| 研究生: |
任繼亮 Jen, Chi-Liang |
|---|---|
| 論文名稱: |
ODM廠商知識管理流程與資訊安全機制之研究 |
| 指導教授: |
陳忠仁
Chen, Chung-Jen |
| 學位類別: |
碩士 Master |
| 系所名稱: |
管理學院 - 高階管理碩士在職專班(EMBA) Executive Master of Business Administration (EMBA) |
| 論文出版年: | 2005 |
| 畢業學年度: | 93 |
| 語文別: | 中文 |
| 論文頁數: | 109 |
| 中文關鍵詞: | 資訊安全 、知識管理 |
| 外文關鍵詞: | Information Security, Knowledge Management |
| 相關次數: | 點閱:67 下載:10 |
| 分享至: |
| 查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報 |
在知識經濟的時代強調的是如何運用資源、速度及整合的能力,創造出具有經濟價值的知識與能力。組織透過學習的方式強化組織的知識與能力並且適應外在的環境變化。這樣的知識與能力是組織重要的資產,所以必須確保在取得與分享過程中,加上適當的保護機制。大多數學者在知識管理相關的研究中,並無深入探究資訊安全所扮演的角色。因此,本研究從知識管理及資訊安全的理論觀點上,試圖找出知識管理與資訊安全之間的關連。在實際探究上,本研究採用個案研究方法,藉由仁寶電腦如何運用知識管理與資訊安全的機制在筆記型電腦研發流程中,並說明知識管理與資訊安全的導入可以提升組織的競爭能力。本文最後討論理論、實務意涵,以及未來研究建議。
In an era of knowledge economy, it is emphasized how to use the resource, speed and integrated ability, and then created the knowledge and ability with economic worth. Organization has to enhance their knowledge and ability by learning and adapt to the external environmental change. Knowledge and ability are the important assets of organization. So it must be appended the proper protection mechanism in the course of obtaining and sharing. In the research of knowledge management, most of scholars have not deeply studied the role of information security. So, this research is based on the theory views of knowledge management and information security, attempting to find out the relationship of knowledge management and information security. Based on a case study of Compal Electronics, this paper shows how to use knowledge management and information security in the Notebook development process, and explain those can enhance organization competitiveness. It concludes with implications for theory, practice and research.
英文期刊:
Argote, L. 1999. Organizational learning: Creating, retaining and transferring knowledge. Boston: Kluwer Academic Publishers.
Armistead, C. 1999. Knowledge management and process performance. Journal of Knowledge Management, 3(2): 143-154.
Baladi, P. 1999. Knowledge and competence management: Ericsson business consulting. Business strategy Review, 10(4): 20-28.
Bixler, C. H. 2000. Creating a dynamic knowledge management maturity continuum for increased enterprise performance and innovation. Doctoral Dissertation. Engineering Management and Systems Engineering, The George Washington University, Washington, DC.
Björkman, I., Barner-Rasmussen, W., & Li, L. 2004. Managing knowledge transfer in MNCs: The impact of headquarters control mechanisms. Journal of International Business Studies, 35: 443-455.
Bonora, E, A., & Revang. 1991. A Strategic Framework for Analyzing Professional Service Firms-Development Strategies for Sustained Performance. Strategic Management Society Interorganizational Conference, Toronto, Canada.
Brand, A. 1998. Knowledge management and innovation at 3M. Journal of Knowledge Management, 2(1): 17-22.
British Standard, Part 1 .1999. Information security management.
Buniyamin, N., & Barber, K. D. 2004. The intranet: A platform for knowledge management system based on knowledge mapping. International Journal of Technology Management, 28(7/8): 729-746.
Chen, C.-J. 2004. The effects of knowledge attribute, alliance characteristics, and absorptive capacity on knowledge transfer performance. R&D Management, 34(3): 311-321.
Chen, C.-J., & Lin, B.-W. 2004. The effects of environment, knowledge attribute, organizational climate, and firm characteristics on knowledge sourcing decisions. R&D Management, 34(2): 137-146.
Clark, K., & Wheelwright, S. C. 1993. Managing New Product and Process Development. Free Press, NY, pp. 457–480.
Conner, K. R., & Prahalad, C. K. 1996. A resource-based theory of the firm: Knowledge versus opportunism. Organization Science, 7(5): 477-501.
Cross, R. & Baird, L. 2000. Technology is not enough: Improving performance by building organizational memory. Sloan Management Review, 41(i3): 69-78.
Davenport, T. H. 1999. Some Principles of Knowledge Management.
Desouza, K. C., & Vanapalli, G. K. 2005. Securing knowledge in organizations: Lessons from the defense and intelligence sectors. International Journal of Information Management, 25: 85-98.
Dimitris, A. G. 2004. Embedding privacy in IT applications development. Information Management & Computer Security, 12(1): 8-26.
Eisenhardt, K. M. 1989. Building theories from case study research. Academy of Management Review, 14(4): 532-550.
Farmer, S. M., Tierney, P., & Kung-Mcintyre, K. 2003. Employee creativity in Taiwan: An application of role identity theory. Academy of Management Journal, 46(5): 618-630.
Grant, R. M. 1996. Prospering in dynamically competitive environments: Organizational capability as knowledge integration. Organization Science, 7: 375-387.
Haas, M. R., & Hansen, M. T. 2005. When using knowledge can hurt performance: The value of organizational capabilities in a management consulting company. Strategic Management Journal, 26: 1-24.
Hemmert, M. 2004. The influence of institutional factors on the technology acquisition performance of high-tech firms: Survey results from Germany and Japan. Research Policy, 33: 1019-1039.
Hult, G. T., Ketchen, D. J., & Slater, S. F. 2004. Information processing, knowledge development, and strategic supply chain performance. Academy of Management Journal, 47(2): 241-253.
ISO/IEC 13335-1 (2000). Information technology --- Guidelines for Management of IT Security, International Organization for Standardization
ISO/IEC 17799:2000 (2000). Information technology --- Code of Practice for Information Security Management, International Organization for Standardization
Jensen, R., & Szulanski, G. 2004. Stickiness and the adaptation of organizational practices in cross-border knowledge transfers. Journal of international Business studies, 35: 508-523.
Kogut, B., & Zander, U. 1992. Knowledge of the firm, combinative capabilities, and the replication of technology. Organization Science, 3: 383-397.
Kregg, A., & Terry, C. 2004. Computer Security and Risky Computing Practices: A Rational Choice Perspective. Journal of Organizational and End User Computing, 16: 22-40.
Krogh, G. V., Nonaka, I., & Aben, M. 2001. Making the most of your company’s knowledge: A strategic framework. Long Range Planning, 34: 421-439.
Ler, W. L. 1999. Business@ the speed of though: using a digital nervous system. Business Journal, ROC.
Levitt, B. & March, J. G. 1988. Organizational Learning. Annual Review of Sociology, 14: 319-340.
Liebowitz, J., & Wright, K. 1999. Does measuring knowledge make ‘cents’ ? Expert Systems with Applications, 17(2): 99-103.
Liu, P.-L., Chen, W.-C., & Tsai, C.-H. 2004. An empirical study on the correlation between knowledge management capability and competitiveness in Taiwan’s industries. Technovation, 24: 971-977.
Malhotra, Y. 2000. Global knowledge management in e-economy. (Industry Trend or Event). Journal of Global Information Management, 8(3): 3-4.
McFadyen, M. A., & Cannella, A. A. 2004. Social capital and knowledge creation : Diminishing returns of the number and strength of exchange relationships. Academy of Management Journal, 47(5): 735-746.
Minbaeva, D., Pedersen, T., Björkman, I., Fey, C. F., & Park, H. J. 2003. MNC knowledge transfer, subsidiary absorptive capacity, and HRM. Journal of International Business Studies, 34: 586-599.
Moorman, C. 1995. Organizational market information processes: cultural antecedents and new product outcomes. Journal of Marketing Research, (August), 318–335.
Nonaka, I. & Konno, N. 1998. The Concept of “Ba”: Building a Foundation for Knowledge Creation. California Management Review, 40(3): 40-54.
Nonaka, I., & Takeuchi, H. 1995. The Knowledge-Creating Company. Oxford University Press: New York.
Norman, P. M. 2004. Knowledge acquisition, knowledge loss, and satisfaction in high technology alliances. Journal of Business Research, 57:610-610.
Peterson, B., Brown, M., & Maw, R. 2002. Information security in outsourcing agreements. http://www.outsourcing-journal.com/issues/mar2002/legal.html. Accessed in March 2002.
Quinn, J. B. 1992. Intelligent Enterprise: A Knowledge and Service Based Paradigm for Industry. New York: Free Press.
Ragin, C. C. 1987. The comparative methods. Los Angeles: University of California Press.
Ritter, T., & Gemünden, H. G. 2004. The impact of a company’s business strategy on its technological competence, network competence and innovation success. Journal of Business Research, 57: 548-556.
Ritter, T., & Gemünden, H. G. 2003.Network competence: Its impact on innovation success and its antecedents. Journal of Business Research, 56: 745-755.
Rodan, S., & Galunic, C. 2004. More than network structure: How knowledge heterogeneity influences managerial performance and innovativeness. Strategic Management Journal, 25: 541-562.
Scott, S. G., & Bruce, R. A. 1994. Determinants of innovative behavior: A path model of individual innovation in the workplace. Academy of Management Journal, 37(3): 580-607.
Simonin, B. L. 1999. Ambiguity and the process of knowledge transfer in strategic alliances. Strategic Management Journal, 20: 595-623.
Sodiya, A. S., Longe, H. O. D., & Akinwale, A. T. 2004. A new two-tiered strategy to intrusion detection. Information Management & Computer Security, 12(1): 27-44.
Spencer, J. W. 2003. Firm’s knowledge-sharing strategies in the global innovation system: Empirical evidence from the flat panel display industry. Strategic Management Journal, 24: 217-233.
Stein, E. W. 1995. Organizational memory: Review of concepts and recommendations for management. International Journal of Information Management, 15: 17-32.
Teece, D. J., Pisano, G., & Shuen, A. 1997. Dynamic capabilities and strategic management. Strategic Management Journal, 18(7), 509–533.
Teece, D. J., & Pisano, G. 1994. The dynamic capabilities of firms: an introduction. Industrial and Corporate Change, 3(3): 537–556.
Tiwana, A. 2000. The knowledge management toolkit: Practical techniques for building a knowledge management system. Prentice Hall PTR.
Tsang, E. W. K. 2002. Acquiring knowledge by foreign partners from international joint ventures in a transition economy: Learning-by-doing and learning myopia. Strategic Management Journal, 23: 835-854.
Tsai, W. 2002. Social structure of “coopetition” within a multiunit organization: Coordination, competition, and intraorganizational knowledge sharing. Organization Science, 13(2): 179-190.
Tsai, W. 2001. Knowledge transfer in intraorganizational networks: Effects of network position and absorptive capacity on business unit innovation and performance. Academy of Management Journal, 44(5): 996-1004.
Wang, P., Tong, T. W., & Koh, C. P. 2004. An integrated model of knowledge transfer from MNC parent to China subsidiary. Journal of World Business, 39: 168-182.
Wiig, K. M. 1995. Knowledge management foundations-thinking about thinking-how people and organizations create, represent, and use knowledge. Schema Press Arlington, Texas.
Wiig, K. M. 1997. Knowledge management: An introduction and perspectative. Journal of Knowledge Management, 1(1): 6.
Winter, S. 1987. Knowledge and Competence as Strategic Assets. The Competitive Challenge: Strategies for Industrial Innovation and Renewal D. Teece (ed.), Cambridge, MA: Ballinger.
Yin, R. K. 1994. Case study research: Design and methods. Sage, London, CA, 2nd Ed.
Yin, R. K., Bateman, P. G., Moore, G. B. 1983. Case studies and organizational innovation: Strengthening the connection. Washington, DC: COSMOS Corporation.
Yli-Renko, H., Autio, E., & Sapienza, H. J. 2001. Social capital, knowledge acquisition, and knowledge exploitation in young technology-based firms. Strategic Management Journal, 22: 587-613.
Young, G., Sapienza, H., & Baumer, D. 2003. The influence of flexibility in buyer-seller relationships on the productivity of knowledge. Journal of business Research, 56: 443-451.
其他
AS/NZS 4360:2004 (2004), Risk Management, Standards Australia and Standards New Zealand.
BS 7799-2:2002 (2002). Information security management systems --- Specification with guidance for use, British Standards Institution.
2001 CSI/FBI Computer Crime and Security Survey, Computer Security Institute.
2002 CSI/FBI Computer Crime and Security Survey, Computer Security Institute.
2003 CSI/FBI Computer Crime and Security Survey, Computer Security Institute.
2004 CSI/FBI Computer Crime and Security Survey, Computer Security Institute.