學術產出-Theses
Article View/Open
Publication Export
-
題名 中小企業資訊系統外包採用雲端運算服務之因素探討
Cloud computing service as an alternative for SME information systems outsourcing: assessing the key factors作者 陳祺堯
Chen, Chi Yau貢獻者 管郁君
Huang, Eugenia Y.
陳祺堯
Chen, Chi Yau關鍵詞 雲端運算
中小企業
資訊系統
外包
德菲法
層級分析法
Cloud computing
SME
Information systems
Outsourcing
Delphi methods
Analytic Hierarchy Process日期 2010 上傳時間 4-Sep-2013 17:01:30 (UTC+8) 摘要 雲端運算(Cloud Computing),是近年來在資訊科技與商業資訊應用領域中,佔有相當重要地位的研究與應用議題。眾多企業的執行長與資訊專家宣稱,雲端運算可降低基礎硬體設施與軟體維護的管理成本,為企業組織帶來新的契機與創造全新的商業模式。並非所有人都對雲端運算有正面的評價,部分專家學者指出,科技公司如Google、Microsoft與Amazon等大力推廣雲端運算,皆為了其利益和提高其現有硬體設備資產之利用度,過度高估雲端運算的價值以吸引企業客戶外包更多資訊系統與資訊應用。而無論雲端運算是否能成為下個世代的潮流,未來電腦發展趨勢,已有趨向集中分散各處的運算資源來完成需要高度運算能力服務之現象。 本研究提出一分析模式,預期讓中小企業(Small and Medium-sized Enterprise ,SME)進行外包資訊系統決策,在採用傳統外包與雲端運算外包此二種模式中做抉擇時,能對可能影響決策之因素進行評比與重要性排序,讓雲端服務提供廠商了解使用者所重視的要點以改善現有的服務與加強其發展的方向。本研究亦蒐集雲端運算的相關文獻與各方評價,以及與雲端運算相關之技術和特性,彙整成為一多面向之因素模型。本研究使用德菲法(Delphi Method)與層級分析法(Analytic Hierarchy Process, AHP),透過製發問卷來濾除模型中不重要之因素與分析因素之間相對的重要程度。本研究之最終研究結果顯示安全性(Security)與穩定性(Stability)兩大面向與相關因素,為中小企業在進行外包決策與選擇服務提供商之優先考量。 參考文獻 Adiga, N.R., Almasi, G., … Almasi, G.S. (2002). An Overview of the BlueGene/L Supercomputer. Supercomputing, ACM/IEEE 2002 Conference.Berman, F., Fox, G., Hey, A. J. G. (2003). Grid computing: Making the global infrastructure a reality. US: Wiley.Buyya, R. (1999). High Performance Cluster Computing: Programming and Applications Volume 2. US: Prentice Hall.Brancheau, J. C., & Wetherbe, J. C. (1987). Key issues in information systems management. MIS Quarterly, 11(1), 23-45.Byrne, A., Boon, H., Austin, Z., Jurgens, T., & Raman-Wilms, L. (2010). Core competencies in natural health products for Canadian pharmacy students. American Journal of Pharmaceutical Education, 74(3), 45.Carr, N. G. (2003, May). IT Doesn’t Matter. Harvard Business Review.Clouser, G. (2002, June). Why outsource. Oil & Gas Investor, 1-3.Chitu Okoli, & Suzanne D Pawlowski. (2004). The Delphi method as a research tool: an example, design considerations and applications. Information & Management, 42(1), 15-29.Chaudhary, S., & Kishore, R. (2010). Determinants and impacts of governance forms on outsourcing performance: evidence from a case study. Journal of Information Technology Case and Application Research, 12(1), 39-56.Couger, J. D. (1988a) Key human resource issues in IS in the 1990s. Proceedings of the Hawaii International Conference on Systems Sciences, 162-170.Couger, J. D. (1988b) Key human resources issues in IS in the 1990s: Views of IS executives versus human resource executives. Information and Management, 14(4), 161-174.Coronel, C., Morris, S., Rob, P. (2010). Database systems: design, implementation, and management, 9th Edition. US: South-Western.Deen, S. M.. (2005). An engineering approach to cooperating agents for distributed information systems. Journal of Intelligent Information Systems, 25(1), 5-45.Duffield, C. (1988). The Delphi technique. The Australiam Journal of Advanced Nursing, 2(2), 41-45.Geringer, J. Michael (1988). Partner selection criteria for developed country joint ventures. Business Quarterly, London, vol. 53, 55-63.Grisham, T. (2009). The Delphi technique: a method for testing complex and multifaceted topics. International Journal of Managing Projects in Business, 2(1), 112-130.Motahari-Nezhad, H. R., Stephenson, B., Singhal, S. (February, 2009). Outsourcing business to cloud computing services: opportunities and challenges. IEEE Internet Computing, 10(4), 1-17.Hintzbergen, J.; Hintzbergen, K.; Baars, H.; Smulders, A. (2010). Foundations of Information Security Based on ISO27001 and ISO27002. US: Van Haren Publishing.Ilbery, B., Maye, D., Kneafsey, M., Jenkins, T. and Walkley, C. (2004). Forecasting food supply chain developments in lagging rural regions: evidencefrom the UK. Journal of Rural Studies, Vol. 20, 331-344.O’Brien, J., Marakas, G. (2010). Management Information Systems, 10th. US:McGraw-Hill Companies.Johnson, A. (2009). Business and security executives views of information security investment drivers: results from a Delphi study. Journal of Information Privacy & Security, 5(1), 3-27.Katzan, H. (2010). On an ontological view of cloud computing. Journal of Service Science, 3(1), 1-6.Katzan, H.. (2010). On the privacy of cloud computing. International Journal of Management and Information Systems, 14(2), 1-12.Kralovetz, R. G. (1996, Oct). A guide to successful outsourcing. Management Accounting, 32-38.Kendall, M. G., & Gibbons, J. D. (1990). Rank correlation methods. London: Edward Arnold.Kobielus (1996). Evaluation Time. Network World, vol.11, pp48.Laudon & Laudon (2008). Management Information Systems, 11/e. US: PEARSON.Lundquist, C.; Frieder, O.; Holmes, D. O.; & Grossman, D. (1999). A parallel relational database management system approach to relevance feedback in information retrieval. Journal of the American Society for Information Science, 50(5), 413-426.Ma, Q., Schmidt, M., & Pearson, J.. (2009). An integrated framework for information security management. Review of Business, 30(1), 58-69.Armbrust, M., Fox, A., Griffith, R., Joseph, A. D., Katz, R. H., Konwinski, A., Lee, G., Patterson, D. A., Rabkin, A., Stoica, I.& Zaharia, M. (2010). A View of Cloud Computing. Communications of the ACM, 53(4).Murry J. W. & Hommons, J. O. (1995). Delphi: A versatile methodology for conducting qualitative research. The Review of Higher Education, 18(4), 423-436.Niederman, F., Brancheau, J. C., & Wetherbe, J. C.. (1991). Information systems management issues for the 1990s. MIS Quarterly, 15(4), 474.Bobroff, N., & Mummert,L. (2005). Design and implementation of a resource manager in a distributed database system. Journal of Network and Systems Management, 13(2), 151-174.Drucker P. F. (1994). Post-capitalism Society. US: Harper Paperbacks.Quinn, J. B. & Hilmer, F. G. (1994). Strategic outsourcing. Sloan Management Review, 43-45.Buyya, R.; Chee Shin Yeo; Venugopal, S. (2008). Market-oriented cloud computing: vision, hype, and reality for delivering IT services as computing utilities. 10th IEEE International Conference, 5-13.Rappa, M. A.(2004). The utility business model and the future of computing services. IBM Systems Journal, 43(1), 32-42.King, R. P. & Halim, N. (1991). Management of a remote backup copy for disaster recovery. ACM Transaction on Database Systems, 16(2), 338-368.Rick L. Click & Thomas N. Duening (2004). Business Process Outsourcing – the Competitive Advantage. US: John Wiley & Sons.Schmidt, R. C. (1997). Managing Delphi surveys using nonparametric statistical techniques. Decision Sciences, 28(3), 763-774.Satty, T. L. (1980). The Analytic Hierarchy Process. New York: McGraw-Hill.Satty, T. L. (1990). How to make a decision:The analytic hierarchy process, European Journal of Operational Research, 48(1), 9-26.Tang, C., Lin, M., Huang, E. (2010). The intention of selecting agile System development methodology among new Generation of software developer. 20th International Conference on Pacific Rim Management, ACME.Thain, D., Tannenbaum, T., & Livny, M. (2005). Distributed computing in practice: The condor experience. Concurrency and Computation: Practice and Experience, 17(2‐4), 323-356.Truong, D.. (2010). How cloud computing enhances competitive advantages: A research model for small businesses. The Business Review, Cambridge, 15(1), 59-65.Vaidya, O. S.,& Kumar, S. (2006). Analytic hierarchy process: An overview of applications. European Journal of Operational Research, 169(1), 1-29.Darlagiannis V.,& Mauthe, A., & Steinmetz, R. (2004). Overlay Design Mechanisms for Heterogeneous, Large-Scale, Dynamic P2P Systems. Journal of Network and Systems Management, 12(3), 371-396.Young, R. (2009). Growth Perspective of Information Security. Journal of Information Privacy & Security, 5(4), 51-67.Defining SaaS, PaaS, IaaS, etc. Retrieved from http://cloudfeed.net/2008/06/03/defining-saas-paas-iaas-etc/Cluster (computing). Retrieved from http://en.wikipedia.org/wiki/Cluster_(computing)Grid computing. Retrieved from http://en.wikipedia.org/wiki/Grid_computingLangley, K. (2008, April 24). Cloud Computing: Get Your Head in the Clouds Retrieved from http://www.productionscale.com/home/2008/4/24/cloud-computing-get-your-head-in-the-clouds.htmlDistributed computing. Retrieved from http://en.wikipedia.org/wiki/Distributed_computingIBM.com. Retrieved from http://www.ibm.com/ibm/cloud/Salesforce.com. Retrieved from: http://www.salesforce.com/cloudcomputing Supercomputer. Retrieved from http://en.wikipedia.org/wiki/SupercomputerUtility computing. Retrieved from http://en.wikipedia.org/wiki/Utility_computingWikipedia: Cloud computing. Retrieved from http://en.wikipedia.org/wiki/Cloud_computingWhatis.com. Retrieved from http://searchcloudcomputing.techtarget.com/sDefinition/0,,sid201_gci1287881,00.htmlAngwin, J. & Valentino-Devries, J. (2011, April 22). Apple, Google Collect User Data. Retrieved from http://online.wsj.com/article/SB10001424052748703983704576277101723453610.html 描述 碩士
國立政治大學
資訊管理研究所
98356013
99資料來源 http://thesis.lib.nccu.edu.tw/record/#G0983560131 資料類型 thesis dc.contributor.advisor 管郁君 zh_TW dc.contributor.advisor Huang, Eugenia Y. en_US dc.contributor.author (Authors) 陳祺堯 zh_TW dc.contributor.author (Authors) Chen, Chi Yau en_US dc.creator (作者) 陳祺堯 zh_TW dc.creator (作者) Chen, Chi Yau en_US dc.date (日期) 2010 en_US dc.date.accessioned 4-Sep-2013 17:01:30 (UTC+8) - dc.date.available 4-Sep-2013 17:01:30 (UTC+8) - dc.date.issued (上傳時間) 4-Sep-2013 17:01:30 (UTC+8) - dc.identifier (Other Identifiers) G0983560131 en_US dc.identifier.uri (URI) http://nccur.lib.nccu.edu.tw/handle/140.119/60228 - dc.description (描述) 碩士 zh_TW dc.description (描述) 國立政治大學 zh_TW dc.description (描述) 資訊管理研究所 zh_TW dc.description (描述) 98356013 zh_TW dc.description (描述) 99 zh_TW dc.description.abstract (摘要) 雲端運算(Cloud Computing),是近年來在資訊科技與商業資訊應用領域中,佔有相當重要地位的研究與應用議題。眾多企業的執行長與資訊專家宣稱,雲端運算可降低基礎硬體設施與軟體維護的管理成本,為企業組織帶來新的契機與創造全新的商業模式。並非所有人都對雲端運算有正面的評價,部分專家學者指出,科技公司如Google、Microsoft與Amazon等大力推廣雲端運算,皆為了其利益和提高其現有硬體設備資產之利用度,過度高估雲端運算的價值以吸引企業客戶外包更多資訊系統與資訊應用。而無論雲端運算是否能成為下個世代的潮流,未來電腦發展趨勢,已有趨向集中分散各處的運算資源來完成需要高度運算能力服務之現象。 本研究提出一分析模式,預期讓中小企業(Small and Medium-sized Enterprise ,SME)進行外包資訊系統決策,在採用傳統外包與雲端運算外包此二種模式中做抉擇時,能對可能影響決策之因素進行評比與重要性排序,讓雲端服務提供廠商了解使用者所重視的要點以改善現有的服務與加強其發展的方向。本研究亦蒐集雲端運算的相關文獻與各方評價,以及與雲端運算相關之技術和特性,彙整成為一多面向之因素模型。本研究使用德菲法(Delphi Method)與層級分析法(Analytic Hierarchy Process, AHP),透過製發問卷來濾除模型中不重要之因素與分析因素之間相對的重要程度。本研究之最終研究結果顯示安全性(Security)與穩定性(Stability)兩大面向與相關因素,為中小企業在進行外包決策與選擇服務提供商之優先考量。 zh_TW dc.description.tableofcontents 摘要 IABSTRACT II致謝 III目錄 IV圖目錄 VI表目錄 VII第一章 緒論 1 第一節 研究背景與動機 1 第二節 研究問題與研究目的 3 第三節 研究流程 3第二章 文獻探討 5 第一節 雲端運算 5 第二節 雲端運算相關資訊 8 第三節 外包 11第三章 研究方法 18 第一節 研究架構 18 第二節 研究設計 30第四章 資料分析 39 第一節 德菲法分析 39 第二節 層級分析法分析 48第五章 結論與建議 53 第一節 研究結論 53 第二節 研究限制與建議 58參考文獻 60附錄1:德菲法第一回合問卷 67附錄2:德菲法第二回合問卷 72附錄3:德菲法第三回合問卷 75附錄4:德菲法第四回合問卷 79附錄5:層級分析法問卷 83 zh_TW dc.format.extent 1854173 bytes - dc.format.extent 1854173 bytes - dc.format.mimetype application/pdf - dc.format.mimetype application/pdf - dc.language.iso en_US - dc.source.uri (資料來源) http://thesis.lib.nccu.edu.tw/record/#G0983560131 en_US dc.subject (關鍵詞) 雲端運算 zh_TW dc.subject (關鍵詞) 中小企業 zh_TW dc.subject (關鍵詞) 資訊系統 zh_TW dc.subject (關鍵詞) 外包 zh_TW dc.subject (關鍵詞) 德菲法 zh_TW dc.subject (關鍵詞) 層級分析法 zh_TW dc.subject (關鍵詞) Cloud computing en_US dc.subject (關鍵詞) SME en_US dc.subject (關鍵詞) Information systems en_US dc.subject (關鍵詞) Outsourcing en_US dc.subject (關鍵詞) Delphi methods en_US dc.subject (關鍵詞) Analytic Hierarchy Process en_US dc.title (題名) 中小企業資訊系統外包採用雲端運算服務之因素探討 zh_TW dc.title (題名) Cloud computing service as an alternative for SME information systems outsourcing: assessing the key factors en_US dc.type (資料類型) thesis en dc.relation.reference (參考文獻) Adiga, N.R., Almasi, G., … Almasi, G.S. (2002). An Overview of the BlueGene/L Supercomputer. Supercomputing, ACM/IEEE 2002 Conference.Berman, F., Fox, G., Hey, A. J. G. (2003). Grid computing: Making the global infrastructure a reality. US: Wiley.Buyya, R. (1999). High Performance Cluster Computing: Programming and Applications Volume 2. US: Prentice Hall.Brancheau, J. C., & Wetherbe, J. C. (1987). Key issues in information systems management. MIS Quarterly, 11(1), 23-45.Byrne, A., Boon, H., Austin, Z., Jurgens, T., & Raman-Wilms, L. (2010). Core competencies in natural health products for Canadian pharmacy students. American Journal of Pharmaceutical Education, 74(3), 45.Carr, N. G. (2003, May). IT Doesn’t Matter. Harvard Business Review.Clouser, G. (2002, June). Why outsource. Oil & Gas Investor, 1-3.Chitu Okoli, & Suzanne D Pawlowski. (2004). The Delphi method as a research tool: an example, design considerations and applications. Information & Management, 42(1), 15-29.Chaudhary, S., & Kishore, R. (2010). Determinants and impacts of governance forms on outsourcing performance: evidence from a case study. Journal of Information Technology Case and Application Research, 12(1), 39-56.Couger, J. D. (1988a) Key human resource issues in IS in the 1990s. Proceedings of the Hawaii International Conference on Systems Sciences, 162-170.Couger, J. D. (1988b) Key human resources issues in IS in the 1990s: Views of IS executives versus human resource executives. Information and Management, 14(4), 161-174.Coronel, C., Morris, S., Rob, P. (2010). Database systems: design, implementation, and management, 9th Edition. US: South-Western.Deen, S. M.. (2005). An engineering approach to cooperating agents for distributed information systems. Journal of Intelligent Information Systems, 25(1), 5-45.Duffield, C. (1988). The Delphi technique. The Australiam Journal of Advanced Nursing, 2(2), 41-45.Geringer, J. Michael (1988). Partner selection criteria for developed country joint ventures. Business Quarterly, London, vol. 53, 55-63.Grisham, T. (2009). The Delphi technique: a method for testing complex and multifaceted topics. International Journal of Managing Projects in Business, 2(1), 112-130.Motahari-Nezhad, H. R., Stephenson, B., Singhal, S. (February, 2009). Outsourcing business to cloud computing services: opportunities and challenges. IEEE Internet Computing, 10(4), 1-17.Hintzbergen, J.; Hintzbergen, K.; Baars, H.; Smulders, A. (2010). Foundations of Information Security Based on ISO27001 and ISO27002. US: Van Haren Publishing.Ilbery, B., Maye, D., Kneafsey, M., Jenkins, T. and Walkley, C. (2004). Forecasting food supply chain developments in lagging rural regions: evidencefrom the UK. Journal of Rural Studies, Vol. 20, 331-344.O’Brien, J., Marakas, G. (2010). Management Information Systems, 10th. US:McGraw-Hill Companies.Johnson, A. (2009). Business and security executives views of information security investment drivers: results from a Delphi study. Journal of Information Privacy & Security, 5(1), 3-27.Katzan, H. (2010). On an ontological view of cloud computing. Journal of Service Science, 3(1), 1-6.Katzan, H.. (2010). On the privacy of cloud computing. International Journal of Management and Information Systems, 14(2), 1-12.Kralovetz, R. G. (1996, Oct). A guide to successful outsourcing. Management Accounting, 32-38.Kendall, M. G., & Gibbons, J. D. (1990). Rank correlation methods. London: Edward Arnold.Kobielus (1996). Evaluation Time. Network World, vol.11, pp48.Laudon & Laudon (2008). Management Information Systems, 11/e. US: PEARSON.Lundquist, C.; Frieder, O.; Holmes, D. O.; & Grossman, D. (1999). A parallel relational database management system approach to relevance feedback in information retrieval. Journal of the American Society for Information Science, 50(5), 413-426.Ma, Q., Schmidt, M., & Pearson, J.. (2009). An integrated framework for information security management. Review of Business, 30(1), 58-69.Armbrust, M., Fox, A., Griffith, R., Joseph, A. D., Katz, R. H., Konwinski, A., Lee, G., Patterson, D. A., Rabkin, A., Stoica, I.& Zaharia, M. (2010). A View of Cloud Computing. Communications of the ACM, 53(4).Murry J. W. & Hommons, J. O. (1995). Delphi: A versatile methodology for conducting qualitative research. The Review of Higher Education, 18(4), 423-436.Niederman, F., Brancheau, J. C., & Wetherbe, J. C.. (1991). Information systems management issues for the 1990s. MIS Quarterly, 15(4), 474.Bobroff, N., & Mummert,L. (2005). Design and implementation of a resource manager in a distributed database system. Journal of Network and Systems Management, 13(2), 151-174.Drucker P. F. (1994). Post-capitalism Society. US: Harper Paperbacks.Quinn, J. B. & Hilmer, F. G. (1994). Strategic outsourcing. Sloan Management Review, 43-45.Buyya, R.; Chee Shin Yeo; Venugopal, S. (2008). Market-oriented cloud computing: vision, hype, and reality for delivering IT services as computing utilities. 10th IEEE International Conference, 5-13.Rappa, M. A.(2004). The utility business model and the future of computing services. IBM Systems Journal, 43(1), 32-42.King, R. P. & Halim, N. (1991). Management of a remote backup copy for disaster recovery. ACM Transaction on Database Systems, 16(2), 338-368.Rick L. Click & Thomas N. Duening (2004). Business Process Outsourcing – the Competitive Advantage. US: John Wiley & Sons.Schmidt, R. C. (1997). Managing Delphi surveys using nonparametric statistical techniques. Decision Sciences, 28(3), 763-774.Satty, T. L. (1980). The Analytic Hierarchy Process. New York: McGraw-Hill.Satty, T. L. (1990). How to make a decision:The analytic hierarchy process, European Journal of Operational Research, 48(1), 9-26.Tang, C., Lin, M., Huang, E. (2010). The intention of selecting agile System development methodology among new Generation of software developer. 20th International Conference on Pacific Rim Management, ACME.Thain, D., Tannenbaum, T., & Livny, M. (2005). Distributed computing in practice: The condor experience. Concurrency and Computation: Practice and Experience, 17(2‐4), 323-356.Truong, D.. (2010). How cloud computing enhances competitive advantages: A research model for small businesses. The Business Review, Cambridge, 15(1), 59-65.Vaidya, O. S.,& Kumar, S. (2006). Analytic hierarchy process: An overview of applications. European Journal of Operational Research, 169(1), 1-29.Darlagiannis V.,& Mauthe, A., & Steinmetz, R. (2004). Overlay Design Mechanisms for Heterogeneous, Large-Scale, Dynamic P2P Systems. Journal of Network and Systems Management, 12(3), 371-396.Young, R. (2009). Growth Perspective of Information Security. Journal of Information Privacy & Security, 5(4), 51-67.Defining SaaS, PaaS, IaaS, etc. Retrieved from http://cloudfeed.net/2008/06/03/defining-saas-paas-iaas-etc/Cluster (computing). Retrieved from http://en.wikipedia.org/wiki/Cluster_(computing)Grid computing. Retrieved from http://en.wikipedia.org/wiki/Grid_computingLangley, K. (2008, April 24). Cloud Computing: Get Your Head in the Clouds Retrieved from http://www.productionscale.com/home/2008/4/24/cloud-computing-get-your-head-in-the-clouds.htmlDistributed computing. Retrieved from http://en.wikipedia.org/wiki/Distributed_computingIBM.com. Retrieved from http://www.ibm.com/ibm/cloud/Salesforce.com. Retrieved from: http://www.salesforce.com/cloudcomputing Supercomputer. Retrieved from http://en.wikipedia.org/wiki/SupercomputerUtility computing. Retrieved from http://en.wikipedia.org/wiki/Utility_computingWikipedia: Cloud computing. Retrieved from http://en.wikipedia.org/wiki/Cloud_computingWhatis.com. Retrieved from http://searchcloudcomputing.techtarget.com/sDefinition/0,,sid201_gci1287881,00.htmlAngwin, J. & Valentino-Devries, J. (2011, April 22). Apple, Google Collect User Data. Retrieved from http://online.wsj.com/article/SB10001424052748703983704576277101723453610.html zh_TW