has approved new regulations clarifying that businesses can apply for generic top-level domains (gTLDs) like .eva or .taipei. Previously, laws allowed only non-profits to register such domains, creating ambiguity for businesses. The changes await final approval. They aim to liberalize website registrations and allow companies to brand themselves globally with new gTLDs for promotional purposes. Taiwan wants to prepare businesses to apply in the next round of new gTLD applications from ICANN, expected in 2017 or 2018.
Democracy 3.0 Experiences From Taiwan; Internet Empowerment in Taiwan Sunflow...Kenny Huang Ph.D.
The document summarizes how Taiwan responded to the 2014 Sunflower Movement protests through coordinated internet services.
Mobile operators came together to support protesters by providing cell towers with increased bandwidth. Fixed network extensions from nearby buildings also helped. Government resources like WiFi and fiber networks were sourced.
These efforts created 260Mbps of extra capacity, allowing over 5,000 new subscribers. Strategies like increasing concentration ratios and prioritizing mobile data aimed to further expand connectivity. The document argues for institutionalizing rapid wireless deployment for unpredictable mass movements.
Domain Name Market Evaluation and Policy DevelopmentKenny Huang Ph.D.
This document provides an overview of the global domain name market and internet statistics by region. It summarizes internet user penetration rates and growth between 2000-2011. The document outlines the domain name market structure and the roles of ICANN, registries, registrars, and registrants. It also lists the current generic and country-code top-level domains. Charts show trends in .com, .net, and .org domain name counts between 2004-2012 and models for naming, addressing, and routing on the internet.
This document analyzes cloud computing business models in Taiwan. It identifies 4 clusters of companies:
1) Public infrastructure as a service (IaaS) providers like telecom operators
2) PC and notebook manufacturers developing customized solutions
3) IT companies introducing new solutions to existing clients
4) Application service providers rebranding as cloud service providers
It evaluates these clusters using market share and growth rate, finding application providers have the most lucrative "cash cow" model while public IaaS providers face challenges as "question marks". It provides recommendations on business strategies and government policies to support cloud computing.
MyHouse雲端平台是以『雲端技術』為基礎提供SaaS(Software as a Service軟體即服務) 的社區物業管理平台解決方案,解決業者無法負擔系統軟硬體成本的問題,藉由雲端彈性、低成本的優勢,達成以社區管理服務本體的競爭力,並以保全業的knowhow,提供管委會營運標準規範的雲端平台,讓您的社區管理服務無所不在,生活品質更提昇。
The document discusses the history and development of smart energy and smart grids. It began with the 2003 Northeast blackout and was expanded by the 2007 Energy Independence and Security Act. The Act included titles on energy security, biofuels, transportation infrastructure, small business programs, and smart grids. Traditional electric utilities involved one-way energy flows with little information, while smart grids enable two-way communication and energy flows from various sources like solar and wind power. The document also discusses energy demand and pricing trends, wind energy growth in Denmark, various methods of energy storage, refrigerator and lighting energy usage trends in the US, goals to reduce CO2 emissions, the increase in energy regulation like the EPA's Clean Power Plan, the declining costs of
The document provides an overview of smart vehicle and connected car technologies. It discusses:
1) Gartner forecasts of 250 million connected vehicles by 2020 with increasing connectivity units and consumer spend.
2) The evolution of connected vehicles from embedded systems in the 1990s to infotainment systems in the 2000s to V2X capabilities today and autonomous vehicles by 2020.
3) Key technologies that enable connected vehicles like vehicle sensors, roadside computing, and Google's self-driving car project.
4) The document analyzes initial data on vehicles, mobile phones, and IP addresses in Taiwan and estimates typical data usage of connected vehicle apps would be less than 100kbps, representing an insignificant portion of mobile data
The document discusses several IoT security and privacy considerations, including using privacy by design principles to embed privacy into systems from the start, establishing accountability standards and open technology standards to build trust, and addressing common problems like lack of developer security experience, insecure communication protocols, and ensuring secure firmware updates throughout the lifecycle of IoT devices.
