Please use this identifier to cite or link to this item: https://ah.lib.nccu.edu.tw/handle/140.119/60228
題名: 中小企業資訊系統外包採用雲端運算服務之因素探討
Cloud computing service as an alternative for SME information systems outsourcing: assessing the key factors
作者: 陳祺堯
Chen, Chi Yau
貢獻者: 管郁君
Huang, Eugenia Y.
陳祺堯
Chen, Chi Yau
關鍵詞: 雲端運算
中小企業
資訊系統
外包
德菲法
層級分析法
Cloud computing
SME
Information systems
Outsourcing
Delphi methods
Analytic Hierarchy Process
日期: 2010
上傳時間: 4-Sep-2013
摘要: 雲端運算(Cloud Computing),是近年來在資訊科技與商業資訊應用領域中,佔有相當重要地位的研究與應用議題。眾多企業的執行長與資訊專家宣稱,雲端運算可降低基礎硬體設施與軟體維護的管理成本,為企業組織帶來新的契機與創造全新的商業模式。並非所有人都對雲端運算有正面的評價,部分專家學者指出,科技公司如Google、Microsoft與Amazon等大力推廣雲端運算,皆為了其利益和提高其現有硬體設備資產之利用度,過度高估雲端運算的價值以吸引企業客戶外包更多資訊系統與資訊應用。而無論雲端運算是否能成為下個世代的潮流,未來電腦發展趨勢,已有趨向集中分散各處的運算資源來完成需要高度運算能力服務之現象。\n\n  本研究提出一分析模式,預期讓中小企業(Small and Medium-sized Enterprise ,SME)進行外包資訊系統決策,在採用傳統外包與雲端運算外包此二種模式中做抉擇時,能對可能影響決策之因素進行評比與重要性排序,讓雲端服務提供廠商了解使用者所重視的要點以改善現有的服務與加強其發展的方向。本研究亦蒐集雲端運算的相關文獻與各方評價,以及與雲端運算相關之技術和特性,彙整成為一多面向之因素模型。本研究使用德菲法(Delphi Method)與層級分析法(Analytic Hierarchy Process, AHP),透過製發問卷來濾除模型中不重要之因素與分析因素之間相對的重要程度。本研究之最終研究結果顯示安全性(Security)與穩定性(Stability)兩大面向與相關因素,為中小企業在進行外包決策與選擇服務提供商之優先考量。
參考文獻: Adiga, N.R., Almasi, G., … Almasi, G.S. (2002). An Overview of the BlueGene/L Supercomputer. Supercomputing, ACM/IEEE 2002 Conference.\n\nBerman, F., Fox, G., Hey, A. J. G. (2003). Grid computing: Making the global infrastructure a reality. US: Wiley.\n\nBuyya, R. (1999). High Performance Cluster Computing: Programming and Applications Volume 2. US: Prentice Hall.\n\nBrancheau, J. C., & Wetherbe, J. C. (1987). Key issues in information systems management. MIS Quarterly, 11(1), 23-45.\n\nByrne, A., Boon, H., Austin, Z., Jurgens, T., & Raman-Wilms, L. (2010). Core competencies in natural health products for Canadian pharmacy students. American Journal of Pharmaceutical Education, 74(3), 45.\n\nCarr, N. G. (2003, May). IT Doesn’t Matter. Harvard Business Review.\n\nClouser, G. (2002, June). Why outsource. Oil & Gas Investor, 1-3.\n\nChitu Okoli, & Suzanne D Pawlowski. (2004). The Delphi method as a research tool: an example, design considerations and applications. Information & Management, 42(1), 15-29.\n\nChaudhary, S., & Kishore, R. (2010). Determinants and impacts of governance forms on outsourcing performance: evidence from a case study. Journal of Information Technology Case and Application Research, 12(1), 39-56.\n\nCouger, J. D. (1988a) Key human resource issues in IS in the 1990s. Proceedings of the Hawaii International Conference on Systems Sciences, 162-170.\n\nCouger, J. D. (1988b) Key human resources issues in IS in the 1990s: Views of IS executives versus human resource executives. Information and Management, 14(4), 161-174.\n\nCoronel, C., Morris, S., Rob, P. (2010). Database systems: design, implementation, and management, 9th Edition. US: South-Western.\n\nDeen, S. M.. (2005). An engineering approach to cooperating agents for distributed information systems. Journal of Intelligent Information Systems, 25(1), 5-45.\n\nDuffield, C. (1988). The Delphi technique. The Australiam Journal of Advanced Nursing, 2(2), 41-45.\n\nGeringer, J. Michael (1988). Partner selection criteria for developed country joint ventures. Business Quarterly, London, vol. 53, 55-63.\n\nGrisham, T. (2009). The Delphi technique: a method for testing complex and multifaceted topics. International Journal of Managing Projects in Business, 2(1), 112-130.\n\nMotahari-Nezhad, H. R., Stephenson, B., Singhal, S. (February, 2009). Outsourcing business to cloud computing services: opportunities and challenges. IEEE Internet Computing, 10(4), 1-17.\n\nHintzbergen, J.; Hintzbergen, K.; Baars, H.; Smulders, A. (2010). Foundations of Information Security Based on ISO27001 and ISO27002. US: Van Haren Publishing.\n\nIlbery, B., Maye, D., Kneafsey, M., Jenkins, T. and Walkley, C. (2004). Forecasting food supply chain developments in lagging rural regions: evidencefrom the UK. Journal of Rural Studies, Vol. 20, 331-344.\n\nO’Brien, J., Marakas, G. (2010). Management Information Systems, 10th. US:McGraw-Hill Companies.\n\nJohnson, A. (2009). Business and security executives views of information security investment drivers: results from a Delphi study. Journal of Information Privacy & Security, 5(1), 3-27.\n\nKatzan, H. (2010). On an ontological view of cloud computing. Journal of Service Science, 3(1), 1-6.\n\nKatzan, H.. (2010). On the privacy of cloud computing. International Journal of Management and Information Systems, 14(2), 1-12.\n\nKralovetz, R. G. (1996, Oct). A guide to successful outsourcing. Management Accounting, 32-38.\n\nKendall, M. G., & Gibbons, J. D. (1990). Rank correlation methods. London: Edward Arnold.\n\nKobielus (1996). Evaluation Time. Network World, vol.11, pp48.\n\nLaudon & Laudon (2008). Management Information Systems, 11/e. US: PEARSON.\n\nLundquist, C.; Frieder, O.; Holmes, D. O.; & Grossman, D. (1999). A parallel relational database management system approach to relevance feedback in information retrieval. Journal of the American Society for Information Science, 50(5), 413-426.\n\nMa, Q., Schmidt, M., & Pearson, J.. (2009). An integrated framework for information security management. Review of Business, 30(1), 58-69.\n\nArmbrust, M., Fox, A., Griffith, R., Joseph, A. D., Katz, R. H., Konwinski, A., Lee, G., Patterson, D. A., Rabkin, A., Stoica, I.& Zaharia, M. (2010). A View of Cloud Computing. Communications of the ACM, 53(4).\n\nMurry J. W. & Hommons, J. O. (1995). Delphi: A versatile methodology for conducting qualitative research. The Review of Higher Education, 18(4), 423-436.\n\nNiederman, F., Brancheau, J. C., & Wetherbe, J. C.. (1991). Information systems management issues for the 1990s. MIS Quarterly, 15(4), 474.\n\nBobroff, N., & Mummert,L. (2005). Design and implementation of a resource manager in a distributed database system. Journal of Network and Systems Management, 13(2), 151-174.\n\nDrucker P. F. (1994). Post-capitalism Society. US: Harper Paperbacks.\n\nQuinn, J. B. & Hilmer, F. G. (1994). Strategic outsourcing. Sloan Management Review, 43-45.\n\nBuyya, R.; Chee Shin Yeo; Venugopal, S. (2008). Market-oriented cloud computing: vision, hype, and reality for delivering IT services as computing utilities. 10th IEEE International Conference, 5-13.\n\nRappa, M. A.(2004). The utility business model and the future of computing services. IBM Systems Journal, 43(1), 32-42.\n\nKing, R. P. & Halim, N. (1991). Management of a remote backup copy for disaster recovery. ACM Transaction on Database Systems, 16(2), 338-368.\n\nRick L. Click & Thomas N. Duening (2004). Business Process Outsourcing – the Competitive Advantage. US: John Wiley & Sons.\n\nSchmidt, R. C. (1997). Managing Delphi surveys using nonparametric statistical techniques. Decision Sciences, 28(3), 763-774.\n\nSatty, T. L. (1980). The Analytic Hierarchy Process. New York: McGraw-Hill.\n\nSatty, T. L. (1990). How to make a decision:The analytic hierarchy process, European Journal of Operational Research, 48(1), 9-26.\nTang, C., Lin, M., Huang, E. (2010). The intention of selecting agile System development methodology among new Generation of software developer. 20th International Conference on Pacific Rim Management, ACME.\n\nThain, D., Tannenbaum, T., & Livny, M. (2005). Distributed computing in practice: The condor experience. Concurrency and Computation: Practice and Experience, 17(2‐4), 323-356.\n\nTruong, D.. (2010). How cloud computing enhances competitive advantages: A research model for small businesses. The Business Review, Cambridge, 15(1), 59-65.\n\nVaidya, O. S.,& Kumar, S. (2006). Analytic hierarchy process: An overview of applications. European Journal of Operational Research, 169(1), 1-29.\n\nDarlagiannis V.,& Mauthe, A., & Steinmetz, R. (2004). Overlay Design Mechanisms for Heterogeneous, Large-Scale, Dynamic P2P Systems. Journal of Network and Systems Management, 12(3), 371-396.\n\nYoung, R. (2009). Growth Perspective of Information Security. Journal of Information Privacy & Security, 5(4), 51-67.\n\nDefining SaaS, PaaS, IaaS, etc. Retrieved from http://cloudfeed.net/2008/06/03/defining-saas-paas-iaas-etc/\n\nCluster (computing). Retrieved from http://en.wikipedia.org/wiki/Cluster_(computing)\n\nGrid computing. Retrieved from http://en.wikipedia.org/wiki/Grid_computing\n\nLangley, K. (2008, April 24). Cloud Computing: Get Your Head in the Clouds Retrieved from http://www.productionscale.com/home/2008/4/24/cloud-computing-get-your-head-in-the-clouds.html\n\n\nDistributed computing. Retrieved from http://en.wikipedia.org/wiki/Distributed_computing\n\nIBM.com. Retrieved from http://www.ibm.com/ibm/cloud/\n\nSalesforce.com. Retrieved from: http://www.salesforce.com/cloudcomputing \n\nSupercomputer. Retrieved from http://en.wikipedia.org/wiki/Supercomputer\n\nUtility computing. Retrieved from http://en.wikipedia.org/wiki/Utility_computing\n\nWikipedia: Cloud computing. Retrieved from http://en.wikipedia.org/wiki/Cloud_computing\n\nWhatis.com. Retrieved from http://searchcloudcomputing.techtarget.com/sDefinition/0,,sid201_gci1287881,00.html\n\nAngwin, J. & Valentino-Devries, J. (2011, April 22). Apple, Google Collect User Data. Retrieved from http://online.wsj.com/article/SB10001424052748703983704576277101723453610.html
描述: 碩士
國立政治大學
資訊管理研究所
98356013
99
資料來源: http://thesis.lib.nccu.edu.tw/record/#G0983560131
資料類型: thesis
Appears in Collections:學位論文

Files in This Item:
File Description SizeFormat
013101.pdf1.81 MBAdobe PDF2View/Open
013102.pdf1.81 MBAdobe PDF2View/Open
Show full item record

Google ScholarTM

Check


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.