English  |  正體中文  |  简体中文  |  Post-Print筆數 : 27 |  Items with full text/Total items : 110182/141115 (78%)
Visitors : 46750754      Online Users : 1099
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version
    政大機構典藏 > 商學院 > 資訊管理學系 > 學位論文 >  Item 140.119/63653
    Please use this identifier to cite or link to this item: https://nccur.lib.nccu.edu.tw/handle/140.119/63653


    Title: 評估產業之雲端準備度
    Assessing Cloud Readiness in Enterprises
    Authors: 車育賢
    Contributors: 張欣綠
    Chang, Hsin Lu
    車育賢
    Keywords: 雲端運算
    雲端準備度
    私有雲
    公有雲
    Cloud computing
    Cloud readiness
    Private cloud
    Public cloud
    Date: 2013
    Issue Date: 2014-02-10 14:48:40 (UTC+8)
    Abstract: 近年來雲端運算逐漸盛行且其已被許多企業採用,雲端運算所帶來的好處包含提供更好的連結、企業不同廠的無間隙合作,進而提高生產效率。透過現存論文的研究,我們發現企業導入雲端運算與使其和企業內企業流程成功結合為兩大企業成功的因素。然而,要如何導入與對雲端運算加以控制卻很少在現存論文中談及,更遑論企業在導入雲端前該做哪些準備等議題。本研究也透過文獻的探討提出兩個研究面向(管理面與科技面),文獻探討也發現,此兩面向為企業選擇導入公有雲或是私有雲的主因。再者,本研究提出兩個討論面向的同時,也與現存的雲端服務供應商討論此兩面向,希望能讓兩面向更加符合現存雲端狀況。根據這兩面向的基礎,本研究在此兩大面向下提出許多因素來探討企業導入雲端的準備度。本研究也進一步透過問卷的方式訪問現存有採用或是導入雲端的企業,問卷內容涵蓋上述提到的兩面向,進而透過所收集的資料之分析來探討真正影響雲端導入成功與否的因素是否與研究所提出的假設符合。研究結果發現,虛擬化與IT建設的有無與完善程度對於私有雲的導入成功與否有正向關係。而研究結果也指出,公有雲與私有雲兩種型態的雲端也有相互的關係。
    Cloud computing has been dedicated to providing several benefits, such as better connectivity and seemingly seamless cooperation between different plants, that improve firm performance. Previous research maintains that introducing cloud computing and combining it with companies’ processes are two of the prime factors that lead companies to success; however, the manner of implementing this technology and exerting control over it are rarely discussed, especially with regard to the preparation before a company’s official launch of cloud computing. A literature review enables us to propose two dimensions—technological and managerial concerns—of factors driving companies to introduce cloud computing through both private and public clouds. Moreover, after proposing the two dimensions, we examine them by conducting interviews with several companies in the hopes of making these dimensions more applicable and pragmatic in business. Because the purpose of this research is to prepare companies to implement cloud computing, we design a questionnaire based on the dimensions and undertake a survey with several companies that have implemented cloud computing to determine the underlying factors influencing the performance of cloud computing. The results of this research show that both of the virtualization and IT infrastructure readiness factors have positive impacts on private clouds, and the results also indicate a relationship between public and private clouds, which means companies that have adopted public clouds are more likely to succeed in adopting private clouds.
    Reference: An, B., Lesser, V., Irwin, D., & Zink, M. (2010, May). Automated negotiation with decommitment for dynamic resource allocation in cloud computing. In Proceedings of the 9th International Conference on Autonomous Agents and Multiagent Systems (pp. 981-988). ACM Digital Library. Retrieved from http://dl.acm.org/citation.cfm?id=1838338

    Babcock, C. (2009, April 13). Why ’Private Cloud’ Computing Is Real – And Worth Considering. InformationWeek. Retrieved from http://www.informationweek.com/

    Bagozzi, R. P., Yi, Y., & Phillips, L. W. (1991). Assessing construct validity in organizational research. Administrative science quarterly, 421-458.

    Bhardwaj, S., Jain, L., & Jain, S. (2010). Cloud computing: A study of infrastructure as a service (IAAS). International Journal of engineering and information Technology, 2(1), 60-63.

    Bhardwaj, S., Jain, L., & Jain, S. (2010). Cloud Computing: Understanding and Investigating Platform as a Service (PaaS). International Journal of Engineering, 3(3), 145-452.

