Please use this identifier to cite or link to this item: https://ah.lib.nccu.edu.tw/handle/140.119/48938
DC FieldValueLanguage
dc.contributor.advisor蕭瑞麟zh_TW
dc.contributor.advisorHsiao, Rueylinen_US
dc.contributor.author劉宛婷zh_TW
dc.contributor.authorLiu, Wan Tingen_US
dc.creator劉宛婷zh_TW
dc.creatorLiu, Wan Tingen_US
dc.date2009en_US
dc.date.accessioned2010-12-07T17:53:33Z-
dc.date.available2010-12-07T17:53:33Z-
dc.date.issued2010-12-07T17:53:33Z-
dc.identifierG0097359005en_US
dc.identifier.urihttp://nccur.lib.nccu.edu.tw/handle/140.119/48938-
dc.description博士zh_TW
dc.description國立政治大學zh_TW
dc.description科技管理研究所zh_TW
dc.description97359005zh_TW
dc.description98zh_TW
dc.description.abstract電腦病毒的演化瞬息萬變,特別是近年來,駭客在有利可圖的動機驅使下,逐漸形成了專業分工的產銷供應鏈,讓病毒的演化速度和變種數量以指數型成長。攻擊事件數量不斷竄升,資訊安全市場理應增加不少機會,但多數防毒廠商經常對這樣的市場機會望洋興嘆,每年花費數億金額,動員研發團隊提出新產品、新版本、新服務,使用者卻始終興趣缺缺。供需兩方認知差異讓防毒軟體廠商面臨龐大開發費用的損失,也讓企業持續存在於不定時資安風險的恐懼之中。\r\n\r\n資安軟體公司在產品研發前,做足使用者需求蒐集流程工作,依照使用者描述所進行開發的產品,為什麼卻不是客戶需要的?本研究以質性研究法觀察國內一家電腦防毒廠商的新產品開發過程,更以為期一年的行動研究方式參與該公司使用者洞見計畫(Customer insight program),結合跨部門團隊的智慧和力量,以雲端運算的資安機會為主題進行客戶觀察和新產品構思。\r\n\r\n經過一年的行動研究蒐證,本研究指出使用者導向設計的迷思,並強調瞭解工作脈絡對於系統性產品創新的重要性。由於系統性產品複雜程度較高,使用處於分工較細的系統運作流程之下,往往不自覺工作特殊之處,也難以確切表達總體需求。本研究的分析方式則透過使用者工作脈絡,即以客戶的商業模式和雲端運用的特殊情境,其次定義使用者於脈絡中獨特的痛點,進而找到創新機會。\r\n\r\n使用者雖然是創新的來源,但是本研究發現,使用者不一定能知道自己的需求,唯有瞭解他們的工作實務,瞭解使用者在特定工作情境的痛點,才能化痛點為創新的亮點。研究貢獻上,補強現行使用者研究的三大方向,分別是使用者假設的不同、產品面設計的不同與創新來源不同。實務貢獻上,本研究提供複雜度較高的系統產品廠商在使用者導向設計流程之建議,以及企業中各部門如何透過使用者創新設計思維發揮價值所在。zh_TW
dc.description.abstractThe rate of rapid evolution in computer virus results in an increase of computer crime and business attack incidents. Opportunities in the information security market began to grow and expected to exceed $125 billion USD by 2015, according to a new report by Global Industry Analysts.\r\n\r\nIn this situation, anti-virus company tried everything they can to launch high-technology, fancy, and more powerful product every year. But they found customer is always lack of interest in their new products. This not only makes the loss on large investment in software development for anti-virus company, and also makes enterprise customers continuously at the risk of data stolen and computer virus attacks.\r\n\r\nBy asking users what they want and trying really hard to listen to them before the development, however the product still hasn』t meet the customer needs?\r\n\r\nThis research is based on qualitative method and action research project to investigate an anti-virus company』s product development process and customer insight programs. The one year project was cooperated with company internal cross-functional team and focused on 『Protecting the cloud』 topic. There are three cases was selected in the final.\r\n\r\nIn order to know the user』s working context in the high-complexity information security product system. The analysis structure in three cases used four steps to find out. First of all, identify the enterprise user』s business model. Secondly, observe their local knowledge in cloud computing usage. Thirdly, clarify the organization`s unique pain points. The last but not the least, find the potential security opportunities for innovation. \r\n\r\nWhile user becomes a significant source of innovation, the study shows that users don』t necessarily know their own needs. Only to understand customer』s work practices, pain points under specific working situations, and use design thinking to make the pain points to transform into fit customer needs. The research emphasized the importance of local context in innovation theory and reinforced the inadequacy part of the lead user theory. \r\n\r\nKey words: User-centric innovation, Product innovation, Service innovation, Cloud computing, Anti-virus software, Qualitative research, Action researchen_US
dc.description.abstract第壹章、緒論 6\r\n1.1 研究背景及動機 7\r\n1.2 研究目的 8\r\n1.3 研究架構 9\r\n第貳章、文獻探討 10\r\n2.1 使用者於創新功能來源的角色 12\r\n2.2 領先使用者 13\r\n2.2.1 領先用戶的開發動機 13\r\n2.2.2 創新散佈的以退為進 17\r\n2.2.3 製造商借力使力 20\r\n2.3 使用者脈絡 23\r\n2.4 以核心使用者工作脈絡角度詮釋使用者創新 26\r\n第參章、方法論 28\r\n3.1 研究方法 28\r\n3.2 個案選擇 31\r\n3.3 實驗個案資料分析 32\r\n3.4 採訪資料分析 41\r\n第肆章、個案研究 42\r\n4.1 個案背景介紹 43\r\n4.1.1 趨勢科技的歷史 43\r\n4.1.2 規模、組織與趨勢味 44\r\n4.1.3 研發體制:JM與PM制度 47\r\n4.1.4 經銷模式:代理商與經銷商 49\r\n4.2 趨勢科技與電腦病毒 50\r\n4.2.1 病毒演進:企業面臨的風險 50\r\n4.2.2 趨勢與病毒:產品與病毒關係時間表 52\r\n4.3 趨勢科技與雲端運算 58\r\n4.3.1 趨勢與雲端:台灣研發中心與T-CLOUD 58\r\n4.3.2 趨勢與雲端:雲端運算產品與技術 60\r\n4.4 趨勢科技與使用者創新 65\r\n4.4.1 使用者經驗團隊 65\r\n4.4.2 使用者洞見計畫(Customer Insight) 67\r\n第伍章、研究發現 71\r\n5.1 聯合報個案介紹 71\r\n5.1.1 公司背景與商業模式:媒體企業 71\r\n5.1.2 雲端應用:數位匯流 71\r\n5.1.3 不停線的資安議題 77\r\n5.1.4 結論 82\r\n5.2 半導體製造A公司個案介紹 82\r\n5.2.1 A公司背景與營運模式:半導體代工的領先者 83\r\n5.2.2 A公司的雲端應用:關聯規則(Association Rules) 87\r\n5.2.3 雲端運算下的資安議題:配方保密 90\r\n5.2.4 研究結論 99\r\n5.3 中華電信個案介紹 100\r\n5.3.1 中華電信背景與營運模式:中介營運新通路 100\r\n5.3.2 中華電信的雲端應用:CaaS 107\r\n5.3.3 雲端運算下的資安議題 116\r\n5.3.4 研究結論 120\r\n5.4 跨案分析 121\r\n5.4.1 分析客戶商業模式和雲端應用形成的工作脈絡 121\r\n5.4.2 內嵌於情境的使用者痛點 122\r\n5.4.3 解決方案 123\r\n第陸章、討論 125\r\n6.1 理論意涵 125\r\n6.2 實務意涵 128\r\n第柒章、結論 133-
dc.description.tableofcontents第壹章、緒論 6\r\n1.1 研究背景及動機 7\r\n1.2 研究目的 8\r\n1.3 研究架構 9\r\n第貳章、文獻探討 10\r\n2.1 使用者於創新功能來源的角色 12\r\n2.2 領先使用者 13\r\n2.2.1 領先用戶的開發動機 13\r\n2.2.2 創新散佈的以退為進 17\r\n2.2.3 製造商借力使力 20\r\n2.3 使用者脈絡 23\r\n2.4 以核心使用者工作脈絡角度詮釋使用者創新 26\r\n第參章、方法論 28\r\n3.1 研究方法 28\r\n3.2 個案選擇 31\r\n3.3 實驗個案資料分析 32\r\n3.4 採訪資料分析 41\r\n第肆章、個案研究 42\r\n4.1 個案背景介紹 43\r\n4.1.1 趨勢科技的歷史 43\r\n4.1.2 規模、組織與趨勢味 44\r\n4.1.3 研發體制:JM與PM制度 47\r\n4.1.4 經銷模式:代理商與經銷商 49\r\n4.2 趨勢科技與電腦病毒 50\r\n4.2.1 病毒演進:企業面臨的風險 50\r\n4.2.2 趨勢與病毒:產品與病毒關係時間表 52\r\n4.3 趨勢科技與雲端運算 58\r\n4.3.1 趨勢與雲端:台灣研發中心與T-CLOUD 58\r\n4.3.2 趨勢與雲端:雲端運算產品與技術 60\r\n4.4 趨勢科技與使用者創新 65\r\n4.4.1 使用者經驗團隊 65\r\n4.4.2 使用者洞見計畫(Customer Insight) 67\r\n第伍章、研究發現 71\r\n5.1 聯合報個案介紹 71\r\n5.1.1 公司背景與商業模式:媒體企業 71\r\n5.1.2 雲端應用:數位匯流 71\r\n5.1.3 不停線的資安議題 77\r\n5.1.4 結論 82\r\n5.2 半導體製造A公司個案介紹 82\r\n5.2.1 A公司背景與營運模式:半導體代工的領先者 83\r\n5.2.2 A公司的雲端應用:關聯規則(Association Rules) 87\r\n5.2.3 雲端運算下的資安議題:配方保密 90\r\n5.2.4 研究結論 99\r\n5.3 中華電信個案介紹 100\r\n5.3.1 中華電信背景與營運模式:中介營運新通路 100\r\n5.3.2 中華電信的雲端應用:CaaS 107\r\n5.3.3 雲端運算下的資安議題 116\r\n5.3.4 研究結論 120\r\n5.4 跨案分析 121\r\n5.4.1 分析客戶商業模式和雲端應用形成的工作脈絡 121\r\n5.4.2 內嵌於情境的使用者痛點 122\r\n5.4.3 解決方案 123\r\n第陸章、討論 125\r\n6.1 理論意涵 125\r\n6.2 實務意涵 128\r\n第柒章、結論 133zh_TW
dc.language.isoen_US-
dc.source.urihttp://thesis.lib.nccu.edu.tw/record/#G0097359005en_US
dc.subject使用者導向設計zh_TW
dc.subject產品創新zh_TW
dc.subject服務創新zh_TW
dc.subject雲端運算zh_TW
dc.subject資訊安全zh_TW
dc.subject防毒軟體zh_TW
dc.subject質性研究zh_TW
dc.subject行動研究zh_TW
dc.subjectUser-centric innovationen_US
dc.subjectProduct innovationen_US
dc.subjectService innovationen_US
dc.subjectCloud computingen_US
dc.subjectinformation securityen_US
dc.subjectAnti-virus softwareen_US
dc.subjectQualitative researchen_US
dc.subjectAction researchen_US
dc.title使用者導向研究:從工作脈絡與客戶痛點中 設計雲端安全的創新 -以趨勢科技使用者洞見計畫為例zh_TW
dc.titleProtecting the cloud: Use the work practice and pain points to find customer insighten_US
dc.typethesisen
dc.relation.reference中文參考資料zh_TW
dc.relation.reference1.趨勢科技網站及歷年財報:http://tw.trendmicro.com/tw/home/ http://jp.trendmicro.com/jp/home/zh_TW
dc.relation.reference2.中華電信網站:http://www.cht.com.tw/zh_TW
dc.relation.reference3.VMWare網站:http://www.vmware.com/tw/zh_TW
dc.relation.reference4.維基百科 電腦病毒:http://zh.wikipedia.orgzh_TW
dc.relation.reference5.王義智(2009),資訊安全發展趨勢與我國可能商機研究,資策會zh_TW
dc.relation.reference6.趙彰傑(2004),五十年來頭一遭!《中時》、《聯合》財務報表曝光,Taiwan News 財經文化週刊,第147期zh_TW
dc.relation.reference7.楊士仁(2005),有線有錢、無線無錢、平面不如電子:媒體財務兩樣情,盈虧涇渭分明,Taiwan News財經文化週刊,第一九五期,頁五十八zh_TW
dc.relation.reference8.習賢德(2006),《聯合報》企業文化的形成與傳承(1963-2005)下冊,秀威資訊zh_TW
dc.relation.reference9.林全洲(2004),聯合報企業再造關鍵成功因素之研究zh_TW
dc.relation.reference10.李慶芳(2009),我對質性研究的反思. 組織與管理,2(2): 21-27.zh_TW
dc.relation.reference英文參考資料zh_TW
dc.relation.reference1.Amazon.com :http://aws.amazon.com/ec2/zh_TW
dc.relation.reference2.Allen, R. C. (1983). Collective Invention. Journal of Economic Behavior andzh_TW
dc.relation.referenceOrganization 4, no. 1: 1–24.zh_TW
dc.relation.reference3.Ancona, D.G., D. Caldwell. 2007. Improving the Performance of New Product Teams. Research Technology Management 50(5) 37-43.zh_TW
dc.relation.reference4.Berto, F. J (1999). The birth of dirt:Origins of Mountain Biking. San Francisco, CA: Van de Plas Publications.zh_TW
dc.relation.reference5.Buenstorf,G.(2002). Deisgning clunkers: Demand-side innovation and the early history of mountain bike. In J. S. Metcalfe & U. Cantner(Eds.), Change, transformation and development: 8th International Schumpeter Society Conference, Physica.zh_TW
dc.relation.reference6.Enos, J. L. (1962). Petroleum Progress and Profits, The MIT Press.zh_TW
dc.relation.reference7.Ellen van Oost (2005), Material Gender: How Shavers Configure the Users Femininity and Masculinity. How Users Matter-The Co-Construction of Users and Technology , edited by Nelly Oudshoorn and Trevor Pinch, The MIT Press.zh_TW
dc.relation.reference8.Freeman, C.(1968). Chemical Procee Plant: Innovaion and the World Market. National Institute Economic Reivew 45:2957zh_TW
dc.relation.reference9.Franke, N., and E. von Hippel. (2003). Satisfying Heterogeneous User Needs via Innovation Toolkits: The Case of Apache Security Software. Research Policy 32, no. 7:1199–1215.zh_TW
dc.relation.reference10.Franke, N., & Shah, S. (2003). How communities support innovative activities: an exploration of assistance and sharing among end-users. Research Policy, 32, 157–178.zh_TW
dc.relation.reference11.Harhoff, D., J. Henkel, and E. von Hippel. (2003). Profiting from VoluntaryInformation Spillovers: How Users Benefit by Freely Revealing Their Innovations. Research Policy 32, no. 10: 1753–1769.zh_TW
dc.relation.reference12.Hollander, S. (1965). The Sources of Increased Efficiency. MIT Press.zh_TW
dc.relation.reference13.Howe, S. (1998) A Cultural History of Snowboarding. New York: St. Martin`s Griffin.zh_TW
dc.relation.reference14.Jensen, M. C., and W. H. Meckling. (1976). Theory of the Firm: Managerial Behavior, Agency Costs, and Ownership Structure.Journal of Financial Economics 3, no. 4:305–360.zh_TW
dc.relation.reference15.Jenkins, R. V. (1975). Technology and the market: George Eastman and the origins of mass amateur photography. Technology and Culture 16:1-19.zh_TW
dc.relation.reference16.Jeppesen, L. B., & Frederiksen, L. (2006). Why do users contribute to firm-hosted user communities? The case of computer-controlled music instruments. Organization Science, 17(1), 45-63.zh_TW
dc.relation.reference17.Knight, K. E. (1963). A Study of Technological Innovation: The Evolution of Digital Computers. PhD dissertation, Carnegie Institute of Technology.zh_TW
dc.relation.reference18.Levy, S. (1984). Hackers. Doubleday.zh_TW
dc.relation.reference19.Lilien, G. L., P. D. Morrison, K. Searls, M. Sonnack, and E. von Hippel. (2002). Performance Assessment of the Lead User Idea-Generation Process for New Product Development. Management Science 48, no. 8: 1042–1059.zh_TW
dc.relation.reference20.Lionetta, William G., Jr. (1977). Sources of Innovation Within the Pultrusion Industry.Unpublished S.M. thesis, Sloan School of Management, Massachusetts Institute of Technology, Cambridge, Mass.zh_TW
dc.relation.reference21.Lim, K. (2000). The Many Faces of Absorptive Capacity. Working paper, MIT Sloan School of Management.zh_TW
dc.relation.reference22.Lüthje, C., C. Herstatt, and E. von Hippel. (2002). The Dominant Role of Local Information in User Innovation: The Case of Mountain Biking. Working Paper, MIT Sloan School of Management.zh_TW
dc.relation.reference23.Luthje, C., C. Herstatt, E. von Hippel. (2005). User-innovators and `local` information: The case of mountain bike. Research Policy 34 ,951-965.zh_TW
dc.relation.reference24.Morrison, P. D., J. H. Roberts, and E. von Hippel. (2000). Determinants of User Innovation and Innovation Sharing in a Local Market. Management Science 46, no.12: 1513–1527.zh_TW
dc.relation.reference25.Nelly Oudshoorn and Trevor Pinch (2005), How Users Matter-The Co-Construction of Users and Technology. The MIT Press.zh_TW
dc.relation.reference26.Nick Mediati, Top 10 Internet Security Suites of 2010,PC World Magazinezh_TW
dc.relation.reference27.Nuvolari, A. (2004). 「Collective Invention during the British Industrial Revolution: The Case of the Cornish Pumping Engine.」 Cambridge Journal of Economics 28, no. 3: 347–363.zh_TW
dc.relation.reference28.Penning, C.(1998). Bike history. Bielefeld: Delius&Klasing.zh_TW
dc.relation.reference29.Punj, G., and D. W. Stewart. (1983). 「Cluster Analysis in Marketing Research: Review and Suggestions for Application.」 Journal of Marketing Research 20, May: 134–148.zh_TW
dc.relation.reference30.Rosenberg, N. (1976). Perspectives on Technology. Cambridge University Press.zh_TW
dc.relation.reference31.Shah, S. (2006) From innovation to firm formation in the windsurfing, skateboarding and snowboarding industries, Sloan School Working Paperzh_TW
dc.relation.reference32.Slaughter, S. (1993). Innovation and Learning during Implementation: A Comparison of User and Manufacturer Innovations. Research Policy 22, no. 1: 81–95.zh_TW
dc.relation.reference33.Smith, A. (1776). An Inquiry into the Nature and Causes of the Wealth of Nations. Modern Library edition. Random House, 1937.zh_TW
dc.relation.reference34.Stevens, Bethany (1998) Ultimate Snowboarding. New York: Contemporary Books.zh_TW
dc.relation.reference35.The Ecnomics (2010).April Special Report:Innovation in Emerging Marketszh_TW
dc.relation.reference36.Thomke, S. H., and E. von Hippel. (2002). Customers as Innovators: A New Way tozh_TW
dc.relation.referenceCreate Value. Harvard Business Review 80, no. 4: 74–81.zh_TW
dc.relation.reference37.VanderWerf, Pieter A. (1990) .Product tying and innovation in U.S. wire preparation equipment, Research Policy 19: 83-96.zh_TW
dc.relation.reference38.von Hippel, E., (1976). The Dominant Role of Users in the Scientific Instrument Innovation Process, Research Policy 5, no. 3 (July):212-39.zh_TW
dc.relation.reference39.von Hippel, E., (1977). The Dominant Role of the User in Semiconductor and Electronic Subassembly Process Innovation, IEEE Transactions on Engineering Management EM-24, no. 2 (May):60-71.zh_TW
dc.relation.reference40.von Hippel, E., and S. N. Finkelstein. (1979). Analysis of Innovation in Automated Clinical Chemistry Analyzers. Science and Public Policy 6, no. 1: 24–37.zh_TW
dc.relation.reference41.von Hippel, E.(1994)Sticky information and the locus of problem solving : Implications for innovation. Management Science, 40, 429-439.zh_TW
dc.relation.reference42.von Hippel, E. (1986). Lead users: a Source of novel product concepts. Management Science, 32(7), 791-805.zh_TW
dc.relation.reference43.von Hippel, E. (1988). The Sources of Innovation. New York, Oxford University Press.zh_TW
dc.relation.reference44.von Hippel, E. (2002) Horizontal innovation networks - by and for users.zh_TW
dc.relation.reference45.von Hippel, E., and R. Katz. (2002). Shifting Innovation to Users via Toolkits.Management Science 48, no. 7: 821–833.zh_TW
dc.relation.reference46.von Hippel, E. (2005). Democratizing Innovation: The Evolving Phenomenon of User Innovation.zh_TW
dc.relation.reference47.von Hippel, E. (2006) How user innovations become commercial productszh_TW
item.fulltextWith Fulltext-
item.openairecristypehttp://purl.org/coar/resource_type/c_46ec-
item.grantfulltextopen-
item.cerifentitytypePublications-
item.openairetypethesis-
item.languageiso639-1en_US-
Appears in Collections:學位論文
Files in This Item:
File SizeFormat
index.html115 BHTML2View/Open
Show simple item record

Google ScholarTM

Check


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.