1. The document discusses the history and concepts of internet governance from the early ARPANET days to the present. It covers topics such as technical standards, naming architecture, numbering resources, multistakeholder model, and the IANA transition.
2. Cybersecurity concepts are also summarized, including the goals of information security around confidentiality, integrity and availability. Frameworks for cybersecurity management and defense like ISO 27001 are outlined.
3. Issues related to internet governance and cybersecurity are still evolving through initiatives at the UN and other multilateral organizations to address topics like critical internet resources, capacity building, and access.
The Taiwanese government has approved new regulations clarifying that businesses can apply for generic top-level domains (gTLDs) like .eva or .taipei. Previously, laws allowed only non-profits to register such domains, creating ambiguity for businesses. The changes await final approval. They aim to liberalize website registrations and allow companies to brand themselves globally with new gTLDs for promotional purposes. Taiwan wants to prepare businesses to apply in the next round of new gTLD applications from ICANN, expected in 2017 or 2018.
Democracy 3.0 Experiences From Taiwan; Internet Empowerment in Taiwan Sunflow...Kenny Huang Ph.D.
The document summarizes how Taiwan responded to the 2014 Sunflower Movement protests through coordinated internet services.
Mobile operators came together to support protesters by providing cell towers with increased bandwidth. Fixed network extensions from nearby buildings also helped. Government resources like WiFi and fiber networks were sourced.
These efforts created 260Mbps of extra capacity, allowing over 5,000 new subscribers. Strategies like increasing concentration ratios and prioritizing mobile data aimed to further expand connectivity. The document argues for institutionalizing rapid wireless deployment for unpredictable mass movements.
Domain Name Market Evaluation and Policy DevelopmentKenny Huang Ph.D.
This document provides an overview of the global domain name market and internet statistics by region. It summarizes internet user penetration rates and growth between 2000-2011. The document outlines the domain name market structure and the roles of ICANN, registries, registrars, and registrants. It also lists the current generic and country-code top-level domains. Charts show trends in .com, .net, and .org domain name counts between 2004-2012 and models for naming, addressing, and routing on the internet.
This document analyzes cloud computing business models in Taiwan. It identifies 4 clusters of companies:
1) Public infrastructure as a service (IaaS) providers like telecom operators
2) PC and notebook manufacturers developing customized solutions
3) IT companies introducing new solutions to existing clients
4) Application service providers rebranding as cloud service providers
It evaluates these clusters using market share and growth rate, finding application providers have the most lucrative "cash cow" model while public IaaS providers face challenges as "question marks". It provides recommendations on business strategies and government policies to support cloud computing.
MyHouse雲端平台是以『雲端技術』為基礎提供SaaS(Software as a Service軟體即服務) 的社區物業管理平台解決方案,解決業者無法負擔系統軟硬體成本的問題,藉由雲端彈性、低成本的優勢,達成以社區管理服務本體的競爭力,並以保全業的knowhow,提供管委會營運標準規範的雲端平台,讓您的社區管理服務無所不在,生活品質更提昇。
This document discusses internet intermediaries and cyber norms. It provides examples of internet governance organizations that follow multistakeholder and bottom-up models of governance like ICANN, IETF, APNIC and TWNIC. It also examines areas of international law that can help protect the core of the internet, such as law of the sea, air law, and international human rights law. Furthermore, it outlines different models of public goods governance and discusses how cyber norms, defined as collective expectations for proper behavior, can help regulate behavior in cyberspace along with law, market forces and architecture.
This document discusses various models for internet governance and cybersecurity regimes. It begins by outlining different public goods governance models including state regulation, cooperation, private self-regulation, co-regulation, and delegation. It then examines the "shadow of hierarchy" and its implications for governments and non-state actors. Next, it addresses issues with private self-regulation such as monopoly power and the potential for regulatory competition. It also discusses multistakeholder and multilateral models. The document concludes by posing questions about regional internet registry governance and outlining components of an effective national cybersecurity strategy model and power hierarchy principles.
