政大機構典藏-National Chengchi University Institutional Repository(NCCUR):Item 140.119/35275
English  |  正體中文  |  简体中文  |  Post-Print筆數 : 27 |  全文筆數/總筆數 : 110944/141864 (78%)
造訪人次 : 48060489      線上人數 : 1033
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
搜尋範圍 查詢小技巧:
  • 您可在西文檢索詞彙前後加上"雙引號",以獲取較精準的檢索結果
  • 若欲以作者姓名搜尋,建議至進階搜尋限定作者欄位,可獲得較完整資料
  • 進階搜尋
    政大機構典藏 > 商學院 > 資訊管理學系 > 學位論文 >  Item 140.119/35275
    請使用永久網址來引用或連結此文件: https://nccur.lib.nccu.edu.tw/handle/140.119/35275


    題名: 無線點對點合理資訊交易模型達成破壞性行銷之研究
    作者: 謝儒鋒
    Hsieh,Ju Feng
    貢獻者: 苑守慈
    Yuan,Soe Tsyr
    謝儒鋒
    Hsieh,Ju Feng
    關鍵詞: 無線點對點
    資訊交易模型
    破壞性行銷
    人際需求理論
    社會交換理論
    社會學習理論
    多元迴歸模型
    WP2P
    Bartering
    Disruptive marketing
    FIRO Theory of Needs
    Social Exchange Theory
    Social Learning Theory
    Multiple Regression Model
    日期: 2004
    上傳時間: 2009-09-18 14:36:48 (UTC+8)
    摘要: 在可預見之未來無線點對點的世界裡,資訊交易就如同現實世界人與人間的交易模式,需考量到交易資訊的成本、價值與人際關係衡量之因素;傳統廣告行銷的效率問題也待創新的資訊交易平台來解決。本研究提出的資訊交易模型,以人性考量為基礎,在各種不同情境下,動態衡量資訊成本、價值與使用者間關係,透過助理軟體,協助加入資訊交易平台之個體,以更便利方式進行資訊交易,預期讓交易結果更貼近使用者的需求;而企業方面也能透過點與點之間快速傳遞資訊的特性,預期以更低成本、更高效率,完成商務行銷目的,達到破壞性行銷之目標。
    This paper presents a novel ambient e-service aiming at distributed marketing through sensible bartering in foreseeable wireless Peer-to-Peer (WP2P) environments. A variety of influential factors (e.g., cost, value, relationship) are proposed and formalized for empowering the bartering mechanism, unfolding a rich arena of ambient distributed trading and a disruptive paradigm of e-marketing.
    參考文獻: [1] 林政財 (2001), 心理學歷年試題解析, 台北市:千華。
    [2] 楊舜仁(2001), 遠擎eBusiness電子化企業經理人報告, p. 83, from http://www.asia-learning.com/sooner/.
    [3] Rajkumar Buyya, Heinz Stockinger, Jonathan Giddy, David Abramson (2001), Economic Models for Management of Resources in Peer-to-Peer and Grid Computing, Proc. SPIE Int`l Conf. Commercial Applications for High-Performance Computing, SPIE, Bellingham, Wash.
    [4] Rajkumar Buyya, Heinz Stockinger, Jonathan Giddy, David Abramson (May 2002), Economic Models for Resource Management and Scheduling in Grid Computing, Special Issue on Grid Computing Environments, The Journal of Concurrency and Computation: Practice and Experience, Wiley Press, USA.
    [5] B. Gaddy Ickes (May 1998 [Draft]), A Simple Four-Sector Model of Russia’s “Virtual” Economy, (http://econ.la.psu.edu/~bickes/ickres.htm).
    [6] Brent Chun, Yun Fu, and Amin Vahdat. (June 2003), Bootstrapping a Distributed Computational Economy with Peer-to-Peer Bartering. In Proceedings of 1st Workshop on Economics of Peer-to-Peer Systems.
    [7] Harshad Narvenkar, Rajeev Kumar, Rajesh Tank, Sheela Ernale (August 2001), Peer-to-Peer Technology: An Overview of Technology and Opportunities.
    [8] David Liben-Nowell, Hari Balakrishnan, and David Karger. (2002), Analysis of the Evolution of Peer-to-Peer Systems. In PODC.
    [9] X. Yang and G. de Veciana (Mar. 2004), Service Capacity of Peer to Peer Networks, in Proc. of INFOCOM 2004, Hong Kong.
    [10] R. Smith and R. Davis (Dec. 1980), The Contract Net Protocol: High Level Communication and Control in a Distributed Problem Solver, IEEE Transactions on Computers, Vol. C-29, No. 12.
    [11] R. Axelrod. (1984), The Evolution of Cooperation, Basic Books.
    [12] Clayton M. Christensen (1997), The Innovator`s Dilemma: When New Technologies Cause Great Firms to Fail, Boston, Massachusetts: Harvard Business School Press.
    [13] V. Haarslev and R. Moller. (2004), Optimization techniques for retrieving resources described in OWL/RDF documents: First results. In Proceedings of the Ninth International Conference on the Principles of Knowledge Representation and Reasoning.
    [14] Clayton M. Christensen and Michael E. Raynor (2003), The Innovator`s Solution: Creating and Sustaining Successful Growth, New York: McGraw Hill Publishing Company.
    [15] H. Hall (2001), Social exchange for knowledge exchange. Paper presented at Managing knowledge: conversations and critiques, University of Leicester Management Centre, 10-11 April 2001.
    [16] Neal Patwari, Robert J. O`Dea, Yanwei Wang (2001), Relative Location in Wireless Networks, in Proc. IEEE Veh Tech Conf. (VTC), (Rhodes, Greece), pp. 1149-1153.
    [17] William Schutz (1966), The Interpersonal Underworld, Palo Alto: Science and Behavior Books, p. 18.
    [18] Harold H. Kelley and John W. Thibaut (1978), Interpersonal Relationships, New York: John Wiley & Sons.
    [19] Albert Bandura (1977), Social Learning Theory, Englewood Cliffs NJ: Prentice-Hall, p. 27.
    [20] Peter Haddawy and Christine Cheng (2003), Balanced Matching of Buyers and Sellers in E-Marketplaces: The Barter Trade Exchange Model, in Asian Institute of Technology, AIT-CSIM-TR-26-12-03.
    [21] Andrea Hemetsberger (2002), Fostering cooperation on the Internet: social exchange processes in innovative virtual consumer communities, Broniarczyk, S. M. and K. Nakamoto (eds.), Vol.29, 354-356.
    [22] JXTA Project, http://www.jxta.org
    [23] James L. Morrison and Ian Wilson (1996), Strategic Management in the Context of Global Change, In Didsbury, Howard (Ed.). Future Vision, Ideas, Insights, and Strategies. Bethesda, MD: The World Future Society.
    [24] James L. Morrison and Ian Wilson (1997), Analyzing Environments and Developing Scenarios for Uncertain Times, In M. W. Peterson, D. D. Dill, L. A. Mets, and Associates (eds.), Planning and Management for a Changing Environment. San Francisco: Jossey-Bass. [Although focusing on higher education, this chapter provides a good overview of the basics of this workshop and provides another example of using the SRI scenario method for decision-making.]
    [25] James L. Morrison, A. Sargison and D. Francis (1997), Using the Futures Program As A Tool for Transformation: A Case Study of Lincoln University , New Zealand , In Donald M. Norris and James L. Morrison, Mobilizing for Transformation: How Campuses Are Preparing for the Knowledge Age. New Directions in Institutional Research Number 94 (19-30). San Francisco : Jossey-Bass Publishers. [Although focusing on a university planning project, the section titled "Scenario-Based Planning" provides another example of using the SRI scenario methodology.]
    [26] R. Bhagwan, S. Savage, and G. M. Voelker (February 2003), Understanding availability. In International Workshop on Peer to Peer Systems, Berkeley, CA, USA.
    [27] J. Liang, R. Kumar, Y. Xi, and K. Ross (March 2005), Pollution in P2P file sharing systems, In IEEE Infocom, Miami, FL, USA.
    [28] R. Sherwood, R. Braud, and B. Bhattacharjee (March 2004), Slurpie: A cooperative bulk data transfer protocol, In IEEE Infocom, Honk Kong, China.
    [29] D. Qiu and R. Srikant (August 2004), Modeling and performance analysis of bit torrent-like peer-to-peer networks, In ACM SIGCOMM, Portland, OR, USA.
    [30] B. Cohen (May 2003), Incentives Build Robustness in BitTorrent, In Workshop on Economics of Peer-to-Peer Systems, Berkeley, USA, (http://bittorrent.com/).
    [31] M. Castro, P. Druschel, A.-M. Kermarrec, A. Nandi, A. Rowstron, and A. Singh (Feb 2003), Splitstream: High-bandwidth content distribution in cooperative environments, In Proceedings of IPTPS03, Berkeley, USA.
    [32] P. Maymounkoy and D. Mazieres (Mar 2002), Kademlia: A peer-to-peer information system based on the xormetric, In Proceedings of IPTPS02, Cambridge, USA.
    描述: 碩士
    國立政治大學
    資訊管理研究所
    92356023
    93
    資料來源: http://thesis.lib.nccu.edu.tw/record/#G0923560231
    資料類型: thesis
    顯示於類別:[資訊管理學系] 學位論文

    文件中的檔案:

    檔案 描述 大小格式瀏覽次數
    56023101.pdf221KbAdobe PDF2733檢視/開啟
    56023102.pdf223KbAdobe PDF2784檢視/開啟
    56023103.pdf222KbAdobe PDF2821檢視/開啟
    56023104.pdf41KbAdobe PDF2624檢視/開啟
    56023105.pdf233KbAdobe PDF2718檢視/開啟
    56023106.pdf304KbAdobe PDF2908檢視/開啟
    56023107.pdf476KbAdobe PDF21141檢視/開啟
    56023108.pdf572KbAdobe PDF21067檢視/開啟
    56023109.pdf513KbAdobe PDF2873檢視/開啟
    56023110.pdf676KbAdobe PDF21251檢視/開啟
    56023111.pdf246KbAdobe PDF21142檢視/開啟
    56023112.pdf231KbAdobe PDF21606檢視/開啟


    在政大典藏中所有的資料項目都受到原著作權保護.


    社群 sharing

    著作權政策宣告 Copyright Announcement
    1.本網站之數位內容為國立政治大學所收錄之機構典藏,無償提供學術研究與公眾教育等公益性使用,惟仍請適度,合理使用本網站之內容,以尊重著作權人之權益。商業上之利用,則請先取得著作權人之授權。
    The digital content of this website is part of National Chengchi University Institutional Repository. It provides free access to academic research and public education for non-commercial use. Please utilize it in a proper and reasonable manner and respect the rights of copyright owners. For commercial use, please obtain authorization from the copyright owner in advance.

    2.本網站之製作,已盡力防止侵害著作權人之權益,如仍發現本網站之數位內容有侵害著作權人權益情事者,請權利人通知本網站維護人員(nccur@nccu.edu.tw),維護人員將立即採取移除該數位著作等補救措施。
    NCCU Institutional Repository is made to protect the interests of copyright owners. If you believe that any material on the website infringes copyright, please contact our staff(nccur@nccu.edu.tw). We will remove the work from the repository and investigate your claim.
    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - 回饋