Sunteți pe pagina 1din 119

1

INNOVATIONS IN
TEACHING & RESEARCH

11/16/16

M.P.Gupta
IIT Delhi

Agenda
2

Researc
h

Teachin
g

High Impact

Cartoons

Macro/ Global
issues

Latest news

Open evaluation
Validation

Open internet
Research paper
Term project
11/16/16

Research
High Impact
Macro/ Global issues
Open evaluation
Validation
11/16/16

What is research?

an original investigation undertaken in order to


contribute to knowledge and understanding in a
particular field
a creative activity leading to the production of new
knowledge
How do we know that the research results are new?
How do we know that the findings are original?
How do we know that the research was conduced in
a rigorous manner?
Overview of Qualitative Research

The peer review system

Research findings must be open to scrutiny and


formal evaluation by experts in a particular field
Experts are those who are experienced and qualified
to review research
If the research findings are new to these expert
reviewers, then we can say that the research findings
represent an original contribution to knowledge
This peer review system exists in all scientific
disciplines
It is a system of quality assurance
It is a social system
Overview of Qualitative Research

Research
6

Deductive (top-down)

Inductive (bottom-up

Aimed at testing a
theory

Generation of a new
theory from data

Via testing hypothesis,


hence

Associated with
quantitative research

Focus on new
phenomenon or
different perspective

Associated with
qualitative research
(grounded theory)

11/16/16

Quantitative vs qualitative research?


Qualitative
Quantification Analysis
understand people and what
The numerical
they say and do
representation
understand the context
and manipulation of
within which actions and
observations
decisions take place
for the purpose of
describing and explaining context helps to explain why
someone said something or
the phenomena that
those observations reflect
acted the way they did
Univariate, Bi-variate &
Also by talking to people, or
Multivariate Analysis
reading what they have
written, we can find out what
they are orOverview
wereofthinking
7
Qualitative Research

Quantitative and qualitative


Qualitative Research: Quantitative
A focus on text
Research:
A focus on numbers
Action research
Case study research
Ethnography
Grounded theory
Semiotics
Discourse analysis
Hermeneutics
Narrative and metaphor

Surveys
Laboratory experiments
Simulation
Mathematical modelling
Structured equation
modelling
Statistical analysis
Econometrics

Overview of Qualitative Research

Quantitative and qualitative research

Quantitative research focuses on numbers


Quantitative research is best if you want to
generalize to a larger population (find trends,
patterns . . . )
Qualitative research focuses on text. Text is what
people say (verbally or in written form)
Qualitative research is best if you want to study a
particular subject in depth

Both quantitative and qualitative research are useful


and needed in research in business and management.
Both are important and both can be rigorous
Overview of Qualitative Research

Triangulation
The word triangulation
has 2 meanings

Quantitativ
e

Qualitative

Combining quantitative and


qualitative research methods in
the one study
Using two or more techniques
to gather data

Others

Triangulati
on

The key idea is to look at the same topic but from different
angles
It is relatively common for qualitative researchers to use
the second form of triangulation, less so the first
Perhaps one of the best ways to triangulate qualitative and
quantitative methods is to involve multiple researchers who
10
Overview of Qualitative Research
have
the required expertise

Rigor and relevance in


research
Rigorous Research

Relevant Research

Scientific research
Emphasis on meeting
scientific standards such
as validity and reliability
Subject to academic peer
review
Published in academic
journals
Theoretical contribution

Relevant to business
practitioners
Emphasis on being of
practical immediate
relevant to practice
Published in consulting
reports or industry
magazines
Practical contribution

Table 2.2. Rigour and Relevance


11

Overview of Qualitative Research

Qualitative research and


relevance

12

Qualitative research allows scholarship


and practice to come together
Qualitative researchers in business and
management study real situations and
engage with people in organizations
It is one way for business research to
become more relevant

Overview of Qualitative Research

13

11/16/16

Study Design
14

Research question
(0)

Research Objective
(s)

Research
Methodology

1.What are various factors/


dimensions
of
information
security management for an
organization?

1.

To identify the factors of Keyword analysis;


information
security Brainstorming sessions,
management
for
an participation in seminars,
organization
workshops, conferences, etc.

2.How these factors/ dimensions


link and build an information
security management system for
the organization?

2.

To develop a framework for Questionnaire survey


organizational information
security
management
system

3.Is there a mechanism to


measure the present status of
information security management
practices of an organization?

3.

To device a mechanism
(tool/
instrument)
to
measure the current status
of
an
organizations
information
security
management practices

Qualitative (semi-structured
interviews)
Qualitative (semi-structured
interviews) and Quantitative
(questionnaire survey)
11/16/16

15

11/16/16

Hypothesis
16

statement of prediction

Usually a hypothesis
(prediction) goes with
another hypothesis (null) i.e.
other possible outcome

e.g. H=As a result of


employee training program,
there will be a significant
decreasein employee
absenteeism

H (null)=s a result of
employee training program,
there will either be no
significant difference in
employee absenteeism or
there will be a

statement of prediction

Usually a hypothesis
(prediction) goes with
another hypothesis (null) i.e.
other possible outcome

e.g. H=As a result of


employee training program,
there will be a significant
decreasein employee
absenteeism

H (null)=s a result of
employee training program,
there will either be no
significant difference in
11/16/16
employee
absenteeism or

Two-tailed hypothesis
17

When your prediction doesnotspecify a direction, we say you


have atwo-tailed hypothesis
assume you are studying a new drug treatment for depression.
drug not yet been tested on humans. You believe (based on
theory and the previous research) that the drug will have an
effect, but you are not confident enough to hypothesize a
direction and say the drug will reduce depression
This case may form 2 hypotheses like this:
The null hypothesis for this study is:
H (null): As a result of 300mg./day of the ABC drug, there will be
no significant difference in depression.
which is tested against the alternative hypothesis:
HA: As a result of 300mg./day of the ABC drug, there will be a
significant difference in depression.
11/16/16

18

11/16/16

19

11/16/16

Teaching
20

11/16/16

21

11/16/16

22

11/16/16

23

11/16/16

24

11/16/16

25

11/16/16

26

11/16/16

27

11/16/16

28

11/16/16

29

11/16/16

30

11/16/16

31

11/16/16

Update from News


32

11/16/16

Atos Origin builds on its experience in Beijing to


deliver a sustainable Games in real time at London
2012
London, 4th March 2009
33

London 2012 will be the sixth Olympic Games for Atos Origin, the Worldwide IT Partner of the
International Olympic Committee (IOC),

In Beijing, Atos Origin securely processed 60 per cent more competition data than in Athens,
totalling 1.5 million messages.

Atos Origin in conjunction with the other technology partners and the London Organising
Committee of the Olympic and Paralympic Games (LOCOG), is leading the integration of the
technology infrastructure and systems to ensure huge volumes of data can be processed and
delivered on demand to commentators, journalists, TV viewers and website visitors.

Evaluating the use of new technologies, such as virtualisation, so that the London 2012 Games
use less energy and hardware than in Beijing. Remote INFO, a service which provides access to
the London 2012 intranet could also be used to help reduce the seven million sheets of paper that
were printed in Beijing by providing the competition schedules and results directly to the
journalists computers.

Implemented a new solution, designed together with the IOC, the Olympic Data Feed - to
consolidate all data feeds to the newswires, websites and London 2012 intranet into a single
solution to provide a more sustainable and efficient service.

We are expecting to increase access to the Commentator Information Systems from outside the
host city, enabling journalists to access the rich information from the offices in their home
countries to reduce costs and the carbon footprint."

About Atos Origin


Atos Origin is an international information technology services company. Its business is turning
11/16/16
client vision into results through the application of Consulting, Systems Integration and Managed
Operations. The Companys annual revenue is EUR 5.5 billion and it employs 50,000 professionals

34

11/16/16

Ulster Banks computer chaos


(27 June 2012 The Telegraph)

35

> a month chaos (longest runing bank computer failure)


It was a botched systems software upgrade (routine
software update) went wrong last Tuesday
Around 100,000 Ulster Bank customers (of Northern
Ireland) were affected
Backlog created by the technical glitch was
unprecedented
It was an RBS Group problem
Ulster Bank has encountered a significant number of
minor issues which require manual intervention, which is
why we have taken longer to get fixed said Bank
officer.
11/16/16

Royal Bank of Scotland computer failure to cost bank 100m


(guardian.co.uk,Thursday 2 August 2012)

36

CEO Hester aologised to the up to 13 million customers of


RBS, NatWest and Ulster Bank

RBSto set aside > 100m to cover the cost of


compensating customers

This is amidst future of the ownership of the bank is also


uncertain which will also be scrutinised for any extra
provision forpayment protection insurance(PPI) mis-selling
which reached to 1.2bn.

The major banks have already set aside more than 8.5bn
for the mis-selling of the insurance.

Other provisions could be made to compensate any


customers who lost out as result of mis-sold interest rate
swaps, which were intended to help small businesses
protect themselves against interest rate rises.
11/16/16

Cont..
37

Hester, RBS might have been able to avoid its computer crisis if more had
been spent on upgrading existing systems rather than on developing new
applications.

"RBS has been spending big on technology.

Increased spending should have been in the core taken-for-granted


systems that work every day. Some of our focus was on the new things
people want," Hester said

RBS is among four banks to have reached an agreement with the Financial
Services Authority over interest rate swap mis-selling, but has not yet
quantified the cost of any compensation for customers.

The provision for compensation, is expected to cover the overtime costs


incurred by parachuting in extra staff for extended opening hours during
the week and the weekend opening, at the height of the problem.

While the bank has about 13 million retail customers, compensation is


expected to be handed out to a far smaller number, although even that
will run to tens of thousands of customers.
11/16/16

'A retail bank is nothing but an IT


company with a banking licence'
38

Running a massive, bomb-proof IT system is what a late twentieth


century bank does - it is its core business and we should be
politely waving adieu to public servants employed at tax-payer
expense who haven't the wit to see it.

However, this raises an interesting corollary, because it makes a


complete nonsense of the notion that under the auspices of
promoting competition the authorities can force Lloyds/HBoS to
lend the Coop the cash which enables the Coop to notionally take
over a tranche of old Lloyds branches but continue to run the
services on Lloyds IT systems.

A dirty great big, state of the art IT system is what a retail bank
sells to its customers, where on earth is the competition in having
a Lloyds subsidiary capitalised by Lloyds and running on Lloyds IT
systems with former Lloyds management and a preposterous
fiction that it is not Lloyds at all but another competing bank.
11/16/16

39

"RBS has seen a big mushrooming in spending on technology.


With hindsight maybe a bit more of that increase in spend
should have been in the core taken-for-granted systems that
work every day. Some of our focus was on the new things people
want,"
The problem MR Hester is that you have seen your core systems
as a cost centre to be drastically reduced by offsourcing support
instead of the key to the retail bank. Thousands of redundancies
of experienced IT staff to be replaced by inexperienced offshorers who have no-one to turn to to ask questions because all
the knowledge has gone. Mistakes inevitably follow, roll back
strategies and the like undermined.
That is a management failing repeated at all the big banks - Coop will suffer too from Lloyds's hollowed out systems

11/16/16

40

CAN I FORCE
NATWEST TO COVER
ANY PENALTIES?
The crisis-hit bank has so
far refused to confirm
specifically whether it
will compensate
customers if they are hit
with late payment fees
from third parties through no fault of their
own.
Our banking
correspondent explains
customers' rights when it
comes to getting justice
from financial services
firms.

11/16/16

Is this Britain's worst banking services failure?


41

Online banking services occasionally go down and customers find themselves


locked out, typically for a few hours.
But it's very rare that these problems last for longer than that. Last summer,
Tesco Bank saw a huge backlash particularly on the reader comments on this
website, when a technical glitch locked customers out of accounts for up four days.
But the full extent of those delays affected only 2,500 people. The meltdown at
RBS-NatWest has blighted up to 12million people.
Tesco promised to reimburse people who could prove they lost out financially as a
result of the confusion. Let's hope RBS offers the same response.
Unfortunately for customers of British banks these sort out of failures will become
more common
11/16/16

WAS NATWEST'S NEW MOBILE PAYMENTS GIZMO TO BLAME?


Last Wednesday, NatWest heralded a leap forward for its mobile phone payment
technology.
42

It launched a system - GetCash - that would allow people to take cash from an ATM
without using their cash card, by making a request on their handset.
They are sent a six digit pin number, after making the request, which can be entered at
a cash machine.
The aim, the bank said, was to help people who may have lost or forgotten their card or
those who want to leave their wallet at home.
It was made available to around two and-a-half million customers who already have the
banking app on their phone - on iPhone, Android or BlackBerry Smartphones, and on
the iPad.
The launch comment from Ben Green, head of mobile at NatWest and RBS, well now
have a sense or irony: 'We've heard countless stories from customers who've left their
wallet behind, or parents who need a quick way to send money
across to their children
11/16/16
immediately.'

Singapore Experience 20 July 2012


43

A Manager Was sitting on his desk and waiting for the day to end. He wanted to leave
early as he had some personal engagement.

Suddenly he saw a notification mail from Governance tool he was managing, informing
him about cancellation of some governance document. He was surprised to see the
notification, as he was not supposed to get the notification. He also had admin right, he
checked the tool and he found that he is not supposed to get the notifications as per
configuration.

Suddenly his phone start ringing outlook wasbombardedwith emails and he found that
everyone in the client side is getting the notification.

It was reported as incident. CEO also got the notification, he asked CIO what is it for. CIO
asked technology team and Technology Team Service Manager asked the Manager to
explain.

As root cause analysis was done, it was found that while changing the Work flow a
developers has selected the group everyone and saved the work flow. As he saved the
work flow, notification was triggered to everyone as configured. That was a Human Error,
but due to this error , everybody was worried and an escalation occurred.

A message was put in intranet for this incident, but due to all this Manager was not able
to fulfil his personal commitment which was very important for him.
11/16/16

Key Technology Trends That Raise Ethical Issues


44

Doubling of computer power

Rapidly declining data storage costs

Advances in data analysis techniques

Networking advances (sensors &


Internet of things)

Profiling raising privacy issues

Non-Obvious Relationship Awareness


(NORA)
11/16/16

BPO data security scandals


45

In 2004-05 India contributed 44% ($17.2 billion) of the world


outsourcing market.

BPO industry in the country in 2004-05 to reach a value of Rs.25,


080 crores.

Indian IT-ITES companies contributed 4.1% of the countrys GDP by


2004-05.

185 of the Fortune 500 companies were outsourcing from India.

50 out of the 74 SEI CMM Level 5 certified companies in the world


were based out of India.
11/16/16

BPO data security


scandals

46

But this success of Indian BPO companies was marred by a few scandals in
2005.

In April 2005 some workers on the payrolls of MphasiS BFL Pune, garnered
Personal Identification Numbers (PIN) and net passwords from the U.S.
Citibank customers and drew money from their accounts.

This incident made a serious dent in the credibility of the Indian BPO
industry. Experts realised that the security factor could make or break the
industry.

Hence, the Indian call centers and other BPOs agreed to create a
centralised information bank. The information bank would maintain records
of educational, occupational and credit histories of employees and enable
employers to conduct employee background checks.
11/16/16

NORA
47

NORA is program developed by Jef Jonas of


System Research and Development (SRD
founded in 1983), the data mining
company that made its name in Las Vegas
because of NORA

SRD wasacquired by IBMin 2005. Jeff is


now an IBM distinguished engineer and
chief scientist of IBM's Entity Analytics
division
11/16/16

NORA
48

NORA (Non-Obvious Relationship Awareness) is a program


that was created to help stave off theft in Casino's by
recognizing the "degree of separation" between players and
dealers.

It alerts casino security, for instance, that the dealer at table


11 once shared a phone number with the guy who is winning
big at that same table

This patented technology allows users to discern obvious and


so-called "non-obvious" relationships between data sets in
multiple databases. This view can help identify connections
that can span more than 30 degrees of separation.
11/16/16

NORA
49

One degree of separation would be two people who work at


the same casino who also listed the same address on their
resumes.

The 2nd degree: finding out that a third-party vendor


providing cards to the casino, attended the same high
school as one of those two employees.

The 3rd degree might be discovering that all three of these


individuals maintain checking accounts at the same bank.

9/11 case: For the case of Atta, NORA would have identified
that he at one point shared a home address with two other
9/11 terrorists, Khalid Al-Midhar and Salem
Alhazmi.
11/16/16

50

Anonymous Entity
Resolution

Jef Jonass current focus is Anonymous Entity Resolution" -- the


ability to share sensitive data without actually revealing it.

That is, by using one-way hashes, you can look across various
databases for a match without actually pooling all the data and
making it available to all.

This is fairly critical to the government if they want "total


information awareness" while maintaining citizen privacy and
some semblance of civil liberties.

Recent use by US to charge taxes over swiss a/c maintained US


citizens.
11/16/16

BySean O'Hare
6:02PM BST 03 May 2011
51

James Nason, head

ofSBA's intl

"The lump sum to be paid to be paid by Swiss bank

The original Swiss idea was that the rate should mirror
what the foreign client would pay in witholding tax back
home. If the UK signs the agreement it would receive the
tax revenue without the identity of the client being
revealed," he added.

Earlier this weekThe Financial Timesreported that tax on


undeclared assets in Switzerland would raise 3 billion by
2015 while the witholding tax would be announced later
this month and would stand at 50 per cent.

The Treasury estimates tens of thousands of British people


have stored a total of 125 billion in Swiss institutions
11/16/16
without paying UK tax

Real World Examples


52

Continental Can
Outsourcing Contact between CSC & EPA
Software Bomb at Revelon

11/16/16

http://www.nytimes.com/1990/10/25/business/company-news-rev
lon-accuses-a-supplier-of-sabotaging-its-software.html
53

11/16/16

Revlon Accuses a Supplier Of Sabotaging Its Software


By ANDREW POLLACK, Special to The New York Times
Published: October 25, 1990

54

A software supplier involved in a contract dispute with Revlon Inc. brought


some operations of the cosmetics giant to a halt last week by disabling
some of Revlon's software.

"We regard it as a form of commercial terrorism," James Conroy, special


counsel and vice president of public affairs for Revlon, said today.

The computer disruption closed two main distribution centers, in Phoenix


and in Edison, N.J., for three days, halting as much as $20 million in
product deliveries and idling hundreds of workers, Revlon said in a lawsuit
filed in California on Monday.

The suit characterized the action of the small software company,


Logisticon Inc. of Santa Clara, Calif., as "extortion."

Filed in California Superior Court in Santa Clara County, the suit charged
breach of contract, trespassing, interference and other violations.

Logisticon maintained today that it had disabled the software as a way to


"repossess" it because Revlon had failed to pay its bills. It said it was using
the only form of leverage available in the contract dispute.
11/16/16

Revlon
55

Logisticon, which was established in 1974, had a contract to supply Revlon with
software to manage inventory.

According to the lawsuit and to both parties, Revlon complained that the software
was not performing up to expectations, and on Oct. 9 said it would withold a
$180,000 payment on half of a two-part contract.

Revlon also told Logisticon that it would cancel the other half of the agreement,
valued at $600,000.

A few days later, at around 2:30 A.M., Eastern time, on Oct. 16, Logisticon gained
access to Revlon's computers over the telephone and activated commands that
disabled the software it supplied.

Revlon said Logisticon had activated viruses that unbeknownst to Revlon had been
planted in the software, making Revlon's data incomprehensible. Logisticon's
Response

Donald J. Gallagher, Logisticon's president, said today that the company did not use
any viruses and that it did not destroy any Revlon data, although Revlon could not
gain access to the data when the software was disabled.

Logisticon restored the software on Oct. 18, he said.

Mr. Gallagher added that while some bugs ought to be expected in complex
computer programs, Revlon was still using the software without paying for it.
He also said the cosmetics company was exaggerating the11/16/16
extent of the damage,

since Revlon had manual backup systems that could be used when computer

Revlon..
56

In a contract dispute two years ago, a Federal District Court in Oklahoma


enjoined a software company, Information Solutions Inc., from activating a "drop
dead device" that it had secretly implanted into software licensed to Franks &
Son Inc., a trucking company in the state.
Some software companies have included mechanisms in their products that
disable programs if yearly licensing fees are not paid. Others allow users to test
software knowing that if it is not paid for by a certain time, the software will selfdestruct. Security Breach Charged
Mr. Conroy said Revlon believed Logisticon might have violated computer
security laws.
But Mr. Gallagher countered that Logisticon, since it was working to fix the
problems in the software it supplied to Revlon, had access to the company's
machines from remote terminals.
Other lawyers said Revlon's accusation would depend to some extent on the
nature of the contract between the companies.
If the contract had a repossession clause in it, then Logisticon's action could be
merely "the electronic equivalent of walking off the job," said Susan Nycum, a
computer lawyer in Palo Alto, Calif.

11/16/16

Continental Can Loses Pension Case


57

The Continental Can Company developed a secret and sophisticated


computer program that it used to deny pension benefits to longtime
employees, a Federal judge ruled today.

In a sharply worded opinion, Federal District Judge H. Lee Sarokin directed


Continental Can to begin negotiating settlements with about 2,500
Continental workers. Costs to the company could approach $500 million.

''The plan was shrouded in secrecy and executed companywide at the


specific direction of the highest levels of corporate management,'' Judge
Sarokin said in a written opinion.

''It was intended to save hundreds of millions of dollars in unfunded


pension liabilities,'' he continued. ''The evidence of the plan, its secrecy
and its execution comes from the files of the defendants themselves. The
documents are more than a smoking gun; they are a fusillade.'' End to
Other Cases Seen

The case covered 315 layoffs at a St. Louis plant, and 43 of the company's
other 45 plants might be affected.
11/16/16

58

A suit on behalf of employees at a Los Angeles plant was won by the employees; a suit filed on
behalf of Pittsburgh employees is still in litigation. Judge Sarokin said in his ruling that there was no
need to hear the other cases against Continental, based in Norwalk, Conn.

''What the judge has said is that this should end all the cases everywhere,'' said Robert Plotkin, a
lawyer for the workers. ''This is not a case of a class-action suit where plaintiffs each have a claim
to $10. What we're talking here is, you have many former employees who have individual claims
worth in excess of $100,000.''

Douglas G. Eakeley, who represented Continental Can, did not respond to telephone calls seeking
comment. Layoffs at Issue

The pensions in question were special ''magic number'' pensions negotiated in 1977 by the United
Steelworkers union for employees subject to periodic layoffs. They were intended to protect
employees with long years of service who had not yet reached normal retirement age.

Lawyers for the workers have maintained that Continental management adopted a secret plan to
prevent employees from vesting in the costly pensions by laying them off before they became
eligible. The judge agreed with that argument.

A Federal pension law, called the Employee Retirement Income Security Act, prohibits employers
from taking any action against workers for the purpose of interfering with their pensions.

''For a corporation of this magnitude to engage in a complex, secret and deliberate scheme to deny
its workers bargained-for pension benefits raises questions of corporate morality, ethics and
decency which far transcend the factual and legal issues posed by this matter,'' the judge said.

Mr. Plotkin said the ruling should convince the company to quit dragging the suit on, but that he
was not counting on it. ''Continental's continued efforts to avoid its obligations to those employees
any way it can are deplorable,'' he said.
11/16/16

Company lawyers had argued there was no secret plan in place, and that even if there were, the

Oracle pays $2 million SEC fine to settle India corruption


case August 17, 2012
59

The SEC said that employees of Oracle's India unit structured


transactions with the government to allow distributors to hold $2.2
million in "unauthorized side funds."

Those India employees then had distributors pay local vendors, which
didn't provide anything to Oracle. The payments were covered up with
bogus invoices.

Oracle India secured a $3.9 million deal with India's Ministry of IT in May
2006.

As instructed by Oracle India's then-sales director, only $2.1 million was


sent to Oracle to record as revenue on the transaction, and the
distributor kept $151,000 for services rendered.

Certain other Oracle India employees further instructed the distributor


to park the remaining $1.7 million for "marketing development
purposes."

2 months later, one of those same Oracle India employees created and
provided to the distributor eight invoices for payments to purported
third-party vendors ranging from $110,000 to $396,000.

In fact, none of these store-front-only third parties provided any services

11/16/16

Apple vs Samsung
60

Published: August 15, 2012


The hot news in Silicon Valley legal
circles these days is Apples titanic
lawsuit against Samsung.
Apple maintains that Samsung pilfered
some of itsiPhoneandiPaddesigns
when creating the Samsung Galaxy
series of phones and tablets

11/16/16

USA Factory owners:


Federal prisoners stealing our business
61

August 14, 2012: 11:34 AM ET

American Apparel Inc., which manufactures Army uniforms in Alabama, has laid off
150 workers as a result of going head-to-head with Unicor for government contracts.

Unicor is a government-run enterprise that employs over 13,000 inmates -- at wages


as low as 23 cents an hour -- to make goods for the Pentagon and other federal
agencies.

With some exceptions, Unicor gets first dibs on federal contracts over private
companies as long as its bid is comparable in price, quantity and delivery. In other
words: If Unicor wants a contract, it gets it.

And that makes Wilson and other small business owners angry.

Wilson has been competing with Unicor for 20 years. He's an executive at American
Apparel Inc., an Alabama company that makes military uniforms. (It is not affiliated
with the international retailer of the same name.) He has gone head-to-head with
Unicor on just about every product his company makes -- and said he has laid off 150
people over the years as a result.

"We pay employees $9 on average," Wilson said. "They get full medical insurance,
401(k) plans and paid vacation. Yet we're competing against a federal program that
doesn't pay any of that."

Unicor, also known as Federal Prison Industries, is part of the U.S. Bureau of Prisons.
It has been preparing inmates for jobs after they get out since
1934.
11/16/16

The program has 83 factories and makes goods in seven industries -- apparel being

62

McConnell, one of the top Republicans on Capitol Hill, issued a public statement urging Unicor to back off. The
next day, it did.

With 100 employees, Mansh said Ashland is Olive Hill's largest employer. And he said losing the Air Force contract
would have shut the factory down.

"That's 100 people buying groceries. We use trucking companies in the town, buy parts and light bulbs there
every day," he said. "That's all lost when prisons take away contracts."

Unicor is not required to pay its workers minimum wage and instead pays inmates 23 cents to $1.15 an hour. It
doesn't have health insurance costs. It also doesn't shell out federal, state or local taxes.

Advocates for private sector companies are loudly campaigning for reform of Unicor's preferential status.

Unemployment has been over 8% for nearly four years "and there's a federal program tanking our industry," said
Kurt Courtney, director of government relations at the American Apparel and Footwear Association. "The only way
for workers to get jobs back is to go to prison. There's got to be a better way to do this."

In 2008, Congress amended the law to limit Unicor's advantage for certain kinds of Pentagon contracts. Now a bill
in the House supported by 28 lawmakers from both parties would go further and require Unicor to compete across
the board. The bill also provides alternative ways for training inmates, who would instead work for charities,
religious organizations, local governments or school districts.

"We know that in the recovery, many new jobs are coming out of small businesses," said Rep. Bill Huizenga, a
Michigan Republican who introduced the bill. "It makes no sense to strangle them in the cradle."

Huizenga expects a similar bill to be introduced in the Senate in the coming months.

Unicor doesn't agree with the criticism. According to spokeswoman Julie Rozier, inmates working for Unicor are
24% less likely to reoffend and 14% more likely to be employed long-term upon release. She also noted that over
40% of Unicor's supplies were purchased from small businesses in 2011.

She cited the unique costs associated with operating within a prison. For example, Unicor employs more
supervisors than a private sector firm would, and security lockdowns disrupt production.

Businesses aren't buying it. John Palatiello, president of the Business Coalition for Fair Competition, said his
organization of businesses and taxpayer groups is sympathetic to Unicor's goals. But they shouldn't be

11/16/16

Four Convicted in Sweden in Internet Piracy Case

April 17,

2009

63

A Swedish court has convicted four men linked to an Internet file-sharing


service, the Pirate Bay, of violating copyright law, giving the music and
movie industries a prominent victory in their campaign to curb online
piracy.

The court found on Friday that the men the three founders, Frederik Neij,
Gottfrid Svartholm Warg and Peter Sunde, as well as Carl Lundstrom, who
provided financing had aided copyright infringement by operating the
site, which provides links to thousands of songs, films, video games and
other material, and helps users download them.

They were each sentenced to a year in prison and were also ordered to pay
30 million kronor (about $3.6 million), in damages to leading entertainment
companies.

Pirate Bay is one of the largest so-called Bit Torrent trackers, which
facilitate downloads of large digital files by enlisting the help of other
computers.

The defendants had maintained that they were innocent because they did
not actually host any of the copyrighted material on their servers.
11/16/16

64

Internet users and media companies have been following the case closely because of the size of
Pirate Bay it is estimated to have more than 20 million users worldwide and the defiant stance of
its operators. The trial this winter took place amid a carnival atmosphere in Stockholm, with bands
playing outside the courtroom and Twitterers tweeting away.

John Kennedy, chief executive of the International Federation of the Phonographic Industry, one of the
groups that had supported the case against Pirate Bay, said the decision sent a strong message
about the importance of copyright.

We are satisfied that the court has clearly said that what they were doing was wrong, Mr. Kennedy
said.

In the near term, the decision may have little effect on the day-to-day operations of Pirate Bay; the
defendants have vowed to continue running the service as they appeal.

Mr. Kennedy said music and movie industry groups planned to file additional litigation to try to get the
site shut down. He said that while he expected the defendants to hand over the baton to others,
that might be more difficult.

Over the last decade, media companies have won a series of court victories around the world against
file-sharing services like Napster, Kazaa and Grokster.

But unauthorized copying remains a big problem, in particular for the record business. The music
industry federation estimates that 95 percent of music downloads involve pirated work.

Mark Mulligan, an analyst atForrester Research, said the decision Friday would not result in a
meaningful decrease in piracy. Internet users are turning to new ways to share music, including
streaming and messaging services, which are harder for copyright owners and enforcement officials
to detect.

11/16/16

France
65

In France last week, the National


Assembly rejected a government
proposal to cut off the Internet
connections of persistent copyright
pirates, in a surprise vote.
PresidentNicolas Sarkozyhas said the
government will reintroduce the
measure at the end of the month

11/16/16

Internet Pirates Will Always Win


August 4, 2012
66

STOPPING online piracy is like playing the worlds largest game of Whac-AMole. Hit one, countless others appear. Quickly. And the mallet is heavy and
slow.

Take as an exampleYouTube, where the Recording Industry Association of


America almost rules with an iron fist, but doesnt, because of deceptions like
theone involving a cat.

YouTube, which is owned by Google, offers a free tool to the movie studios and
television networks called Content ID. When a studio legitimately uploads a
clip from a copyrighted film to YouTube, the Google tool automatically finds
and blocks copies of the product.

To get around this roadblock, some YouTube users started placing copyrighted
videos inside a still photo of a cat that appears to be watching an old JVC
television set. The Content ID algorithm has a difficult time seeing that the
video is violating any copyright rules; it just sees a cat watching TV.

Sure, its annoying for those who want to watch the video, but it works.
(Obviously, its more than annoying for the company whose product is being
pirated.)
11/16/16

67

Then there are those possibly tens of millions of users,


actually who engage in peer-to-peer file-sharing on the
sites using the BitTorrent protocol.

Earlier this year, after months of legal wrangling,


authorities in a number of countries won an injunction
against thePirate Bay, probably the largest and most
famous BitTorrent piracy site on the Web. The order blocked
people from entering the site.

In retaliation, the Pirate Bay wrapped up the code that runs


its entire Web site, and offered it as a free downloadable
file for anyone to copy and install on their own servers.
People began setting up hundreds of new versions of the
site, and the piracy continues unabated.

Thus, whacking one big mole created hundreds of smaller


ones.
11/16/16

68

11/16/16

Possible Cyber Security Policy


Research Domains (JWG-SS to
PSA)
69

The key to success of this policy lies in its effective implementation. Identify
challenges in the operationalization of this policy
incentives and subsidies will be needed to support Small and Medium
Enterprises for accessing the technology to make their systems secure
Telecom MinisterMr Kapil Sibalstatement, "We need a global pact on issue of
security. That's fundamental to this interconnected world being a successful
story in this 21st century,"

what could be the various aspects of a global treaty on cyber security?


What would be the Indias long term position?

The danger in inter-connected world during 21st century is that it is difficult to


know who is going to attack and from where. The Minister said, there will be
multiple places from where cyber war could take place, it will involve
individuals, sections of society, businesses, terrorists, drug dealers and those
who want to generate violence. He added, it will not be possible to point to a
particular country to identify the source of the attack because it will difficult in
the cyberspace to figure it out.

Issues of cyber Terrorism?


Issues of Cyber war?

11/16/16

70

Issues of asymmetry in the laws on the Internet.

Issues of "accountability and responsibility" in the cyber space. Minister, If there is a


cyber space violation and the subject matter is India because it impacts India, then
India should have jurisdiction. For example, if I have an embassy in New York, then
anything that happens in that embassy is Indian territory and there applies Indian
Law. The issue of identity in cyber space is of enormous importance. There must be
accountability and responsibility in the cyber space.

Issues of governance in cyber space. Minister says governance in cyber space is


oxymoron

Our cyber security framework adopts a multi layered approach


NSA. What are other competing approaches?

Mr Sibal talked about the planned infrastructural upgrades to the


Indian cyber security systems. What are the specific parameters
and how to identify them?

Paradox of freedom of speech vs misuse of social networking


sites

steps to protect Critical Information Infrastructures (CIIs)

11/16/16
Analyse various aspects of National Crisis management
Plan

71

Analyse the need for Information Sharing and Analysis Centre and testing
and certification labs

Assessing security risks emanating due to use of new technologies e.g.


Cloud Computing

Assessing risks arising due to use of social networking sites by criminals


and anti-national elements.

Mechanism to incorporate cyber-crime tracking, cyber forensic capacity


building and creation of a platform for sharing and analysis of information
between public and private sectors on continuous basis.

Aspects of ICT supply chain risks

Issues with Indian Armed forces in establishing a cyber-command as a part


of strengthening the cyber security of defence network and installations.

Creation of cyber command will entail a parallel hierarchical structure and


being one of the most important stakeholders, it will be prudent to address
the jurisdiction issues right at the beginning of policy implementation.

Aspects of global debate on national security versus right to privacy and


civil liberties

Strategies for safeguarding privacy of citizen data

11/16/16

72

Models of public-private partnership as stated in this policy


Key cyber security management priorities and establish performance metrics
Build a cybersecurity-based identity management vision and strategy, leveraging
privacy-enhancing technologies for the Nation
Conduct interagency-cleared legal analyses of priority cybersecurity-related issues
Means of strengthening international partnerships
Aspects of identity theft phenomenon
Guidelines on public company disclosures of cyber breaches and risk
Input on balancing security needs against the business needs of public companies
and regulated entities [financial markets are dependent on sophisticated and
interconnected technology, and that cyberattacks on financial institutions and the
infrastructure underlying capital markets are increasingly common]
What could be cybersecurity response plan in strategic businesses?
Issues of sharing information on threats between the public sector and government
[guidelines as to what businesses can share with government and each other
without creating potential liability related to privacy and civil liberties concerns]

11/16/16

73

11/16/16

Minor scheme
74

No question paper
You choose any topic of BI (other than one you wrote in
Minor-1)
Develop knowledge on this by advance reading of
news/articles/reports/
cases covering its variety of aspects
In Minor-2 you will get answer sheet to write about the same
In Major Test, we follow same pattern. Here you will be required to
continue writing beyond what you covered in Minor-2
Purpose of this scheme is to allow develop deep insight on a
topic of BI.
And enable to convert this knowledge into a piece of write-up for
intelligent readers.
11/16/16

75

11/16/16

76

11/16/16

77

11/16/16

Research
78

11/16/16

Project Overview
79

Objective
To understand the current status of Indian electronics market
To analyze the economic and strategic rationale behind the need for
building the indigenous semiconductor manufacturing base
Examine the drivers and the challenges of the Indian semiconductor
manufacturing industry
Recommendations to overcome the challenges and to build a
semiconductor manufacturing ecosystem

Methodology
Secondary research Research papers and Books on Semiconductor
Manufacturing Industry.
Primary research Survey conducted among the experts from
Semiconductor Industry
Learning that India can apply from the East Asian model of
Semiconductor
Research
Gaps Industry growth
Limited India specific information about Indigenous Foundries
Limited expert advice
11/16/16

Introduction to
Semiconductor Industry
80

The semiconductor industry survives on an agenda: smaller, faster and


cheaper
Its all in large part due to fierce competition and also due to new
technologies that can lower the cost of production per chip
Revenue
Typically,

higher

the

R&D/Sales

ratio, better is the prospects for the


chip maker in terms of opportunities
available for developing new chip
products.
Yield
In the 1980s, chip manufacturers
lived with yields of 10-30%. To be
competitive

today,

however,

chip

manufacturers have to sustain yields


of

80-90%.

This

requires

very

Types of Chips
Memory
Microprocessors
Commodity Integrated
11/16/16 Circuit
Complex System on Chip

Evolution of Semiconductor Industry


81

IBM
was the first to build its highly
vertically integrated system
In order to make them, one had to create a
captive
subsidiary
within
a
systems
company and design the system and the
semiconductors within that system at
the same time
Hitachi, Fujitsu, NEC and Toshiba
Intel is one important example of the IDM
model
These companies do not make the final
system, but provide all elements in the
semiconductor device used in the system.
Samsung, Intel, Texas
The foundry model also ushered in the era of
semiconductor industry outsourcing, off
shoring and full-scale globalization
These practices and strategies have allowed
semiconductor
companies
to
split
manufacturing processes into multiple
stages with each stage being performed in
the most efficient and cost-effective
way
11/16/16
Foundries: TSMC, UMC,

Porters Five Forces Analysis of


Semiconductor Industry
Many semiconductor companies have
hundreds of suppliers
Suppliers have little power

82

Most of the industry's key segments


are dominated by a small number of
large players. This means that buyers
have little bargaining power

Power of
Buyers

Power of
Suppliers
Pressure on chip
makers to come
up
with
something new,
better,
faster
and cheaper

Competitive
Rivalry

Threat of
New Entrants

The setting up costs for a chip


fabrication is around billions of dollars
in investment.
Only the biggest players can keep up
with state-of-the-art operations

The result is an
industry
that
continually
produces
cutting-edge
technology

Availability
of
Substitutes
IPR protection; Companies produce
similar products at lower prices
Company that spends on R&D will
11/16/16
strive to recoup the costs

Need for a Semiconductor Manufacturing


base in India
83

Import burden: Current import bill for semiconductors is

Balance the
about $7 billion per year and increasing at 22% rate. By
Current Account
2020, Indias semiconductor import bill is expected to $70
billion.

Selfdependence
Critical
information
infrastructure
security
Energy
Conservation
and alternative
sources
Platform for
scientific
innovation and
R&D
based
industries

Sourcing security: India imports more than 95% of its


semiconductor needs from China, Taiwan, Japan, US etc. This
leaves India exposed to disruptions in supply due to natural
disasters, trade disputes, etc.
Protection of critical information: Semiconductor chip
specification play an influential role in security policies. In
2010 Chinese hackers have reportedly broken into top
secret files of the Indian Defence Ministry and
embassies around the world.
Alternative energy generation: solar, LED and logic can
be applied to alternative energy industry (solar photovoltaic
cells, solar LED lanterns, smart grid technology)

Innovation in new industries: Opportunity to build


expertise in several technology end markets e.g.
alternative energy industry (solar photovoltaic cells, smart
11/16/16
grid technology)

Economic opportunity for developing


Semiconductor Manufacturing base in India
84

Indias Semiconductor Demand from various electronics


segments

Telecom
products
Information
technology and
office
automation

Semiconductor Demand from the Telecom products and


equipment in 2010 was $3.3B which is projected to reach
$30.3 B in 2020. This is the fastest growing segments for
semiconductor products in India.
In 2010 The IT sector consumed $2.1B of semiconductor
products in terms of value which is expected to touch $10.5B
in 2020 . India being really strong in the IT services has
attributed to this growth in demand of semiconductor products

Consumer
Electronics

The demand due to consumer electronics is expected to jump


from $0.43B to $1.8B from 2010 to 2020

Others(Industri
al, Automotive
and others)

Automotive , medical, set top boxes and others are driving


the demand of semiconductor products which is expected to
spur from $0.8 B in 2010 to $6.9B in 2020.
11/16/16

Drivers and Challenges of Indian


Semiconductor Manufacturing Industry
85

Drivers

The growth of the product markets is


one of the key drivers where mobile
devices, consumer electronics and
IT products continue to script some of
the high growth rates globally
Financial inclusion programs and
rising
standards
of
living
have
generated demand for new products
besides increasing customer-base of
existing ones.
India is also recognized globally as a
key source of high technology skills
which
are
leveraged
by
global
corporations for generating value.
The recognition of the ESDM industry
as a key contributor to the GDP is a
major step forward.
The national policies on telecom and
electronics have the potential to bring
about a major change in the domestic
industry.
India has some key advantages,

Challenges
Indian government has fallen far
behind China and Taiwan in
encouraging the development of a
vibrant electronics sector. There
have been limited government
incentives.
The country is noted for the sore
absence of
Angel fund investors,
Efficient power supply,
Clean water for fab units,
Poor
waste
management,
warehousing,
and
road
network infrastructures.
For global companies, the Indian
market is still too small to
warrant setting up a fab.
Our
continuing
reliance
on
imports is impeding growth of
domestic manufacturing
The high cost of developing
11/16/16
products
including
duties,

Indias role in Global Electronics Industry


India is playing a major and increasing role in the global electronics
industry, which motivates the development of a local semiconductor
manufacturing base.
The global electronics industry is very

86

large and growing. Indias electronics


industry is already important and
growing at 7x the global rate
India market currently represents ~2%
of the global production of electronics
and is expected to grow at 22% per
year

Source: ESDM DOIT report; IC Economics


report
Semiconductor
content
in
electronics products is very
significant, which implies very
strong demand for semiconductor
manufacturing in India

11/16/16
Source: ESDM DOIT report; IC Economics

Indias semiconductor imports


87

The economic rationale for semiconductor manufacturing is


driven by a significant and growing local demand, mostly
satisfied by imports

India has around $7 billion in annual


semiconductor
consumption
but
virtually no production
~99%
of
Indias
semiconductor
demand is met by imports from
countries like Taiwan, USA, and Japan

Source: ISA - FROST & SULLIVAN 2010 12


India Semiconductor Market Update

The import burden driven by this


disparity will grow significant by
2020 to $45-50 billion

11/16/16
Source: ISA - FROST & SULLIVAN 2010 12 India Semiconductor

Human capital presence


88

India has a significant human capital presence


semiconductors, but is currently focused on design

already

in

India has a potentially large highly


skilled scientific and engineering expat
population

Source: ESDM DoIT report 2010, NSF, Study on


semiconductor design embedded software and
services industry

With a large talent pool of 200K+


design
engineers,
India
semiconductor design market has
grown at 28% over the last 7
years

11/16/16

Source: ESDM DoIT report 2010, NSF, Study on


semiconductor design embedded software and

Current scenario in the Indian


Semiconductor Industry
89

India has been so far unsuccessful in getting chip manufacturers to set up


factories in the country , largely because its infrastructure being inadequate.

The department of electronics and information technology is considering a


proposal to set up research and development centres in the country.

These R&D centres, which will be supported by the government, by having


joint ownership with industry and academia.

In June 2011, India invited proposals from firms wishing to set up


semiconductor fabrication units.
In response to the 2011 offer, the
government received almost 30
In 2008 by SemIndia, a U.S.
letters expressing interest, from
company which was supposed
companies
such
as
Infineon
to
setup
a
foundry
in
Technologies AG, STMicroelectronics,
Hyderabad, remained a futile
Russias Sitronics, Globalfoundries Inc.
attempt due to conflicts over
and a consortium comprising Jaypee
the agreement signed with the
Associates, IBM and Israeli firm
AP government.
So far, two giants haveTowerJazz.
shown signs of building

foundries.
The first one being Jaypee Group. It has partnered
with IBM, which will provide the technology.
The second bid is from Hindustan Semiconductor
11/16/16
Manufacturing Corp., a U.S. company.
It has
partnered with the Geneva-based chip maker

Factors responsible for East Asian


Semiconductor Industry Growth(1/2)
90

Taiwan started its Semiconductor ride in 1980s.


Public sector R&D organizations such as Industrial Technology
Research Institute (ITRI) played a vital role in transforming Taiwans
economy from a labour-intensive industry to a high-tech industry.
High-tech companies in Taiwan, such as leaders in the semiconductor
industry TSMC and UMC, can trace their origins to ITRI.
It acted as a conduit between the Taiwan Industry and High-tech
firms in US by establishing Technology Transfer agreements

In Late 90s, Singapore experienced a plethora of MNCs setting up

fabrication plants.
MNCs from US, Europe and Japan invested in the form of FDIs
Singapore developed skilled labour and expertise from these
companies and have come up with many small and medium sized
companies
Malaysia, Thailand, Philippines, China started with low value adding
services like IC packaging. Eventually these countries entered IC
fabrication
11/16/16

Factors responsible for East Asian


Semiconductor Industry Growth(2/2)
91

Companies from South Korea, Taiwan, Singapore did not just


rely on high R&D or innovation activities within the firm but they
acquired engineering capabilities by coordinating with advanced
firms from the Silicon Valley
This was done through licensing of technologies, engaging in OEM,
joint ventures etc.
The Taiwan government has provided preferential policies such
as tax holiday to semiconductor firms in the island.
These policies are being imitated in mainland China as well, to lure
firms there in future
The Chinese government has also implemented: preferential valueadded tax (VAT) policies; preferential enterprise income tax policies;
preferential customs duties and import-related VAT policies; length of
years enjoying preferential policies; limit for depreciation of equipment
used in production, etc
In Korea the government has established dozens of venture
capitalist firms to provide direct equity injections, loans, and
managerial advice to small and medium sized firms.
11/16/16

Basis of competitive postures


Product Innovation

Process innovation

Diffusion management

Competitive focus

Product

Process

Access to technologies; diffusion

Competitive tools

IPR; first mover advantage

Cost; quality

Resource leverage

Firms

Firms;

92

Competitive vehicles Firms

Government

research

institutions;

consortia
Dynamic capabilities Product enhancement; R&D

Process

enhancement; Combinative

quality/time improvement

Strategic goals

Sustainable

competitive Temporary

advantage

Sources

of First-mover advantages

capabilities;

organizational

learning

competitive Transient competitive parity

advantage

Quality/tie enhancement

Fast followership

Limited competition

Accelerated

competitive
advantage
Institutional

Atomistic competition

framework
Lead countries

diffusion

linkages with MNCs


US

Japan

11/16/16

Korea, Taiwan

within

consortia;

National Policy on Electronics


93

NPE Vision
To create a globally competitive electronics design and manufacturing
industry to
meet the country's needs and serve the international market
NPE Goals for 2020
1. Turnover of US$ 400 Billion; Chip design/ embedded software industry to US$ 55
Billion
2. Includes over 50 initiatives to create an overall ecosystem to make electronics
manufacturing globally competitive.
Preferential Market Access (PMA)

Modified Special Incentive Package Scheme

25% of capex in non-SEZs (20% in


Preference
to
domestically
SEZs) for 10 years
manufactured electronic goods in

Reimbursement of Countervailing
Government procurement
duty/excise for capital equipment

Electronic goods having security


in non-SEZ units
implications
Reimbursement of Central taxes
Extent of Government procurement from
and duties for 10 years in select
domestic manufacturers will not be less
high tech units like fabs.
than 30 % of the total procurement.
Electronics Manufacturing Clusters
Financial assistance of 50% of infrastructure cost subject to ceiling of Rs.
50 crores per 100 acres of land Government procurement
Applicable to both Greenfield and Brownfield projects
11/16/16

Survey Results(1/5)
94

Entry
Barrier

70% respondents say High Capital Requirement is


the strongest entry barrier for the Indian
Semiconductor Industry

50% respondents say Competition from


established global players is relatively less strong
among all the barriers

11/16/16

Survey Results(2/5)
95

Infrastructure
issues

60% respondents say clean water requirement is an


extremely strong infrastructure challenge

80% respondents say power requirement is an


extremely strong infrastructure challenge

11/16/16

Survey Results(3/5)
96

Focus Strategy

80% respondents say patent activities-R&D as the


most important factor that the Indian
semiconductor manufacturing industry should focus
on

60% respondents say focusing on producing low


priced products is an important factor

11/16/16

Survey Results(4/5)
97

Factors important for


the growth of
semiconductor
Industry

60% respondents say high capital


availability is extremely important for the
growth of Indian Semiconductor
manufacturing industry

60% respondents say availability of skilled


manpower is extremely important for the growth
of Indian Semiconductor manufacturing industry

11/16/16

Survey Results(5/5)
98

Ecosystem

60% respondents say encouraging MNCs to build


an ecosystem will have extremely high positive
impact on semiconductor manufacturing industry
in India

Only 20% respondents say Indian companies depending on


technology transfer will have extremely high positive impact on
semiconductor manufacturing industry in India

11/16/16

Key Recommendations
Provide avenues for seed and VC funding (Government and private)
99

Developing a conducive business environment for Multi National


Companies
Incentives must be linked to marketing and production through indirect
tax concessions rather than provide equity or grant. This would make
sure that the technology provider and investor brings marketable cutting
edge technology.
Another perspective could so be, that a mix of grant and marketing linked
incentives might be required to attract investors.
Upstream and downstream units engaged in manufacturing of electronics
products must be concentrated in clusters, thus leading to advantages of
proximity and scale.
Develop an institutional guidance for technological leverage and
encourage coordination between Knowledge warehouse institutions,
government and private participants

11/16/16

Provision of R&D funding initiatives for academia and industry

Conclusion
100

What it takes to setting up a FAB in India


High capital expenditure:
A glimpse of Global Leader TSMCs Spend:
$5-8 B capital expenditure per year
$1 B R&D annual expenditure
$90B Market capitalization(20 times of competitor)
$4 B+ minimum cost for setting up Fab
Leading edge R&D needed
High gestation period
Time typically it takes to develop a Fab
Core shell needs to be built first( it takes 12-18 months)
First movement of equipment takes to 12-18 months
Preliminary rollout 1000 wafers a month
Approximate time for 1st production is 3 years

EXISTING ELECTRONICS CLUSTERS


Sriperambudur (Tamil Nadu): India's largest cluster where
electronic industries are found. Nokia has a big presence
here.
11/16/16
Electronics City: Bangalore Okhla: Delhi Noida (NCR)

References
101

[1] Anurag Prasad Feature semiconductors : From polymers to wafers Outllook


India May 4-17,2008
[2] Eddy Liu, Risk v. s Investment.. Semiconductor Industry Trade Off Taiwan
Semiconductor Manufacturing Co. Taiwan R.0.C
[3] India Semiconductor Association, Frost & Sullivan 2010-12 India
Semiconductor Market Update
[4] John A. Mathews, Dong-Sung Cho, Tiger Technology: The Creation of a
Semiconductor Industry in East Asia, first ed., Cambridge University Press, (March
5, 2007)
[5] Matthias Williams, Manufacturing: Indias pipe dream? Made in India, Reuters,
Sriperumbudur, June 2011
[6] Ministry of Communications and Information Technology, Department of
Electronics and Information Technology National Policy on Electronics 2012 19 th
November, 2012
[7] Moore, G. E.; Lithography and the Future of Moore's Law, Proc. SPIE Vol. 2437,
995,
ftp://download.intel.com/museum/Moores_Law/ArticlesPress_Releases/1995_SPIE_Speech.pdf
[8] PricewaterhousCoopers report Another year of strong growth-Chinas impact on
the semiconductor industry 2012 update
[9] Pugh, E. W.; Building IBM: Shaping an Industry and Its Technology, Cambridge,
Mass.: MIT Press, 1995
[10] PVG Menon, Future of chip design industry Yojana, septemmber 2012
[11] Tetsuya Iizuka Semiconductor Industry Prosperity Trough Deeper Horizontal
Collaborations THine Electronics, Inc. Chuo-ku, Tokyo, Japan 11/16/16
[12] T. Iizuka, Semiconductor Industry: The name of the game. Symp. VLSI Circuits

References
102

[15] Retrieved 2-may-2013 from: http://www.economist.com/node/21542402 The


semiconductor industry-Space invaders
[16] Retrieved 20-4-2013 from
http://www.eetimes.com/news/semi/showArticle.jhtml?articleID=205602172
[17] Retrieved 22-4-2013 from:
http://www.eetimes.com/news/semi/showArticle.jhtml?articleID=205602172
[18] Retrieved 22-4-2013 from:
http://www.eetasia.com/ART_8800444105_480200_NT_cd146192.HTM
[19] Don Brooks, interview Retrieved 24-4-2013 from:
http://silicongenesis.stanford.edu/transcripts/brooks.htm
[20] Retrieved 15-04-2013 from:
http://www.eeherald.com/section/news/onws20130228405.html
India semiconductor fab dream addressed
[21] Retrieved 10-04-2013 from:
http://www.business-standard.com/article/companies/should-an-indian-fab-use-anolder-process-technology-113032100013_1.html
Should an Indian fab use an older process technology?

11/16/16

103

11/16/16

104

11/16/16

Quantitative Analysis
105

11/16/16

Quantification of Data

Quantification The numerical


representation

Analysis - manipulation of observations

Quantification Analysis The numerical


representation and manipulation of
observations for the purpose of describing
and explaining the phenomena that those
observations reflect.
.

Age

1
2
3
4
5

=
=
=
=
=

1
2
3
4
5

Political Affiliation

Region of Country

Sex

Male = 1
Female = 2

Democrat = 1
Republican = 2
Independent = 3

West = 1
Midwest = 2
South = 3
Northeast = 4

Figure 14.1

ATTEND

Abbreviated Variable
Name

Numerical Label

How often do you attend religious services?


0.
1.
2.
3.
4.
5.
6.
7.
8.
9.

Never
Less than once a year
About once or twice a year
Several times a year
About once a month
2-3 times a month
Nearly every week
Every week
Several times a week
Dont know, No answer

Definition of the
Variable

Variable
Attributes

Univariate Analysis

Univariate Analysis The analysis of a single


variable, for purposes of description (examples:
frequency distribution, averages, and measures
of dispersion).

Example: Gender

The number of men in a sample/population and the number


of women in a sample/population.

Distributions

Frequency Distributions A description of the


number of times the various attributes of a
variable are observed in a sample.

Figure 14.3

Figure 14.4

Central Tendency
Average An ambiguous term generally suggesting typical
or normal a central tendency [examples: mean, median,
mode]

Mean an average computed by summing the


values of several observations and dividing by
the number of observations.

Mode- an average representing the most


frequently observed value or attribute.

Median an average representing the value of


the middle case in a rank-ordered set of
observations.

Practice: The following list represents the


scores on a mid-term exam.

100, 94, 88, 91, 75, 61, 93, 82, 70, 88, 71,
88

Determine the mean, mode & median.

Figure 14.5

Dispersion The distribution of values around


some central value, such as an average.

Standard Deviation A measure of dispersion


around the mean, calculated so that
approximately 68 percent of the cases will lie
within plus or minus one standard deviation
from the mean, 95 percent within two, and
99.9 percent within three standard deviations.

Figure 14.6

Continuous Variable A variable whose


attributes form a steady progression,
such as age of income.

Discrete Variable A variable whose


attributes are separate from one
another, such as gender or political
affiliation.

Bivariate Analysis

Bivariate Analysis The analysis of two


variables simultaneously, for the
purpose of determine the empirical
relationship between them.

S-ar putea să vă placă și