The document discusses various perspectives on cyberspace and digital diplomacy. It defines cyberspace and outlines David Clark and Nazli Choucry's views on cyberspace. It then discusses how cyberspace impacts international relations and characteristics of cyberspace. The document also examines cyberspace governance, including different models, issues, and its evolution. It analyzes the relationship between cyberspace and the physical world and provides examples of global cyber activities and newcomers in internet governance.
This document discusses internet routing security and provides an overview of routing protocols like BGP. It covers topics like routing hijacking incidents, the need for trust between network operators, and mechanisms to secure routing like the Resource Public Key Infrastructure (RPKI) and BGPsec. RPKI allows network operators to publish and distribute routing policies and IP address allocations, validating the origin and distribution of Internet number resources. BGPsec aims to provide origin authentication and integrity protection for BGP routing messages to prevent route hijacking. The document also discusses challenges around deploying these security mechanisms and ensuring global coverage.
This document discusses internet governance concepts, organizations, and cases. It begins by explaining that users see the internet as a simple "black box" and are unaware of its complex internal operations. It then defines internet governance and describes its multi-layered structure. Several key internet governance organizations are mentioned, including ICANN, RIRs, IETF, and others. The roles and responsibilities of these organizations in areas like technical standards, domain name management, IP address allocation, and more are also summarized.
The document discusses ethical issues related to artificial intelligence and personal data. It addresses questions about how to define personal data and ensure individuals have control over their data. It suggests that individuals should be able to have a personalized AI guardian to help them manage their data and privacy settings. Further, it discusses how to design AI and data systems using privacy by design principles to make sure individuals understand how their data is being used and can provide truly informed consent. The goal is to develop technical and policy solutions to ensure AI and data systems respect individuals' ownership over their personal information and honor their privacy.
This document provides an overview and agenda for the APNIC44 conference taking place from September 12-14 in Taiwan. The conference will include sessions on technical operations, cooperation on cybersecurity issues, IPv6 deployment challenges, APNIC services, DNS security key changes, and internet policy discussions. Day 1 will focus on technical topics, day 2 will cover network operations and services, and day 3 will include the annual membership meeting and discussion of why participation is important.
This document discusses big data, including opportunities and risks. It covers big data technologies, the big data market, opportunities and risks related to capital trends, and issues around algorithmic accountability and privacy. The document contains several sections that describe topics like the Internet of Things, Hadoop, analytics approaches for static versus streaming data, big data challenges, and deep learning. It also includes examples of big data use cases and discusses hype cycles, adoption curves, and strategies for big data adoption.
This document discusses several topics related to new generic top-level domains (gTLDs):
1. It provides statistics on the number of new gTLD applications received and delegated gTLDs.
2. It examines how new gTLDs are disrupting technology norms like DNSSEC behavior and adoption of IPv6.
3. It explores policy considerations regarding new gTLDs, including critical information infrastructure protection, lawful interception, and national cyberspace strategy.
This document discusses cyber attacks and defense strategies. It analyzes DDoS attacks and motivations for cyber attacks such as political, social, business, and personal reasons. Case studies on cyber warfare in Afghanistan and China are presented. The document also discusses the economics of botnets and math examples of DDoS attack scenarios. Proposed defense strategies include firewall rules and policies, rate limiting, and designing unique algorithms to defend against unique attack patterns.
This document discusses challenges and strategies for integrating Chinese, Japanese, and Korean (CJK) characters into the root zone of the Domain Name System. It proposes a "divide and conquer" methodology to split non-overlapping code points and compute frequency of use to minimize conflicts. Through data processing and filtering, the problem domain of overlapping code points was reduced from 6,181 to just 10. Future work could refine the frequency ranges and require intensive coordination between CJK panels. The document also suggests re-considering how language tags are defined and administered to better support integrated CJK rules.
This document discusses coordination issues around developing a unified Label Generation Rules (LGR) for Chinese, Japanese, and Korean (CJK) characters in the root zone. It outlines the current proposals from the CJK Generation Panels and highlights of each. It also discusses tasks of the CJK Panels, computation of variant labels, and converting XML rules. Key coordination challenges covered include defining common variants and their dispositions, managing overlaps between scripts, and developing strategies to resolve potential conflicts between the different panels' rules.
The document discusses Kenny Huang sharing experiences in expanding the telecommunications and ICT industries overseas and domestically. It covers several key points:
1) An analysis of Taiwan's strengths, weaknesses, opportunities, and threats in international ICT cooperation projects.
2) A proposed change to tendering mechanisms for overseas projects to streamline processes and provide payment to foreign suppliers directly.
3) A discussion of various frameworks for assessing business opportunities and managing risks in foreign aid projects.
4) Recommendations for alliances and partnerships to promote e-government technologies and solutions through open collaboration between governments and suppliers.
Generation Panels for CJK Community - A Collaborative Model ProposalKenny Huang Ph.D.
This document proposes collaborative models for generation panels for Chinese, Japanese, and Korean (CJK) communities to develop scripts for the root zone. It suggests either a step 1 model with a small CJ joint generation panel to resolve overlapped codepoints or a step 2 model integrating Korean either without (2.1) or with (2.2) interests in Han characters. Ownership and next steps are identified for establishing the panels and moving the process forward.
This document provides an initial evaluation of a proposed Caribbean infrastructure project. The project aims to (1) improve government efficiency and reduce communication costs, (2) accelerate modernization and improve government service, and (3) improve information collection and dissemination. The project scope includes developing community WiFi, public wireless hotspots, and connections between community WiFis. It will implement hotspots in the top 16 population areas and stimulate innovative business models. The evaluation assesses stakeholders, problems, objectives, alternatives, and provides a design and monitoring framework with performance targets and indicators.
24. Boston
Matrix
產品/服務定位
24
HIGH LOW
HIGH
LOW
Cash
Cows Dogs
Stars Question
Marks
Relative
Market
Share
Market
Growth
Rate
25. Boston
Matrix
現⾦金準備度意涵
25
HIGH LOW
HIGH
LOW
Relative
Market
Share
Market
Growth
Rate
Cash
used
-‐ -‐ -‐
Cash
generated
+++
0
Cash
used
-‐ -‐ -‐
Cash
generated
+
-‐ -‐
Cash
used
-‐
Cash
generated
+++
++
Cash
used
-‐
Cash
generated
+
0
26. Revenue
Time
Valley of Death
Angels
Founders
Venture Capital
Strategic Investors
Public Markets
Seed Capital
A
B
C
Mezzanine
Early
Stage Later Stage
IPO
Secondary
Offerings
The Chasm The Wall
Seed or Start-up: Market research and product development.
Early Stage: Funding full-scale operations and selling products/services. Not yet profitable.
Later Stage: Funding expansion and new products. Near break-even.
新公司財務曲線
27. Financial
Strategy
27
Use
of
Proceeds
Working
Capital
Oversea/Biz
Expansion
Why
and
How
Much
to
Get?
Corporate
Structure
Corporate
Strategy
Financial
Projection
Cost
Model
Revenue
Model
Exit
Strategy
Tax
Planning
Interest
Alignment
Marketing
Strategy
Market
Size
&
Potential
Product
/
Service
Pricing
Expansion
Strategy
JV
Solely
Own
Export
Staffing
Plan
Office
COGS
Competition
Burn
Rate
Sales
Forecast
Equity
Financing
Valuation
/
Dilution
Class
of
Shares
Debt
Financing
資⾦金需求
及⽬目的
營運需求
股票募資
借貸
營運資⾦金
業務擴充
股價及稀釋股權
股票類別
現⾦金燃燒速度
業績預測
企業策略
企業結構
財務預測
成本模型
盈收模型
擴充策略
⾏行銷策略
下⾞車策略
BOT
未來收益
抵押
賣⽅方信貸
買⽅方信貸
32. Trade
in
Commercial
Services
(2010-‐2014)
Telecommunication,
Computer
and
Information
Services
32
Reporter Flow indicator Partner 2010 2011 2012 2013 2014
Chinese
Taipei
Exports
Telecommunication,
Computer
and
Information
Services
World 610 827 1108 1396 1772
Chinese
Taipei
Imports
Telecommunication,
Computer
and
Information
Services
World 889 1021 1179 1193 1240
資料來源 :
WTO
Statistics
Database,
2015
Unit
:
US
dollar
(Millions)
33. 33
IPOs
and
Private
Financing
Deals
in
the
Tech
Sector
since
2000
(United
States)
Source:
PwC
Source:
Techcrunch
If
there
is
a
bubble,
investors
would
recover
their
investment
and
perhaps
walk
away
with
positive
return,
the
biggest
losers
for
sure
would
be
the
employees
and
founders.
Game
Rule
:
You
Pick
The
Valuation,
I
Pick
The
Terms
34. 公私合夥 PPP
34
ü 公私合夥PPP (Public
Private
Partnership)
公部⾨門與私部⾨門以⾧長期合約規範雙⽅方合作的計畫項⽬目。︒。私部⾨門夥伴提供計畫所需資源、︑、
依⾵風險管理分散計畫⾵風險。︒。公私部⾨門合作、︑、更有效地達成公共事務推動⽬目標。︒。
ü PPP市場需求
現有私部⾨門每年投資基礎建設約為⼀一兆美元(US$1
trillion),但市場每年對於基礎建設投資需求為三
兆美元,所有⽬目前供需缺⼝口達兩兆美元。︒。
資料來源 :
World
Bank
45. 基礎建設投資可能的資⾦金來源
• UN
• Digital
Solidarity
Fund
• UNDP
(UN
Development
Programmes)
• SDG
(sustainable
development
goals)
• World
Bank
• International
Development
Association
• OECD
• Asia
Development
Bank
• International
internet
development
funds
• IIDF
(Internet
Initiatives
Development
Funds)
• ISIF
(Information
Society
Innovation
Fund)
• APNIC
Foundation
• Others
45
46. Funding
and
Implementation
Processes
46
Identification*
Preparation*
Appraisal*
Approval
Implementation
Completion*
Post
Evaluation
47. PBST
Model
47
Policy
Environment
üPolitical
parties
introduction
üRuling
party
üICT
policy
Society
Environment
üPopulation;
Land
area;
Capital
city
üEducation
introduction
Business
Environment
üGDP(PPP)
in
2016
üMajor
industries
üExport
/
import
items
üIndustrial
labor
pupulation
Technology
Environment
üInternet
and
telecom
market
üInternet
penetration
üGovernment
authority
for
ICT
policy
48. Design
and
Monitoring
Framework
48
Stakeholder
Analysis
Problem
Analysis
Objectives
Analysis
Alternatives
Analysis
Design
Design
Summary
Performance
Targets/
Indicators
Data
Sources/
Reporting
Mechanisms
Assumptions/
Risks
Impact
Activities
with
Milestones Inputs
Design
and
Monitoring
Framework
Outcome
Outputs
(DMF)
source
:
World
Bank;
ADB
49. Project
Identification
Alternatives
Analysis
49
Low
Internet
penetration
High
access
cost
Limit
access
to
information
&
knowledge
Small
market Market
failure
Inadequate
Internet
access
Human
right
infringement
Poor
infrastructure
Inadequate
skills
in
network
operation
Restrict
national
competency
Limit
network
services
Jeopardize
innovation
Enabling
Infrastructure
Capacity
building
New
net-‐enabled
innovations
and
services
Stimulate
innovation
Improve
national
competitiveness
Increase
business
productivity
Equal
access
to
the
Internet
Inefficient
business
processes
Enable
knowledge
&information
sharing
Enrich
Internet
accessibility
Neutralize
access
cost
Criteria
(Socioeconomic):
Universal
access
Consultation
on
Govt.
intervention
strategy
Consultation
on
stimulus
planning
appropriate
Internet
penetration
(Sample)
50. 50
Design
Summary
Performance
Targets/Indicators
Data
Sources/
Reporting
Mechanisms
Assumptions
(A)
/
Risks
(R)
Impact
The
Internet
penetration
of
the
country has
improved
The
internet
penetration
increased
from
48.4%
to
54.6%
at the
end
of
project
implementation
at
year
4.
Annual
Internet
statistics
report
.
International
Telecommunication
Union
(ITU)
A:
The
Ministry's
policy
regarding
the
provision
of
public
network
services
remains
unchanged.
Outcome
The
population
in
target
districts
use
advanced
wireless
services.
The Internet
infrastructure
expanded
to
5
districts with
1.7
sq.
KM
wireless
service
coverage
at
the
end
of
project
implementation.
Internet
users
in
the
5
selected
districts
increased
10080
at
the
end of
project
implementation.
Project Report
,
Ministry
of
Public
Service
A:
The
NICTO
ensures
that
the
wireless
network
is
well
maintained,
following
a
maintenance
standard.
A:
Operating
expenses
remain
stable
Outputs
1
Enabling
infrastructure
2
Capacity
building
The
wireless
service
coverage
increases
1.7
sq.
KM
in
year
2.
The
Internet
users
increased
from
2520
in
year
3,
to
10080
in
year
4.
Records
of
Project
Management
Office
R:
The
spectrum
registration
or
wireless
service
application
rejected
by
NCC
R:
The
existing
towers
of
base
station
can't
be
used
for
colcation
of
new
system.
Activities
1.1
site survey
1.2
conceptual design
1.3
Base
station
colocation
and
leasing
1.4
detail
design
1.5
infrastructure
implementation
1.6
service
activation
Inputs
Donor– $2.5 million
(80%
contribution)
•Consulting
-‐ $0.3
million
•Personnel
-‐ $0.55
million
•Equipment
-‐ $1.28
million
•Capacity Building -‐ $0.25
million
•Contingencies
-‐ $0.11
million
Government -‐ $0.6
million
(20%
contribution)
•Personnel
-‐ $0.36
million
•Logistics
-‐ $0.14
million
(colocation)
•Operating
expenses
– $0.1
million
2.1
site
survey
look
and
see
2.2
network engineering
training
2.3
help desk
training
2.4
remote
hands
and
eyes
SOP
2.5
network
operation
training
(Sample)
57. 寬頻滲透率對GDP影響
57
寬頻⾼高滲透率區域
High
Broadband
Penetration
Regions
寬頻低滲透率區域
Low
Broadband
Penetration
Regions
增加寬頻
滲透率
增加寬頻
滲透率
p 初期經濟⾼高度成⾧長, 但隨時間逐漸萎縮(供
給衝擊效應)
p 新經濟成⾧長 (創新, 新服務等)
p ⾼高穩定經濟成⾧長(追趕效應)
p 資本/勞⼒力替代性限制就業率成⾧長(⽣生產效
率)
(*)results
are
at
a
low
significance
level
資料來源 :
OECD;
吳國維,黃勝雄等,
2013
58. 寬頻激勵方案
Broadband
Stimulus
Plan
Goods/Sector
Input-‐Output
table
(each
column
of
the
input-‐
output
matrix
reports
the
monetary
value
of
an
industry’s
inputs
and
each
row
represents
the
value
of
an
industry’s
output)
Inputs
Households
State
Investments
Exports
demand
End
+
Volume
of
Goods
Imports
Gross
domestic
product
= -‐ =
Sector
Inputs
Value
added
Gross
production
Imports
Volume
of
goods
+
=
+
=
Input
side
就業與產能影響
Employment
and
production
effects
Output
side
(use
side)
資料來源 OECD;
吳國維,黃勝雄等,
2013
Structure
of
Input-‐Output
Table
寬頻激勵⽅方案對經濟的影響
58
59. 寬頻建設與GDP的變動量
59
低網路滲透率國家
希臘, 義大利, 葡萄牙
愛爾蘭, 西班牙
貢獻GDP成長:
0.008
中網路滲透率國家
德國,法國, 日本,比利時,
英國, 美國, 加拿大
貢獻GDP成長:
0.014
高網路滲透率國家
丹麥, 挪威, 荷蘭, 瑞典, 瑞
士
貢獻GDP成長:
0.023
資料來源 :
OECD;
吳國維,黃勝雄等,
2013
寬頻覆蓋率
群
組
平
均
對
G
D
P
影
響
國
家
寬
頻
成
長
對
G
D
P
影
響