    Buyya, R., Ranjan, R., & Calheiros, R. (2010, May). Intercloud: Utility-oriented federation of cloud computing environments for scaling of application services. Paper presented at the International Conference on Algorithms and Architectures, Busan, Korea. Abstract retrieved from http://link.springer.com/chapter/10.1007%2F978-3-642-13119-6_2?LI=true

    Buyya, R., Yeo, C. S., Venugopal, S., Broberg, J., & Brandic, I. (2009). Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility. Future Generation computer systems, 25(6), 599-616.

    Chang, V., Wills, G., & De Roure, D. (2010). Cloud business models and sustainability: impacts for businesses and e-research. Software Sustainability Workshop. Retrieved from http://eprints.soton.ac.uk/271054/37/VC_Cloud_Business_Models_accepted_AHM2010.pdf
    Charter, R. A. (1999). Sample size requirements for precise estimates of reliability, generalizability, and validity coefficients. Journal of Clinical and Experimental Neuropsychology, 21(4), 559-566.

    Chow, R., Golle, P., Jakobsson, M., Shi, E., Staddon, J., Masuoka, R., & Molina, J. (2009). Controlling data in the cloud: outsourcing computation without outsourcing control. In Proceedings of the 2009 ACM workshop on Cloud computing security, pp. 85-90.

    Clemons, E. K., & Chen, Y. (2011, January). Making the Decision to Contract for Cloud Services: Managing the Risk of an Extreme Form of IT Outsourcing. Internet Computing, IEEE. Advance online publication. doi: 10.1109/HICSS.2011.292

    Dargha, R. (2011). Cloud Computing: Key Considerations for Adoption. Infosys. Retrieved from http://www.infosys.com/cloud/resource-center/documents/cloud-computing.pdf

    Das, S., Agarwal, S., Agrawal, D., Abbadi, A. E. (2010). An Elastic, Scalable, and Self Managing Transactional Database for the Cloud (UCSB Computer Science Technical Report). Retrieved from University of California, Department of Computer Science: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.163.9402

    Dikaiakos, M. D., Katsaros, D., Mehra, P., Pallis, G., & Vakali, A. (2009). Cloud computing: Distributed Internet computing for IT and scientific research. Internet Computing, IEEE, 13(5), 10-13.

    Dillon, T., Wu, C., & Chang, E. (2010, April). Cloud computing: Issues and challenges. Internet Computing, IEEE. Advance online publication. doi: 10.1109/AINA.2010.187

    Doelitzscher, F., Sulistio, A., Reich, C., Kuijs, H., & Wolf, D. (2011). Private cloud for collaboration and e-Learning services: from IaaS to SaaS. Computing, 91(1), 23-42.

    Emerson Network Power (2010). Taking the Enterprise Data Center into the Cloud [White paper]. Retrieved from http://www.emersonnetworkpower.com/en-US/Brands/Liebert/Documents/White%20Papers/scalable-data-center_24567-R11-10.pdf

    Ercan, T. (2010). Effective use of cloud computing in educational institutions. Procedia - Social and Behavioral Sciences, 2(2), 938-942.

    Géczy, P., Izumi, N., & Hasida, K. (2012). Cloudsourcing: Managing Cloud Adoption. Global Journal of Business Research, 6(2), 57-70.

    Goodburn, M. A., & Hill, S. (2010). The cloud transforms business. Financial Executive, 26(10), 35-39.

    Grobauer, B., Walloschek, T., & Stocker, E. (2011). Understanding cloud computing vulnerabilities. Security & Privacy, IEEE, 9(2), 50-57.

    Grover, V., & Teng, J. T. (1993). The Decision to Outsource Information-Systems Functions. Journal of Systems Management, 44(11), 34-38.

    Gurav, U., & Shaikh, R. (2010, February). Virtualization: a key feature of cloud computing. In Proceedings of the International Conference and Workshop on Emerging Trends in Technology (pp. 227-229). ACM Digital Library. Retrieved from http://dl.acm.org/citation.cfm?id=1741957

    Harris, W. (2011, April). Cloud Computing-Based IT Solutions for Organizations With Multiregional Branch Offices. Paper presented at the 2nd International Conference on Information Managemant and Evaluation: ICIME2011, Toronto, Canada. Abstract retrieved from http://www.academic-conferences.org/pdfs/ICIME11-Booklet.pdf

    Hayes, B. (2008). Cloud computing. Communications of the ACM, 52(7), 9-11.

