English  |  正體中文  |  简体中文  |  Post-Print筆數 : 27 |  Items with full text/Total items : 110934/141854 (78%)
Visitors : 47820059      Online Users : 578
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version
    政大機構典藏 > 商學院 > 資訊管理學系 > 學位論文 >  Item 140.119/35275
    Please use this identifier to cite or link to this item: https://nccur.lib.nccu.edu.tw/handle/140.119/35275


    Title: 無線點對點合理資訊交易模型達成破壞性行銷之研究
    Authors: 謝儒鋒
    Hsieh,Ju Feng
    Contributors: 苑守慈
    Yuan,Soe Tsyr
    謝儒鋒
    Hsieh,Ju Feng
    Keywords: 無線點對點
    資訊交易模型
    破壞性行銷
    人際需求理論
    社會交換理論
    社會學習理論
    多元迴歸模型
    WP2P
    Bartering
    Disruptive marketing
    FIRO Theory of Needs
    Social Exchange Theory
    Social Learning Theory
    Multiple Regression Model
    Date: 2004
    Issue Date: 2009-09-18 14:36:48 (UTC+8)
    Abstract: 在可預見之未來無線點對點的世界裡,資訊交易就如同現實世界人與人間的交易模式,需考量到交易資訊的成本、價值與人際關係衡量之因素;傳統廣告行銷的效率問題也待創新的資訊交易平台來解決。本研究提出的資訊交易模型,以人性考量為基礎,在各種不同情境下,動態衡量資訊成本、價值與使用者間關係,透過助理軟體,協助加入資訊交易平台之個體,以更便利方式進行資訊交易,預期讓交易結果更貼近使用者的需求;而企業方面也能透過點與點之間快速傳遞資訊的特性,預期以更低成本、更高效率,完成商務行銷目的,達到破壞性行銷之目標。
    This paper presents a novel ambient e-service aiming at distributed marketing through sensible bartering in foreseeable wireless Peer-to-Peer (WP2P) environments. A variety of influential factors (e.g., cost, value, relationship) are proposed and formalized for empowering the bartering mechanism, unfolding a rich arena of ambient distributed trading and a disruptive paradigm of e-marketing.
    Reference: [1] 林政財 (2001), 心理學歷年試題解析, 台北市:千華。
    [2] 楊舜仁(2001), 遠擎eBusiness電子化企業經理人報告, p. 83, from http://www.asia-learning.com/sooner/.
    [3] Rajkumar Buyya, Heinz Stockinger, Jonathan Giddy, David Abramson (2001), Economic Models for Management of Resources in Peer-to-Peer and Grid Computing, Proc. SPIE Int`l Conf. Commercial Applications for High-Performance Computing, SPIE, Bellingham, Wash.
    [4] Rajkumar Buyya, Heinz Stockinger, Jonathan Giddy, David Abramson (May 2002), Economic Models for Resource Management and Scheduling in Grid Computing, Special Issue on Grid Computing Environments, The Journal of Concurrency and Computation: Practice and Experience, Wiley Press, USA.
    [5] B. Gaddy Ickes (May 1998 [Draft]), A Simple Four-Sector Model of Russia’s “Virtual” Economy, (http://econ.la.psu.edu/~bickes/ickres.htm).
    [6] Brent Chun, Yun Fu, and Amin Vahdat. (June 2003), Bootstrapping a Distributed Computational Economy with Peer-to-Peer Bartering. In Proceedings of 1st Workshop on Economics of Peer-to-Peer Systems.
    [7] Harshad Narvenkar, Rajeev Kumar, Rajesh Tank, Sheela Ernale (August 2001), Peer-to-Peer Technology: An Overview of Technology and Opportunities.
    [8] David Liben-Nowell, Hari Balakrishnan, and David Karger. (2002), Analysis of the Evolution of Peer-to-Peer Systems. In PODC.
    [9] X. Yang and G. de Veciana (Mar. 2004), Service Capacity of Peer to Peer Networks, in Proc. of INFOCOM 2004, Hong Kong.
    [10] R. Smith and R. Davis (Dec. 1980), The Contract Net Protocol: High Level Communication and Control in a Distributed Problem Solver, IEEE Transactions on Computers, Vol. C-29, No. 12.
    [11] R. Axelrod. (1984), The Evolution of Cooperation, Basic Books.
    [12] Clayton M. Christensen (1997), The Innovator`s Dilemma: When New Technologies Cause Great Firms to Fail, Boston, Massachusetts: Harvard Business School Press.
    [13] V. Haarslev and R. Moller. (2004), Optimization techniques for retrieving resources described in OWL/RDF documents: First results. In Proceedings of the Ninth International Conference on the Principles of Knowledge Representation and Reasoning.
    [14] Clayton M. Christensen and Michael E. Raynor (2003), The Innovator`s Solution: Creating and Sustaining Successful Growth, New York: McGraw Hill Publishing Company.
    [15] H. Hall (2001), Social exchange for knowledge exchange. Paper presented at Managing knowledge: conversations and critiques, University of Leicester Management Centre, 10-11 April 2001.
    [16] Neal Patwari, Robert J. O`Dea, Yanwei Wang (2001), Relative Location in Wireless Networks, in Proc. IEEE Veh Tech Conf. (VTC), (Rhodes, Greece), pp. 1149-1153.
    [17] William Schutz (1966), The Interpersonal Underworld, Palo Alto: Science and Behavior Books, p. 18.
    [18] Harold H. Kelley and John W. Thibaut (1978), Interpersonal Relationships, New York: John Wiley & Sons.
    [19] Albert Bandura (1977), Social Learning Theory, Englewood Cliffs NJ: Prentice-Hall, p. 27.
    [20] Peter Haddawy and Christine Cheng (2003), Balanced Matching of Buyers and Sellers in E-Marketplaces: The Barter Trade Exchange Model, in Asian Institute of Technology, AIT-CSIM-TR-26-12-03.
    [21] Andrea Hemetsberger (2002), Fostering cooperation on the Internet: social exchange processes in innovative virtual consumer communities, Broniarczyk, S. M. and K. Nakamoto (eds.), Vol.29, 354-356.
    [22] JXTA Project, http://www.jxta.org
    [23] James L. Morrison and Ian Wilson (1996), Strategic Management in the Context of Global Change, In Didsbury, Howard (Ed.). Future Vision, Ideas, Insights, and Strategies. Bethesda, MD: The World Future Society.
    [24] James L. Morrison and Ian Wilson (1997), Analyzing Environments and Developing Scenarios for Uncertain Times, In M. W. Peterson, D. D. Dill, L. A. Mets, and Associates (eds.), Planning and Management for a Changing Environment. San Francisco: Jossey-Bass. [Although focusing on higher education, this chapter provides a good overview of the basics of this workshop and provides another example of using the SRI scenario method for decision-making.]
    [25] James L. Morrison, A. Sargison and D. Francis (1997), Using the Futures Program As A Tool for Transformation: A Case Study of Lincoln University , New Zealand , In Donald M. Norris and James L. Morrison, Mobilizing for Transformation: How Campuses Are Preparing for the Knowledge Age. New Directions in Institutional Research Number 94 (19-30). San Francisco : Jossey-Bass Publishers. [Although focusing on a university planning project, the section titled "Scenario-Based Planning" provides another example of using the SRI scenario methodology.]
    [26] R. Bhagwan, S. Savage, and G. M. Voelker (February 2003), Understanding availability. In International Workshop on Peer to Peer Systems, Berkeley, CA, USA.
    [27] J. Liang, R. Kumar, Y. Xi, and K. Ross (March 2005), Pollution in P2P file sharing systems, In IEEE Infocom, Miami, FL, USA.
    [28] R. Sherwood, R. Braud, and B. Bhattacharjee (March 2004), Slurpie: A cooperative bulk data transfer protocol, In IEEE Infocom, Honk Kong, China.
    [29] D. Qiu and R. Srikant (August 2004), Modeling and performance analysis of bit torrent-like peer-to-peer networks, In ACM SIGCOMM, Portland, OR, USA.
    [30] B. Cohen (May 2003), Incentives Build Robustness in BitTorrent, In Workshop on Economics of Peer-to-Peer Systems, Berkeley, USA, (http://bittorrent.com/).
    [31] M. Castro, P. Druschel, A.-M. Kermarrec, A. Nandi, A. Rowstron, and A. Singh (Feb 2003), Splitstream: High-bandwidth content distribution in cooperative environments, In Proceedings of IPTPS03, Berkeley, USA.
    [32] P. Maymounkoy and D. Mazieres (Mar 2002), Kademlia: A peer-to-peer information system based on the xormetric, In Proceedings of IPTPS02, Cambridge, USA.
    Description: 碩士
    國立政治大學
    資訊管理研究所
    92356023
    93
    Source URI: http://thesis.lib.nccu.edu.tw/record/#G0923560231
    Data Type: thesis
    Appears in Collections:[資訊管理學系] 學位論文

    Files in This Item:

    File Description SizeFormat
    56023101.pdf221KbAdobe PDF2733View/Open
    56023102.pdf223KbAdobe PDF2784View/Open
    56023103.pdf222KbAdobe PDF2821View/Open
    56023104.pdf41KbAdobe PDF2624View/Open
    56023105.pdf233KbAdobe PDF2718View/Open
    56023106.pdf304KbAdobe PDF2908View/Open
    56023107.pdf476KbAdobe PDF21141View/Open
    56023108.pdf572KbAdobe PDF21067View/Open
    56023109.pdf513KbAdobe PDF2873View/Open
    56023110.pdf676KbAdobe PDF21251View/Open
    56023111.pdf246KbAdobe PDF21142View/Open
    56023112.pdf231KbAdobe PDF21606View/Open


    All items in 政大典藏 are protected by copyright, with all rights reserved.


    社群 sharing

    著作權政策宣告 Copyright Announcement
    1.本網站之數位內容為國立政治大學所收錄之機構典藏,無償提供學術研究與公眾教育等公益性使用,惟仍請適度,合理使用本網站之內容,以尊重著作權人之權益。商業上之利用,則請先取得著作權人之授權。
    The digital content of this website is part of National Chengchi University Institutional Repository. It provides free access to academic research and public education for non-commercial use. Please utilize it in a proper and reasonable manner and respect the rights of copyright owners. For commercial use, please obtain authorization from the copyright owner in advance.

    2.本網站之製作,已盡力防止侵害著作權人之權益,如仍發現本網站之數位內容有侵害著作權人權益情事者,請權利人通知本網站維護人員(nccur@nccu.edu.tw),維護人員將立即採取移除該數位著作等補救措施。
    NCCU Institutional Repository is made to protect the interests of copyright owners. If you believe that any material on the website infringes copyright, please contact our staff(nccur@nccu.edu.tw). We will remove the work from the repository and investigate your claim.
    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback