Please use this identifier to cite or link to this item: https://ah.lib.nccu.edu.tw/handle/140.119/35264
DC FieldValueLanguage
dc.contributor.advisor裘錦天zh_TW
dc.contributor.advisorChyou,Jonathan Jiin-Tianen_US
dc.contributor.author程裕繁zh_TW
dc.contributor.authorCheng,Bill Yu-Fanen_US
dc.creator程裕繁zh_TW
dc.creatorCheng,Bill Yu-Fanen_US
dc.date2006en_US
dc.date.accessioned2009-09-18T06:35:11Z-
dc.date.available2009-09-18T06:35:11Z-
dc.date.issued2009-09-18T06:35:11Z-
dc.identifierG0913565061en_US
dc.identifier.urihttps://nccur.lib.nccu.edu.tw/handle/140.119/35264-
dc.description博士zh_TW
dc.description國立政治大學zh_TW
dc.description資訊管理研究所zh_TW
dc.description91356506zh_TW
dc.description95zh_TW
dc.description.abstract小型化革命已經造成了企業資訊系統的典範轉移,不久之前以大型主機為基礎的集中架構仍然是企業之重要資訊系統的唯一選擇,時至今日為數眾多的重要企業資訊系統採用了以個人運算裝置為基礎的主從架構。另外一方面,視窗主從企業資訊系統是目前最常見的主從架構企業資訊系統類型,此類企業資訊系統必需將每一支客戶端程式都安裝到每一位使用者的電腦上,這種客戶端程式的人工部署作業一直是資訊管理從業人員的沈重負擔,亦是資訊管理產學界持續戮力解決的重要研究課題。其實ActiveX元件技術的妥善應用將可以有效解決這個部署問題,並且這種解決方案將遠比其它解決方案更具成本效益。研究以此發現為基礎,目的在於克服ActiveX元件技術在企業資訊系統應用上一直無法解決的三項缺點:能力強大所衍生的不安全、技術龐雜所衍生的學習與使用困難,以及元件體積龐大所衍生的網路應用瓶頸,並提出一個以ActiveX元件為基礎的解決方案來自動化暨有之視窗主從企業資訊系統的客戶端程式部署作業。報告的重點內容有四:(一)ActiveX元件技術的缺點克服之道;(二) 所提解決方案的第一個部份,也就是下載架構,採用下載架構開發的企業資訊系統將具備自動化部署客戶端程式的特性;(三)所提解決方案的第二個部份,也就是架構轉換程序,藉由這個程序的指引,暨有的視窗主從企業資訊系統將可以輕鬆轉換成為下載架構,有效解決其客戶端程式的部署問題;(四)兩個研究個案,用來示範下載架構與架構轉換程序的使用,並提供證據來支持下載架構與架構轉換程序的可行性。zh_TW
dc.description.abstractThe downsizing revolution has created a deep paradigmatic shift in business information systems (BISs). Not very long ago, large-scale mission-critical BISs were the exclusive province of massive mainframe computers. That is changing rapidly. Today, increasingly large and complex BISs are being built as client/server (C/S) applications. Unfortunately, for the most common C/S BISs, that is, the Windows-based C/S BISs (WinBISs), client programs must be manually deployed to each end-user machine bringing about a heavy BIS maintenance load. ActiveX component technology, if used properly, is more cost-effective than other alternatives in improving the deployment of existing WinBISs. Nevertheless, ActiveX component technology is no magic solution, and thus still has three shortcomings, namely insecurity, complexity, and bulkiness. The purpose of the study presented in this paper is to overcome the shortcomings of ActiveX component technology, and then develop an ActiveX component-based solution to automate the deployment of existing WinBISs. This paper has four main parts: (a) the answers to the shortcomings of ActiveX component technology; (b) the downloadable architecture, which supports the development of automatically-deployed BISs; (c) the architecture transformation process, which transforms existing WinBISs into the downloadable architecture; and (d) two examples of how to use the downloadable architecture and the architecture transformation process. The examples also provide evidence to support the feasibility of such architecture and process.en_US
dc.description.tableofcontents1 Introduction...................................... 1\n2 Literature Review................................. 5\n 2.1 Business Information Systems.................. 5\n 2.2 Legacy Business Information Systems........... 9\n 2.3 The Deployment Problem and Its Solutions...... 14\n 2.4 Visual Basic-Like Visual Programming.......... 20\n 2.5 Summary of Literature Review.................. 24\n3 Research Design................................... 26\n4 How to Overcome the Shortcomings of \n ActiveX Component Technology...................... 30\n5 Assumptions of the Solution....................... 34\n6 Part 1 of the Solution:\n The Downloadable Architecture..................... 35\n 6.1 Elements of the Downloadable Architecture..... 35\n 6.2 Interactions among Elements................... 39\n 6.3 Communications among Elements................. 40\n 6.4 Web Browser Security Settings................. 41\n7 Part 2 of the Solution:\n The Architecture Transformation Process........... 44\n 7.1 The Client Program Architecture\n Transformation Process........................ 44\n 7.2 Making the ActiveX Component.................. 46\n 7.3 Making the INF File........................... 48\n 7.4 Packing the ActiveX Component and \n Its Dependent DLLs............................ 52\n 7.5 Making the Package Carrier.................... 53\n8 Case Study 1...................................... 57\n 8.1 About the System.............................. 57\n 8.2 Improving the Deployability of the System..... 58\n 8.3 Testing the System............................ 67\n9 Case Study 2...................................... 69\n 9.1 About the System.............................. 69\n 9.2 Improving the Deployability of the System..... 70\n10 Conclusion....................................... 78\nReferences.......................................... 80zh_TW
dc.format.extent41463 bytes-
dc.format.extent61503 bytes-
dc.format.extent74415 bytes-
dc.format.extent18291 bytes-
dc.format.extent18960 bytes-
dc.format.extent67925 bytes-
dc.format.extent58428 bytes-
dc.format.extent18706 bytes-
dc.format.extent13067 bytes-
dc.format.extent247892 bytes-
dc.format.extent244553 bytes-
dc.format.extent874336 bytes-
dc.format.extent645853 bytes-
dc.format.extent14493 bytes-
dc.format.extent28048 bytes-
dc.format.mimetypeapplication/pdf-
dc.format.mimetypeapplication/pdf-
dc.format.mimetypeapplication/pdf-
dc.format.mimetypeapplication/pdf-
dc.format.mimetypeapplication/pdf-
dc.format.mimetypeapplication/pdf-
dc.format.mimetypeapplication/pdf-
dc.format.mimetypeapplication/pdf-
dc.format.mimetypeapplication/pdf-
dc.format.mimetypeapplication/pdf-
dc.format.mimetypeapplication/pdf-
dc.format.mimetypeapplication/pdf-
dc.format.mimetypeapplication/pdf-
dc.format.mimetypeapplication/pdf-
dc.format.mimetypeapplication/pdf-
dc.language.isoen_US-
dc.source.urihttp://thesis.lib.nccu.edu.tw/record/#G0913565061en_US
dc.subjectActiveX元件zh_TW
dc.subject遺產資訊系統zh_TW
dc.subject資訊系統現代化zh_TW
dc.subject資訊系統部署zh_TW
dc.subject資訊系統架構轉換zh_TW
dc.subjectActiveX Componenten_US
dc.subjectLegacy Information Systemen_US
dc.subjectInformation System Modernizationen_US
dc.subjectInformation System Deploymenten_US
dc.subjectInformation System Architecture Transformationen_US
dc.title使用ActiveX元件來改善暨有視窗主從企業資訊系統的可部署性zh_TW
dc.titleImproving the Deployability of Existing Windows-Based Client/Server Business Information Systems Using ActiveX Componentsen_US
dc.typethesisen
dc.relation.reference1.Babiker, E., Simmons, D., Shannon, R., & Ellis, N. (1997). A Model for Reengineering Legacy Expert Systems to Object-Oriented Architecture. Expert Systems With Applications, 12(3), 363-371.zh_TW
dc.relation.reference2.Bailey, K.D. (2005). Typologies and Taxonomies: An Introduction to Classification Techniques. Thousand Oaks, CA: Sage.zh_TW
dc.relation.reference3.Barron, T.M., Chiang, R.H.L., & Storey, V.C. (1999). A Semiotics Framework for Information Systems Classification and Development. Decision Support Systems, 25(1), 1-17.zh_TW
dc.relation.reference4.Bennett, K.H., & Rajlich, V.T. (2000). Software Maintenance and Evolution: A Roadmap. Proceedings of the Conference on the Future of Software Engineering, Limerick, Ireland, 73-87.zh_TW
dc.relation.reference5.Bodhuin, T., Guardaboscio, E., & Tortorella, M. (2002). Migrating COBOL Systems to the Web by Using the MVC Design Pattern. Proceedings of the 9th Working Conference on Reverse Engineering, Richmod, VA, 329-338.zh_TW
dc.relation.reference6.Borland (2005). Borland Developer Studio 2006 Online Help. Scotts Valley, CA: Borland.zh_TW
dc.relation.reference7.Carzaniga, A., Fuggetta, A., Hall, R.S., Heimbigner, D., van der Hoek, A., & Wolf, A.L. (1998). A Characterization Framework for Software Deployment Technologies (Tech. Rep. No. CU-CS-857-98). Boulder, CO: University of Colorado, Department of Computer Science.zh_TW
dc.relation.reference8.Chappell, D. (1996). Understanding ActiveX and OLE. Redmond, WA: Microsoft.zh_TW
dc.relation.reference9.Cheng, B.Y.F., Chyou, J.J.T., & Liu, J.J. (2007). Un-match: Object-Oriented Software Design Method and Visual Programming. International Journal of Soft Computing, 2(1), 199-207.zh_TW
dc.relation.reference10.Chyou, J.J.T., & Cheng, B.Y.F. (2006). Improving the Deployability of Existing Windows-Based Client/Server Business Information Systems Using ActiveX. Lecture Notes in Computer Science, 4317, 249-263.zh_TW
dc.relation.reference11.Coupaye, T., & Estublier, J. (2000). Foundations of Enterprise Software Deployment. Proceedings of the European Conference on Software Maintenance and Reengineering 2000, Zurich, Switzerland, 65-73.zh_TW
dc.relation.reference12.David, G., & Shaw, M. (1993). An Introduction to Software Architecture. Advances in Software Engineering and Knowledge Engineering, Vol. I. River Edge, NJ: World Scientific.zh_TW
dc.relation.reference13.Dershem, H.L., & Jipping, M.J. (1995). Programming Languages: Structures and Models. Boston: PWS.zh_TW
dc.relation.reference14.Dolstra, E., Visser, E., & de Jonge, M. (2004). Imposing a Memory Management Discipline on Software Deployment. Proceedings of the 26th International Conference on Software Engineering, Scotland, UK, 583-592.zh_TW
dc.relation.reference15.Edwards, A.D.N. (1988). Visual Programming Languages: The Next Generation. ACM SIGPLAN Notice, 23(4), 43-50.zh_TW
dc.relation.reference16.Gray, D.N., Hotchkiss, J., LaForge, S., Shalit, A., & Weinberg, T. (1998). Modern Languages and Microsoft`s Component Object Model. Communications of the ACM, 41(5), 55-65.zh_TW
dc.relation.reference17.Hall, R.S., Heimbigner, D., & Wolf, A.L. (1999). A Cooperative Approach to Support Software Deployment Using the Software Dock. Proceedings of the 21th International Conference on Software Engineering, Los Angeles, 174-183.zh_TW
dc.relation.reference18.Hanna, M. (1993). Maintenance Burden Begging for Remedy. Datamation, 53-63.zh_TW
dc.relation.reference19.Hassan, A.E., & Holt, R.C. (2005). A Lightweight Approach for Migrating Web Frameworks. Information and Software Technology, 47(8), 521-532.zh_TW
dc.relation.reference20.Hnetynka, P. (2005). A Model-Driven Environment for Component Deployment. Proceedings of the 3rd ACIS International Conference on Software Engineering Research, Management and Applications, Mount Pleasant, Michigan, 6-13.zh_TW
dc.relation.reference21.Hopwood, D. (1997). A Comparison Between Java and ActiveX Security. Network Security, 12, 15-20.zh_TW
dc.relation.reference22.Hoque, R., & Sharma, T. (1998). Programming Web Components. New York: McGraw-Hill.zh_TW
dc.relation.reference23.Inderscience (2007). International Journal of Business Information Systems Leaflet. https://www.inderscience.com/www/IJBIS_leaflet.pdf.zh_TW
dc.relation.reference24.Jansen, S., Ballintijn, G., & Brinkkemper, S. (2005). A Process Model and Typology for Software Product Updaters. Proceedings of the 9th European Conference on Software Maintenance and Reengineering, Manchester, UK, 265-274.zh_TW
dc.relation.reference25.Joiner, J.K., & Tsai, W.T. (1998). Re-Engineering Legacy COBOL Programs. Communications of the ACM, 41(5), 185-197.zh_TW
dc.relation.reference26.Kazman, R., & Carriere, S.J. (1999). Playing Detective: Reconstructing Software Architecture from Available Evidence. Journal of Automated Software Engineering, 6(2), 107-138.zh_TW
dc.relation.reference27.Klusener, A.S., Lammel, R., & Verhoef, C. (2005). Architectural Modifications to Deployed Software. Science of Computer Programming, 54(2-3), 143-211.zh_TW
dc.relation.reference28.Krikhaar, R., Postma, A., Sellink, A., Stroucken, M., & Verhoef, C. (1999). A Two-Phase Process for Software Architecture Improvement. Proceedings of the International Conference on Software Maintenance 1999, Oxford, UK, 371-380.zh_TW
dc.relation.reference29.Kristol, D.M. (2001). HTTP Cookies: Standards, Privacy, and Politics. ACM Transactions on Internet Technology, 1(2), 151-198.zh_TW
dc.relation.reference30.Larson, K.D., Wild, J.J., & Chiappetta, B. (2005). Principles of Financial Accounting. New York: McGraw-Hill.zh_TW
dc.relation.reference31.Laudon, K.C., & Laudon, J.P. (2005). Management Information Systems: Managing the Digital Firm. Upper Saddle River, NJ: Prentice-Hall.zh_TW
dc.relation.reference32.Lee, H., & Yoo, C. (2000). A Form Driven Object-Oriented Reverse Engineering Methodology. Information Systems, 25(3), 235-259.zh_TW
dc.relation.reference33.Lientz, B.P., & Swanson, E.B. (1980). Software Maintenance Management. Boston: Addison-Wesley.zh_TW
dc.relation.reference34.Martin, E.W., Brown, C.V., DeHayes, D.W., Hoffer, J.A., & Perkins, W.C. (2004). Managing Information Technology. Upper Saddle River, NJ: Prentice-Hall.zh_TW
dc.relation.reference35.Martin, J. (1990). Information Engineering, Book III: Design and Construction. Upper Saddle River, NJ: Prentice-Hall.zh_TW
dc.relation.reference36.McNurlin, B.C., & Sprague, R.H. (2005). Information Systems Management in Practice. Upper Saddle River, NJ: Prentice-Hall.zh_TW
dc.relation.reference37.Microsoft (1998). Microsoft Visual Basic 6.0 Online Help. Redmond, WA: Microsoft.zh_TW
dc.relation.reference38.Microsoft (2007a). Activating ActiveX Controls. http://msdn.microsoft.com/library/default.asp?url=/workshop/author/dhtml/overview/activating_activex.asp.zh_TW
dc.relation.reference39.Microsoft (2007b). ActiveX Controls. http://msdn.microsoft.com/library/default.asp?url=/workshop/components/activex/activex_node_entry.asp.zh_TW
dc.relation.reference40.Microsoft (2007c). COM: Component Object Model Technologies. http://www.microsoft.com/com/default.mspx.zh_TW
dc.relation.reference41.Mosley, D.C., Pietri, P.H., & Megginson, L.C. (1997). Management: Leadership in Action. Upper Saddle River, NJ: Prentice-Hall.zh_TW
dc.relation.reference42.OMG (2001). CORBA/TC Interworking and SCCP Inter-ORB Protocol Specification. http://www.omg.org/docs/formal/01-01-01.pdf.zh_TW
dc.relation.reference43.Oreizy, P., & Kaiser, G. (1997). The Web as Enabling Technology for Software Development and Distribution. IEEE Internet Computing, 1(6), 84-87.zh_TW
dc.relation.reference44.Orfali, R., Harkey, D., & Edwards, J. (1999). Client/Server Survival Guide. Hoboken, NJ: Wiley.zh_TW
dc.relation.reference45.Seacord, R.C., Plakosh, D., & Lewis, G.A. (2003). Modernizing Legacy Systems: Software Technologies, Engineering Processes, and Business Practices. Boston: Addison-Wesley.zh_TW
dc.relation.reference46.Sebesta, R.W. (2007). Concepts of Programming Languages. Boston: Addison-Wesley.zh_TW
dc.relation.reference47.Serrano, M.A., Carver, D.L., & Montes de Oca, C. (2002). Reengineering Legacy Systems for Distributed Environments. Journal of Systems and Software, 64(1), 37-55.zh_TW
dc.relation.reference48.Shaw, M., DeLine, R., Klein, D.V., Ross, T.L., Young, D.M., & Zelesnik, G. (1995). Abstractions for Software Architecture and Tools to Support Them. IEEE Transactions on Software Engineering, 21(4), 314-335.zh_TW
dc.relation.reference49.Silberschatz, A., Galvin, P.B., & Gagne, G. (2004). Operating System Concepts. Hoboken, NJ: Wiley.zh_TW
dc.relation.reference50.SyBase (2004). SyBase PowerBuilder 9.0 Online Help. Dublin, CA: SyBase.zh_TW
dc.relation.reference51.Swanson, E.B., & Beath, C.M. (1989). Reconstructing the Systems Development Organization. MIS Quarterly, 13(3), 293-307.zh_TW
dc.relation.reference52.Taconet, C., Putrycz, E., & Bernard, G. (2003). Context Aware Deployment for Mobile Users. Proceedings of the 27th Annual International Computer Software and Applications Conference, Hong Kong, China, 74-81.zh_TW
dc.relation.reference53.Tahvildari, L., Kontogiannis, K., & Mylopoulos, J. (2003). Quality-Driven Software Reengineering. Journal of Systems and Software, 66(3), 225-239.zh_TW
dc.relation.reference54.Turban, E., Mclean, I., & Whtherbe, J. (1996). Information Technology for Management: Improving Quality and Productivity. Hoboken, NJ: Wiley.zh_TW
dc.relation.reference55.Ulrich, W.M. (2002). Legacy Systems: Transformation Strategies. Upper Saddle River, NJ: Prentice-Hall.zh_TW
dc.relation.reference56.van der Hoek, A., & Wolf, A.L. (2003). Software Release Management for Component-Based Software. Software: Practice and Experience, 33(1), 77-98.zh_TW
dc.relation.reference57.Vessey, I., Ramesh, V., & Glass, R.L. (2005). A Unified Classification System for Research in the Computing Disciplines. Information and Software Technology, 47(4), 245-255.zh_TW
dc.relation.reference58.Wang, P.S., & Katila, S. (2003). An Introduction to Web Design and Programming. Boston: Course Technology.zh_TW
dc.relation.reference59.Wheaton, G.R. (1968). Development of a Taxonomy of Human Performance: A Review of Classificatory Systems Relating to Tasks and Performance (Tech. Rep. No. 726-12/68-TR-1). Washington, DC: American Institute for Research.zh_TW
dc.relation.reference60.Woods, S., Carriere, S.J., & Kazman, R. (1999). A Semantic Foundation for Architectural Reengineering and Interchange. Proceedings of the International Conference on Software Maintenance 1999, Oxford, UK, 391-398.zh_TW
item.fulltextWith Fulltext-
item.languageiso639-1en_US-
item.openairecristypehttp://purl.org/coar/resource_type/c_46ec-
item.cerifentitytypePublications-
item.openairetypethesis-
item.grantfulltextopen-
Appears in Collections:學位論文
Files in This Item:
File Description SizeFormat
56506101.pdf40.49 kBAdobe PDF2View/Open
56506102.pdf60.06 kBAdobe PDF2View/Open
56506103.pdf72.67 kBAdobe PDF2View/Open
56506104.pdf17.86 kBAdobe PDF2View/Open
56506105.pdf18.52 kBAdobe PDF2View/Open
56506106.pdf66.33 kBAdobe PDF2View/Open
56506107.pdf57.06 kBAdobe PDF2View/Open
56506108.pdf18.27 kBAdobe PDF2View/Open
56506109.pdf12.76 kBAdobe PDF2View/Open
56506110.pdf242.08 kBAdobe PDF2View/Open
56506111.pdf238.82 kBAdobe PDF2View/Open
56506112.pdf853.84 kBAdobe PDF2View/Open
56506113.pdf630.72 kBAdobe PDF2View/Open
56506114.pdf14.15 kBAdobe PDF2View/Open
56506115.pdf27.39 kBAdobe PDF2View/Open
Show simple item record

Google ScholarTM

Check


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.