    Heiser, J., & Nicolett, M. (2008). Assessing the security risks of cloud computing (G00157782). Retrieved from http://www.gartner.com/DisplayDocument?id=685308

    Hunter, P. (2009). Cloud aloud. Engineering & Technology, 4(16), 54-56.

    IBM Corporation. (2009). Fact sheet: IBM Strategy and Change Services for Cloud Adoption [Fact sheet]. Retrieved from http://www-03.ibm.com/press/us/en/attachment/28557.wss?fileId=ATTACH_FILE5&fileName=Fact%20sheet%20-%20IBM%20Strategy%20and%20Change%20Services%20for%20Cloud%20Adoption.pdf

    IBM Corporation. (2010). Defining a framework for cloud adoption [White paper]. Retrieved from ftp://public.dhe.ibm.com/common/ssi/ecm/en/ciw03067usen/CIW03067USEN.PDF

    Ibrahim, A. S., Hamlyn-harris, J. H., & Grundy, J. (2010, November). Emerging security challenges of cloud virtual infrastructure. Paper presented at the Asia Pacific Software Engineering Conference 2010 Cloud Workshop, Sydney, Australia. Abstract retrieved from http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.185.603

    Jiang, J. J., Muhanna, W. A., & Klein, G. (2000). User resistance and strategies for promoting acceptance across system types. Information & Management, 37(1), 25-36.

    Kandukuri, B. R., Paturi, V. R., & Rakshit, A. (2009, September). Cloud security issues. Internet Computing, IEEE. Advance online publication. doi: 10.1109/SCC.2009.84

    Kim, W., Kim, S. D., Lee, E., & Lee, S. (2009, December). Adoption issues for cloud computing. In Proceedings of the 11th International Conference on Information Integration and Web-based Applications & Services (pp. 3-6). ACM Digital Library. Retrieved from http://dl.acm.org/citation.cfm?id=1806341

    Knorr, E., & Gruman, G. (2008). What cloud computing really means. Infoworld. Retrieved from http://moodle-rsc.ukc.ac.uk/login/index.php

    Krautheim, F. J. (2009, June). Private virtual infrastructure for cloud computing. In Proceedings of the 2009 Conference on Hot Topics in Cloud Computing (pp. 5). USENIX Association. Retrieved from https://www.usenix.org/conference/hotcloud-09/private-virtual-infrastructure-cloud-computing

    Lai, V. S., & Mahapatra, R. K. (1997). Exploring the research in information technology implementation. Information & Management, 32(4), 187-201.

    Leavitt, N. (2009). Is cloud computing really ready for prime time. Internet Computing, IEEE, 42(1), 15-20.

    Lenk, A., Klems, M., Nimis, J., Tai, S., & Sandholm, T. (2009, May). What`s inside the Cloud? An architectural map of the Cloud landscape. In Proceedings of the 2009 ICSE Workshop on Software Engineering Challenges of Cloud Computing (pp. 23-31). IEEE Computer Society. Retrieved from http://origin-www.computer.org/csdl/proceedings/icse-cloud/2009/3713/00/05071529.pdf

    Li, Z. J., Chen, C., & Wang, K. (2011). Cloud computing for agent-based urban transportation systems. Intelligent Systems, IEEE, 26(1), 73-79.

    Loebbecke, C., Thomas, B., & Ullrich, T. (2012). Assessing Cloud Readiness at Continental AG. MIS Quarterly, 11(1), 11-20.

    Marston, S., Li, Z., Bandyopadhyay, S., Zhang, J., & Ghalsasi, A. (2011). Cloud computing — The business perspective. Decision Support Systems, 51(1), 176-189.

    McAfee, A. (2011). What every CEO needs to know about the cloud. Harvard Business Review, 89(11), 124-132.

    Mell, P., & Grance, T. (2010). The NIST Definition of Cloud Computing. Communications of the ACM, 53(6), 145.

    Paquette, S., Jaeger, P. T., & Wilson, S. C. (2010). Identifying the security risks associated with governmental use of cloud computing. Government Information Quarterly, 27(3), 245-253.

    Preimesberger, C. (2011). The world from hardware to software and now to cloud-according to DELL. eWEEK. Retrieved From http://www.eweek.com/

    Qureshi, I., & Compeau, D. (2009). Assessing between-group differences in information systems research: a comparison of covariance-and component-based SEM. MIS Quarterly, 33(1), 197-214.


    Raman, T. V. (2008). Cloud computing and equal access for all. In Proceedings of the 2008 international cross-disciplinary conference on Web accessibility, pp. 1-4.

    Reynolds, E., & Bess, C. (2009). Clearing Up the Cloud: Adoption Strategies for Cloud Computing. Cutter IT Journal, 22(6), 14-20.

    Rochwerger, B., Breitgand, D., Levy, E., Galis, A., Nagin, K., Llorente, I. M., Montero, R., Wolfsthal, Y., Elmroth, E., Caceres, J., Ben-Yehuda, M., Emmerich, W., & Galan, F. (2009). The reservoir model and architecture for open federated cloud computing. IBM Journal of Research and Development, 53(4), 4-1.

    Rogers, E. (1983). Diffusion of Innovations. New York, USA: Free Press.

    Royston, J. P. (1983). Some techniques for assessing multivarate normality based on the shapiro-wilk W. Applied Statistics, 121-133.

    Shapiro, S. S., & Wilk, M. B. (1965). An analysis of variance test for normality (complete samples). Biometrika, 52(3), 591-611.

    Simalango, M. F., Kang, M. Y., & Oh, S. (2010). Towards Constraint-based High Performance Cloud System in the Process of Cloud Computing Adoption in an Organization (Doctoral dissertation, Ajou University, South Korea). Retrieved from http://arxiv.org/ftp/arxiv/papers/1010/1010.4952.pdf

    Sotomayor, B., Montero, R. S., Llorente, I. M., & Foster, I. (2009). Virtual infrastructure management in private and hybrid clouds. Internet Computing, IEEE, 13(5), 14-22.

    Subashini, S., & Kavitha, V. (2011). A survey on security issues in service delivery models of cloud computing. Journal of Network and Computer Applications, 34(1), 1-11.

    Sultan, N. (2010). Cloud computing for education: A new dawn?. International Journal of Information Management, 30(2), 109-116.

    Wang, L., Laszewski, G. V., Younge, A., He, X., Kunze, M., Tao, J., & Fu, C. (2010). Cloud computing: a perspective study. New Generation Computing, 28(2), 137-146.

    Weiss, A. (2007). Computing in the clouds. netWorker, 11(4), 16.

    VMware (2011) Global Cloud Computing adoption: transformation Is in the air [White paper]. Retrieved from http://www.vmwaregrid.com/vcloud_service_provider/servedbythenet/assets/Cloud_IDG.pdf

    Zhu, K., Kraemer, K., & Xu, S. (2003). Electronic business adoption by European firms: a cross-country assessment of the facilitators and inhibitors. European Journal of Information Systems, 12(4), 251-268.
    Description: 碩士
    國立政治大學
    資訊管理研究所
    100356027
    102
    Source URI: http://thesis.lib.nccu.edu.tw/record/#G0100356027
    Data Type: thesis
    Appears in Collections:[資訊管理學系] 學位論文

    Files in This Item:

    File SizeFormat
    602701.pdf1228KbAdobe PDF2272View/Open


    All items in 政大典藏 are protected by copyright, with all rights reserved.


    社群 sharing

    著作權政策宣告 Copyright Announcement
    1.本網站之數位內容為國立政治大學所收錄之機構典藏,無償提供學術研究與公眾教育等公益性使用,惟仍請適度,合理使用本網站之內容,以尊重著作權人之權益。商業上之利用,則請先取得著作權人之授權。
    The digital content of this website is part of National Chengchi University Institutional Repository. It provides free access to academic research and public education for non-commercial use. Please utilize it in a proper and reasonable manner and respect the rights of copyright owners. For commercial use, please obtain authorization from the copyright owner in advance.

    2.本網站之製作,已盡力防止侵害著作權人之權益,如仍發現本網站之數位內容有侵害著作權人權益情事者,請權利人通知本網站維護人員(nccur@nccu.edu.tw),維護人員將立即採取移除該數位著作等補救措施。
    NCCU Institutional Repository is made to protect the interests of copyright owners. If you believe that any material on the website infringes copyright, please contact our staff(nccur@nccu.edu.tw). We will remove the work from the repository and investigate your claim.
    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback