English  |  正體中文  |  简体中文  |  Post-Print筆數 : 27 |  Items with full text/Total items : 109952/140887 (78%)
Visitors : 46360066      Online Users : 1218
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version
    政大機構典藏 > 商學院 > 資訊管理學系 > 學位論文 >  Item 140.119/60228
    Please use this identifier to cite or link to this item: https://nccur.lib.nccu.edu.tw/handle/140.119/60228


    Title: 中小企業資訊系統外包採用雲端運算服務之因素探討
    Cloud computing service as an alternative for SME information systems outsourcing: assessing the key factors
    Authors: 陳祺堯
    Chen, Chi Yau
    Contributors: 管郁君
    Huang, Eugenia Y.
    陳祺堯
    Chen, Chi Yau
    Keywords: 雲端運算
    中小企業
    資訊系統
    外包
    德菲法
    層級分析法
    Cloud computing
    SME
    Information systems
    Outsourcing
    Delphi methods
    Analytic Hierarchy Process
    Date: 2010
    Issue Date: 2013-09-04 17:01:30 (UTC+8)
    Abstract: 雲端運算(Cloud Computing),是近年來在資訊科技與商業資訊應用領域中,佔有相當重要地位的研究與應用議題。眾多企業的執行長與資訊專家宣稱,雲端運算可降低基礎硬體設施與軟體維護的管理成本,為企業組織帶來新的契機與創造全新的商業模式。並非所有人都對雲端運算有正面的評價,部分專家學者指出,科技公司如Google、Microsoft與Amazon等大力推廣雲端運算,皆為了其利益和提高其現有硬體設備資產之利用度,過度高估雲端運算的價值以吸引企業客戶外包更多資訊系統與資訊應用。而無論雲端運算是否能成為下個世代的潮流,未來電腦發展趨勢,已有趨向集中分散各處的運算資源來完成需要高度運算能力服務之現象。

      本研究提出一分析模式,預期讓中小企業(Small and Medium-sized Enterprise ,SME)進行外包資訊系統決策,在採用傳統外包與雲端運算外包此二種模式中做抉擇時,能對可能影響決策之因素進行評比與重要性排序,讓雲端服務提供廠商了解使用者所重視的要點以改善現有的服務與加強其發展的方向。本研究亦蒐集雲端運算的相關文獻與各方評價,以及與雲端運算相關之技術和特性,彙整成為一多面向之因素模型。本研究使用德菲法(Delphi Method)與層級分析法(Analytic Hierarchy Process, AHP),透過製發問卷來濾除模型中不重要之因素與分析因素之間相對的重要程度。本研究之最終研究結果顯示安全性(Security)與穩定性(Stability)兩大面向與相關因素,為中小企業在進行外包決策與選擇服務提供商之優先考量。
    Reference: Adiga, N.R., Almasi, G., … Almasi, G.S. (2002). An Overview of the BlueGene/L Supercomputer. Supercomputing, ACM/IEEE 2002 Conference.

    Berman, F., Fox, G., Hey, A. J. G. (2003). Grid computing: Making the global infrastructure a reality. US: Wiley.

    Buyya, R. (1999). High Performance Cluster Computing: Programming and Applications Volume 2. US: Prentice Hall.

    Brancheau, J. C., & Wetherbe, J. C. (1987). Key issues in information systems management. MIS Quarterly, 11(1), 23-45.

    Byrne, A., Boon, H., Austin, Z., Jurgens, T., & Raman-Wilms, L. (2010). Core competencies in natural health products for Canadian pharmacy students. American Journal of Pharmaceutical Education, 74(3), 45.

    Carr, N. G. (2003, May). IT Doesn’t Matter. Harvard Business Review.

    Clouser, G. (2002, June). Why outsource. Oil & Gas Investor, 1-3.

    Chitu Okoli, & Suzanne D Pawlowski. (2004). The Delphi method as a research tool: an example, design considerations and applications. Information & Management, 42(1), 15-29.

    Chaudhary, S., & Kishore, R. (2010). Determinants and impacts of governance forms on outsourcing performance: evidence from a case study. Journal of Information Technology Case and Application Research, 12(1), 39-56.

    Couger, J. D. (1988a) Key human resource issues in IS in the 1990s. Proceedings of the Hawaii International Conference on Systems Sciences, 162-170.

    Couger, J. D. (1988b) Key human resources issues in IS in the 1990s: Views of IS executives versus human resource executives. Information and Management, 14(4), 161-174.

    Coronel, C., Morris, S., Rob, P. (2010). Database systems: design, implementation, and management, 9th Edition. US: South-Western.

    Deen, S. M.. (2005). An engineering approach to cooperating agents for distributed information systems. Journal of Intelligent Information Systems, 25(1), 5-45.

    Duffield, C. (1988). The Delphi technique. The Australiam Journal of Advanced Nursing, 2(2), 41-45.

    Geringer, J. Michael (1988). Partner selection criteria for developed country joint ventures. Business Quarterly, London, vol. 53, 55-63.

    Grisham, T. (2009). The Delphi technique: a method for testing complex and multifaceted topics. International Journal of Managing Projects in Business, 2(1), 112-130.

    Motahari-Nezhad, H. R., Stephenson, B., Singhal, S. (February, 2009). Outsourcing business to cloud computing services: opportunities and challenges. IEEE Internet Computing, 10(4), 1-17.

    Hintzbergen, J.; Hintzbergen, K.; Baars, H.; Smulders, A. (2010). Foundations of Information Security Based on ISO27001 and ISO27002. US: Van Haren Publishing.

    Ilbery, B., Maye, D., Kneafsey, M., Jenkins, T. and Walkley, C. (2004). Forecasting food supply chain developments in lagging rural regions: evidencefrom the UK. Journal of Rural Studies, Vol. 20, 331-344.

    O’Brien, J., Marakas, G. (2010). Management Information Systems, 10th. US:McGraw-Hill Companies.

    Johnson, A. (2009). Business and security executives views of information security investment drivers: results from a Delphi study. Journal of Information Privacy & Security, 5(1), 3-27.

    Katzan, H. (2010). On an ontological view of cloud computing. Journal of Service Science, 3(1), 1-6.

    Katzan, H.. (2010). On the privacy of cloud computing. International Journal of Management and Information Systems, 14(2), 1-12.

    Kralovetz, R. G. (1996, Oct). A guide to successful outsourcing. Management Accounting, 32-38.

    Kendall, M. G., & Gibbons, J. D. (1990). Rank correlation methods. London: Edward Arnold.

    Kobielus (1996). Evaluation Time. Network World, vol.11, pp48.

    Laudon & Laudon (2008). Management Information Systems, 11/e. US: PEARSON.

    Lundquist, C.; Frieder, O.; Holmes, D. O.; & Grossman, D. (1999). A parallel relational database management system approach to relevance feedback in information retrieval. Journal of the American Society for Information Science, 50(5), 413-426.

    Ma, Q., Schmidt, M., & Pearson, J.. (2009). An integrated framework for information security management. Review of Business, 30(1), 58-69.

    Armbrust, M., Fox, A., Griffith, R., Joseph, A. D., Katz, R. H., Konwinski, A., Lee, G., Patterson, D. A., Rabkin, A., Stoica, I.& Zaharia, M. (2010). A View of Cloud Computing. Communications of the ACM, 53(4).

    Murry J. W. & Hommons, J. O. (1995). Delphi: A versatile methodology for conducting qualitative research. The Review of Higher Education, 18(4), 423-436.

    Niederman, F., Brancheau, J. C., & Wetherbe, J. C.. (1991). Information systems management issues for the 1990s. MIS Quarterly, 15(4), 474.

    Bobroff, N., & Mummert,L. (2005). Design and implementation of a resource manager in a distributed database system. Journal of Network and Systems Management, 13(2), 151-174.

    Drucker P. F. (1994). Post-capitalism Society. US: Harper Paperbacks.

    Quinn, J. B. & Hilmer, F. G. (1994). Strategic outsourcing. Sloan Management Review, 43-45.

    Buyya, R.; Chee Shin Yeo; Venugopal, S. (2008). Market-oriented cloud computing: vision, hype, and reality for delivering IT services as computing utilities. 10th IEEE International Conference, 5-13.

    Rappa, M. A.(2004). The utility business model and the future of computing services. IBM Systems Journal, 43(1), 32-42.

    King, R. P. & Halim, N. (1991). Management of a remote backup copy for disaster recovery. ACM Transaction on Database Systems, 16(2), 338-368.

    Rick L. Click & Thomas N. Duening (2004). Business Process Outsourcing – the Competitive Advantage. US: John Wiley & Sons.

    Schmidt, R. C. (1997). Managing Delphi surveys using nonparametric statistical techniques. Decision Sciences, 28(3), 763-774.

    Satty, T. L. (1980). The Analytic Hierarchy Process. New York: McGraw-Hill.

    Satty, T. L. (1990). How to make a decision:The analytic hierarchy process, European Journal of Operational Research, 48(1), 9-26.
    Tang, C., Lin, M., Huang, E. (2010). The intention of selecting agile System development methodology among new Generation of software developer. 20th International Conference on Pacific Rim Management, ACME.

    Thain, D., Tannenbaum, T., & Livny, M. (2005). Distributed computing in practice: The condor experience. Concurrency and Computation: Practice and Experience, 17(2‐4), 323-356.

    Truong, D.. (2010). How cloud computing enhances competitive advantages: A research model for small businesses. The Business Review, Cambridge, 15(1), 59-65.

    Vaidya, O. S.,& Kumar, S. (2006). Analytic hierarchy process: An overview of applications. European Journal of Operational Research, 169(1), 1-29.

    Darlagiannis V.,& Mauthe, A., & Steinmetz, R. (2004). Overlay Design Mechanisms for Heterogeneous, Large-Scale, Dynamic P2P Systems. Journal of Network and Systems Management, 12(3), 371-396.

    Young, R. (2009). Growth Perspective of Information Security. Journal of Information Privacy & Security, 5(4), 51-67.

    Defining SaaS, PaaS, IaaS, etc. Retrieved from http://cloudfeed.net/2008/06/03/defining-saas-paas-iaas-etc/

    Cluster (computing). Retrieved from http://en.wikipedia.org/wiki/Cluster_(computing)

    Grid computing. Retrieved from http://en.wikipedia.org/wiki/Grid_computing

    Langley, K. (2008, April 24). Cloud Computing: Get Your Head in the Clouds Retrieved from http://www.productionscale.com/home/2008/4/24/cloud-computing-get-your-head-in-the-clouds.html


    Distributed computing. Retrieved from http://en.wikipedia.org/wiki/Distributed_computing

    IBM.com. Retrieved from http://www.ibm.com/ibm/cloud/

    Salesforce.com. Retrieved from: http://www.salesforce.com/cloudcomputing

    Supercomputer. Retrieved from http://en.wikipedia.org/wiki/Supercomputer

    Utility computing. Retrieved from http://en.wikipedia.org/wiki/Utility_computing

    Wikipedia: Cloud computing. Retrieved from http://en.wikipedia.org/wiki/Cloud_computing

    Whatis.com. Retrieved from http://searchcloudcomputing.techtarget.com/sDefinition/0,,sid201_gci1287881,00.html

    Angwin, J. & Valentino-Devries, J. (2011, April 22). Apple, Google Collect User Data. Retrieved from http://online.wsj.com/article/SB10001424052748703983704576277101723453610.html
    Description: 碩士
    國立政治大學
    資訊管理研究所
    98356013
    99
    Source URI: http://thesis.lib.nccu.edu.tw/record/#G0983560131
    Data Type: thesis
    Appears in Collections:[資訊管理學系] 學位論文

    Files in This Item:

    File Description SizeFormat
    013101.pdf1810KbAdobe PDF2768View/Open
    013102.pdf1810KbAdobe PDF2952View/Open


    All items in 政大典藏 are protected by copyright, with all rights reserved.


    社群 sharing

    著作權政策宣告 Copyright Announcement
    1.本網站之數位內容為國立政治大學所收錄之機構典藏,無償提供學術研究與公眾教育等公益性使用,惟仍請適度,合理使用本網站之內容,以尊重著作權人之權益。商業上之利用,則請先取得著作權人之授權。
    The digital content of this website is part of National Chengchi University Institutional Repository. It provides free access to academic research and public education for non-commercial use. Please utilize it in a proper and reasonable manner and respect the rights of copyright owners. For commercial use, please obtain authorization from the copyright owner in advance.

    2.本網站之製作,已盡力防止侵害著作權人之權益,如仍發現本網站之數位內容有侵害著作權人權益情事者,請權利人通知本網站維護人員(nccur@nccu.edu.tw),維護人員將立即採取移除該數位著作等補救措施。
    NCCU Institutional Repository is made to protect the interests of copyright owners. If you believe that any material on the website infringes copyright, please contact our staff(nccur@nccu.edu.tw). We will remove the work from the repository and investigate your claim.
    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback