English  |  正體中文  |  简体中文  |  Post-Print筆數 : 27 |  Items with full text/Total items : 113451/144438 (79%)
Visitors : 51296022      Online Users : 250
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version
    政大機構典藏 > 商學院 > 企業管理學系 > 學位論文 >  Item 140.119/59778
    Please use this identifier to cite or link to this item: https://nccur.lib.nccu.edu.tw/handle/140.119/59778


    Title: 以雲端運算為基礎的成功創新經營模式之策略
    The strategy of successful and innovational business model on cloud computing
    Authors: 王瑞豪
    Wang, Jui Hao
    Contributors: 郭更生
    Kuo, Geng Sheng
    王瑞豪
    Wang, Jui Hao
    Keywords: 雲端運算
    創新經營模式
    策略
    Date: 2010
    Issue Date: 2013-09-03 14:39:47 (UTC+8)
    Abstract: 2008年金融海嘯後,企業對資訊科技的投資開始下降,造成資訊技術以及資訊服務市場成長的趨緩,但同時卻為雲端運算服務市場創造了良好的商機,預估到2012年為止雲端運算服務市場每年的平均成長率可達37%,遠高於資訊服務市場5%的成長率。
    本研究希望了解以雲端運算為基礎的成功創新經營模式之策略,探討雲端服務大廠IBM、Amazon.com、Google、以及Salesforce.com,歸納整理這些企業運用雲端運算產生成功創新經營模式的策略,了解在雲端運算出現後,這些企業如何清楚定位自己在產業中的角色。本研究進一步比較這四家企業運用雲端運算的策略,整理出這些策略的共同點為:
    一、 運用雲端運算發展企業的核心價值並進行服務創造:
    運用雲端運算的特性讓企業提供更即時、功能範圍更廣的服務,同時透過租用、訂閱的模式降低了服務的使用成本,擴大了使用服務的客戶群,並且從傳統單一方向的服務提供方式轉變為服務與服務之間、服務與使用者之間、以及使用者與使用者間產生連結,透過服務社群網路的不斷互動及服務的擴散產生差異化的經營模式,進一步形成專業的服務社群強化企業的核心服務價值。
    二、 運用雲端運算整合價值鏈中的資訊並提供資訊仲介服務:
    企業運用雲端運算的特性以及在產業中的經驗能有效的獲得價值鏈中上下游廠商的資訊與了解尚未滿足的需求,同時整合不同平台、軟硬體設備、以及商業流程,發展出資訊仲介角色的經營模式,有效整合價值鏈中的資訊並依照需求提供給合作廠商,幫助上下游廠商專注於其核心作業,並透過雲端運算主動地提供給顧客更方便、更靈活的服務,同時加強與價值鏈中上下游廠商的連結以及上下游廠商對資訊仲介者的依賴程度。
    Reference: 中文文獻:
    1. John Hagel III, Marc Singer(2002)。網路價值:逆向市場上的資訊仲介者(湯宗勳,丁麗萍譯)台北:臉譜。(原著出版年:1999年)
    2. Michael E. Porter(2010)。競爭策略:產業環境及競爭者分析,第三版(周旭華譯)。台北:天下遠見。(原著出版年:1980年)
    3. Michael E. Porter(1996)。策略是什麼? (高登第、李明軒譯)。哈佛商業評論全球繁體中文版,特刊2010春季號。(原著出版年:1996年)
    4. Yin, R. K.(2001)。個案研究法(尚榮安譯)。台北:弘智文化。(原著出版年:1994年)
    5. 陳瀅(2010)。雲端策略:雲端運算與虛擬化技術,第一版,台北:天下雜誌。
    6. 湯明哲(2003)。策略經濟基礎篇,第一版,台北:天下遠見。
    7. 創新應用服務研究所(2009)。次世代科技服務趨勢。台北:財團法人資訊工業策進會。
    英文文獻:
    1. Andrews, Kenneth (1971), The Concept of Corporate Strategy, Irwin: Homewood, Ill.
    2. Armbrust, M., et al. (2009) Above the Clouds: a Berkeley view of cloud computing. Tech. Rep. UCb/EECs-2009-28, EECs department, U.C. Berkeley.
    3. Bass, Frank M. (1969), “A New Product Growth Model for Consumer Durables,” Management Science, 15 (5), 215–27.
    4. Baumol, W. J and Oates. W E (1993) The Theory of Environmental Policy.
    NY: Cambridge University Press.
    5. Bechtolsheim(2008), A. Cloud Computing and Cloud Networking. A talk at UC Berkeley.
    6. Brown, R. (1992), Managing the "S" Curve of innovation, The Journal of Consumer Marketing, 9(1), 61-72.
    7. Burt, Ron S. (2005), Closure, Trust, and Reputation, in Brokerage and Closure. Oxford: Oxford University Press, 93–166.
    8. Chou, C. F. and O. Shy (1990), Network Effects without Network Externalities, International Journal of Industrial Organization, 8, 259-270.
    9. Constant, D., Sproull, L., & Kiesler, S.(1996), The kindness of strangers: The usefulness of electronic weak ties for technical advice, Organization Science, 7(2), 119-135.
    10. Denne, M. (2007). "Pricing Utility Computing Services." International Journal of Web Services Research 4(2).
    11. Duck, S.W., & Perlman, D.(Eds.).(1985), Understanding personal relationships, London Sage.
    12. Granovetter, Mark S.(1973), The Strength of Weak Ties, American Journal of Sociology 78(6), 1360-1380.
    13. Garton, L. and Johnson, M. S.(1999), The different roles of satisfaction, trust, and commitment in customer relationship, Journal of Marketing,63, 70-87
    14. GRAY, J. (2008) Distributed Computing Economics. Queue 6, 3, 63–68.
    15. Godes, David and Dina Mayzlin (2004), Using Online Conversation to Study Word-of-Mouth Communication, Marketing Science, 23 (4), 545–60.
    16. Hamel, G. (1998a), The challenge today: changing the rules of the game. Business Strategy Review 9(2), 19–26.
    17. Hamel, G. (1998b) Strategy innovation and the quest for value. Sloan Management Review 39(2), 7–14.
    18. Hanneman, R. (1998), Introduction to Social Network, http://wizard.ucr.edu/~rhannema/networks/nettext.pdf
    19. Hill, Shawndra, Foster Provost, and Chris Volinsky (2006), Network-Based Marketing: Identifying Likely Adopters via Consumer Networks, Statistical Science, 21 (2), 256–76.
    20. Ireland RD, Hitt MA, Camp SM, Sexton DL. (2001), Integrating entrepreneurship actions and strategic management actions to create firm wealth. Academy of Management Executive 15(1), 49-63.
    21. Jeffrey Rohlfs (1974), A Theory of Interdependent Demand for a Communications Service, The Bell Journal of Economics and Management Science, 5(1), 16-37.
    22. Marsden, Peter V. & Campbell Karen E.(1984), Measuring Tie Strength, Social Forces 63(2), 482-501.
    23. McGourty J. Tarshis L. A. & Dominick. P. (1996), Managing Information: Lessons form World Class Organizations, International Journal of Technology Management, 11(3/4), 354-368.
    24. Michael A. Hitt, R. Duane Ireland, S. Michael Camp, Donald L. Sexton (2001), Special Issue: Strategic Entrepreneurship: Entrepreneurial Strategies for Wealth Creation, Strategic Management Journal, 22(6/7), 479-491.
    25. Michael Morris, Minet Schindehutte, Jeffrey Allen “The entrepreneur’s business model: toward a unified perspective”, Journal of Business Research 58 (2005) pp.726– 735.
    26. Nair, Harikesh, Puneet Manchanda, and Tulikaa Bhatia (2010), Asymmetric Peer Effects in Physician Prescription Behavior: The Role of Opinion Leaders, Journal of Marketing Research, 47, 883–95.
    27. Parkhill, D. (1966) The Challenge of the Computer Utility, US: Addison-Wesley Educational Publishers Inc.
    28. Pitt, Martyn and Clarke, Ken (1999), Competing on Competence: a Knowledge Perspective on the Management of Strategic Innovation, Technology Analysis and Strategic Management, 11(3), 301-316.
    29. Rangan, K. (2008), The Cloud Wars: $100+ billion at stake. Tech. rep., Merrill Lynch.
    30. Katz, M.L. and C. Shapiro (1985), Network externalities, competition, and compatibilitiy, The American Economic Review, 75(3), 424-440.
    31. Shapiro, C. and Varian, H.(1998), Information Rules: A Strategy Guide to the Network Economy, Harvard Business School Press.
    32. Shy, Oz (2001), The Economics of Network Industries, NY: Cambridge University Press.
    33. Siegele, L. (2008), Let It Rise: A Special Report on Corporate IT. The Economist.
    34. “Social Network”, Wikipedia, 2011 http://en.wikipedia.org/wiki/Social_network
    35. Stewart D. W., Zhao Q. (2000), Internet marketing, business models and public policy, Journal of Public Policy and Marketing, 19, 287-296.
    36. Van den Bulte, Cristophe and Yogesh V. Joshi (2007), New Product Diffusion with Influentials and Imitators, Marketing Science, 26 (3), 400–421.
    37. Vogels, W. (2008), A Head in the Clouds—The Power of Infrastructure as a Service. In First workshop on Cloud Computing and in Applications (CCA ’08)
    38. Watts, Duncan J. and Peter S. Dodds (2007), Influentials, Networks, and Public Opinion Formation, Journal of Consumer Research, 34 (4), 441–58.
    Zsolt Katona, Peter Pal Zubcsek, and Miklos Sarvary(2011), Network Effects and Personal Influences: The Diffusion of an Online Social Network, Journal of Marketing Research,48, 425 –443.
    Description: 碩士
    國立政治大學
    企業管理研究所
    98355010
    99
    Source URI: http://thesis.lib.nccu.edu.tw/record/#G0098355010
    Data Type: thesis
    Appears in Collections:[企業管理學系] 學位論文

    Files in This Item:

    File Description SizeFormat
    501001.pdf6773KbAdobe PDF2310View/Open
    501002.pdf6773KbAdobe PDF2322View/Open


    All items in 政大典藏 are protected by copyright, with all rights reserved.


    社群 sharing

    著作權政策宣告 Copyright Announcement
    1.本網站之數位內容為國立政治大學所收錄之機構典藏,無償提供學術研究與公眾教育等公益性使用,惟仍請適度,合理使用本網站之內容,以尊重著作權人之權益。商業上之利用,則請先取得著作權人之授權。
    The digital content of this website is part of National Chengchi University Institutional Repository. It provides free access to academic research and public education for non-commercial use. Please utilize it in a proper and reasonable manner and respect the rights of copyright owners. For commercial use, please obtain authorization from the copyright owner in advance.

    2.本網站之製作,已盡力防止侵害著作權人之權益,如仍發現本網站之數位內容有侵害著作權人權益情事者,請權利人通知本網站維護人員(nccur@nccu.edu.tw),維護人員將立即採取移除該數位著作等補救措施。
    NCCU Institutional Repository is made to protect the interests of copyright owners. If you believe that any material on the website infringes copyright, please contact our staff(nccur@nccu.edu.tw). We will remove the work from the repository and investigate your claim.
    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback