簡易檢索 / 詳目顯示

研究生: 任繼亮
Jen, Chi-Liang
論文名稱: ODM廠商知識管理流程與資訊安全機制之研究
指導教授: 陳忠仁
Chen, Chung-Jen
學位類別: 碩士
Master
系所名稱: 管理學院 - 高階管理碩士在職專班(EMBA)
Executive Master of Business Administration (EMBA)
論文出版年: 2005
畢業學年度: 93
語文別: 中文
論文頁數: 109
中文關鍵詞: 資訊安全知識管理
外文關鍵詞: Information Security, Knowledge Management
相關次數: 點閱:67下載:10
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  •   在知識經濟的時代強調的是如何運用資源、速度及整合的能力,創造出具有經濟價值的知識與能力。組織透過學習的方式強化組織的知識與能力並且適應外在的環境變化。這樣的知識與能力是組織重要的資產,所以必須確保在取得與分享過程中,加上適當的保護機制。大多數學者在知識管理相關的研究中,並無深入探究資訊安全所扮演的角色。因此,本研究從知識管理及資訊安全的理論觀點上,試圖找出知識管理與資訊安全之間的關連。在實際探究上,本研究採用個案研究方法,藉由仁寶電腦如何運用知識管理與資訊安全的機制在筆記型電腦研發流程中,並說明知識管理與資訊安全的導入可以提升組織的競爭能力。本文最後討論理論、實務意涵,以及未來研究建議。

     In an era of knowledge economy, it is emphasized how to use the resource, speed and integrated ability, and then created the knowledge and ability with economic worth. Organization has to enhance their knowledge and ability by learning and adapt to the external environmental change. Knowledge and ability are the important assets of organization. So it must be appended the proper protection mechanism in the course of obtaining and sharing. In the research of knowledge management, most of scholars have not deeply studied the role of information security. So, this research is based on the theory views of knowledge management and information security, attempting to find out the relationship of knowledge management and information security. Based on a case study of Compal Electronics, this paper shows how to use knowledge management and information security in the Notebook development process, and explain those can enhance organization competitiveness. It concludes with implications for theory, practice and research.

    目錄 目錄 ………………………………………………………I 表目錄 ……………………………………………………II 圖目錄 ……………………………………………………III 壹、緒論 …………………………………………………1-1 1-1 研究背景與動機 ……………………………………1-1 1-2 研究目的 ……………………………………………1-4 1-3 研究方法與流程 ……………………………………1-5 貳、文獻探討 ……………………………………………2-1 2-1 知識管理相關文獻 …………………………………2-1 2-1.1 知識取得 …………………………………………2-1 2-1.2 知識產生 …………………………………………2-3 2-1.3 知識儲存 …………………………………………2-5 2-1.4 知識分享 …………………………………………2-7 2-2 資訊安全相關文獻 …………………………………2-9 2-2.1 資訊安全相關研究 ………………………………2-9 2-2.2 資訊安全管理系統 ………………………………2-10 2-2.3 風險管理系統 ……………………………………2-12 參、研究方法 ……………………………………………3-1 3-1 研究對象 ……………………………………………3-1 3-2 個案研究方法 ………………………………………3-1 3-3 資料收集 ……………………………………………3-3 3-3.1資料收集原則 ………………………………………3-3 3-3.2資料收集來源 ………………………………………3-4 3-4 資料分析 ……………………………………………3-4 3-5 效度與信度分析 ……………………………………3-4 肆、案例探討 ……………………………………………4-1 4-1 個案公司簡介 ………………………………………4-1 4-1.1公司簡介 …………………………………………4-1 4-1.2案例公司的客戶介紹………………………………4-3 4-1.3案例公司知識管理及資訊安全管理系統緣由……4-4 4-2 專案組織………………………………………………4-8 4-2.1產品研發專案組織…………………………………4-8 4-2.2資訊安全組織………………………………………4-12 4-3 專案流程……………………………………………4-14 4-3.1筆記型電腦開發專案流程…………………………4-14 4-3.2研發資訊安全控管流程……………………………4-15 4-4 知識管理與資訊安全流程…………………………4-21 4-4.1產品定義流程的三大階段…………………………4-21 4-4.1.1產品概念階段……………………………………4-21 4-4.1.2產品市調階段……………………………………4-22 4-4.1.3產品評估階段……………………………………4-24 4-4.2專案執行作業流程的五大階段……………………4-28 4-4.2.1產品規格階段……………………………………4-28 4-4.2.2產品設計階段……………………………………4-31 4-4.2.3產品測試階段……………………………………4-38 4-4.2.4產品驗證階段……………………………………4-41 4-4.2.5量產階段…………………………………………4-44 4-5 結論………………………………………….………4-46 伍、命題發展與討論 ……………………………………5-1 5-1 資訊安全與知識管理的關連性…………………… 5-1 5-2 知識管理與績效的關連 ………………………… 5-4 5-3 資訊安全與績效的關連 …………………………5-6 5-4 知識管理在配合資訊安全的控管下對績效的關連 …………… 5-8 陸、結論與建議 ………………………………………6-1 6-1研究結論……………………………………………6-1 6-1.1知識管理與資訊安全管理系統…………………6-1 6-1.2研究命題結論……………………………………6-2 6-2建議…………………………………………………6-2 6-3 研究貢獻 …………………………………………6-3 6-4研究限制及未來研究 ……………………………6-3 參考文獻 表目錄 表3-1 不同研究方法的適用情況 ……………………3-2 表3-2 效度與信度分析彙總表 ………………………3-5 表4-1 仁寶電腦基本資料表 …………………………4-2 表4-2 五大營運中心現況表 …………………………4-2 表4-3 全球筆記型電腦出貨量及仁寶全球市佔率表 ……4-2 表4-4 仁寶近五年的營收、稅後淨利、每股盈餘比較表 ………4-3 表4-5 筆記型電腦5大客戶比較表…………………… 4-4 表4-6 資訊資產分類分級表 …………………………4-10 表4-7 資訊安全事件處理作業程序表 ………………4-18 表4-8 產品概念階段知識管理流程 …………………4-21 表4-9 產品概念階段資訊安全機密資料彙總 ……… 4-22 表4-10 產品市調階段知識管理流程 …………………4-23 表4-11 產品市調階段資訊安全機密資料彙總………4-23 表4-12 產品評估階段知識管理流程 …………………4-25 表4-13 產品評估階段資訊安全機密資料彙總…………4-27 表4-14 產品規格階段知識管理流程 …………………4-29 表4-15 產品規格階段資訊安全機密資料彙總…………4-30 表4-16 產品設計知識管理流程 ………………………4-33 表4-17 產品設計資訊安全機密資料彙總………………4-33 表4-18 產品設計階段知識管理流程 …………………4-36 表4-19 產品設計驗證資訊安全機密資料彙總…………4-37 表4-20 產品測試階段知識管理流程 …………………4-39 表4-21 產品測試階段資訊安全機密資料彙總…………4-40 表4-22 產品驗證階段知識管理流程 …………………4-42 表4-23 產品驗證階段資訊安全機密資料彙總…………4-43 表4-24 量產階段知識管理流程 ………………………4-44 表4-25 量產階段資訊安全機密資料彙總………………4-45 表4-26 產品定義流程中知識管理四階段與資訊安全的優缺點 ……… 4-51 圖目錄 圖1-1 研究流程 ………………………………………1-5 圖2-1 PDCA模型 ………………………………………2-12 圖2-2 資訊安全管理系統風險關係示意………………2-14 圖2-3 風險管理流程 …………………………………2-16 圖4-1 產品研發專案組織 ……………………………4-8 圖4-2 資訊安全組織 …………………………………4-13 圖4-3 資訊安全管理文件體系 ………………………4-13 圖4-4 產品定義流程的三大階段 ……………………4-14 圖4-5 專案執行作業流程的五大階段 ………………4-15 圖4-6 產品概念階段知識管理及資訊安全流程圖……4-22 圖4-7 產品市調階段知識管理及資訊安全流程圖……4-24 圖4-8 產品評估階段知識管理及資訊安全流程圖……4-28 圖4-9 產品規格階段知識管理及資訊安全流程圖……4-31 圖4-10 產品設計知識管理及資訊安全流程圖…………4-35 圖4-11 產品設計驗證知識管理及資訊安全流程圖……4-38 圖4-12 產品測試階段知識管理及資訊安全流程圖……4-41 圖4-13 產品驗證階段知識管理及資訊安全流程圖……4-43 圖4-14 量產階段知識管理及資訊安全流程圖…………4-45 圖4-15 在研發流程階段中文件取得的重要程度 ……4-47 圖4-16 在研發流程階段中產生知識的重要程度………4-47 圖4-17 在研發流程階段中知識儲存的等級程度………4-48 圖4-18 在研發流程階段中知識分享的範圍程度………4-49 圖5-1 知識管理、資訊安全及營運績效的命題架構……5-9 圖5-2 知識管理、資訊安全及創新績效的命題架構……5-9

    英文期刊:
    Argote, L. 1999. Organizational learning: Creating, retaining and transferring knowledge. Boston: Kluwer Academic Publishers.
    Armistead, C. 1999. Knowledge management and process performance. Journal of Knowledge Management, 3(2): 143-154.
    Baladi, P. 1999. Knowledge and competence management: Ericsson business consulting. Business strategy Review, 10(4): 20-28.
    Bixler, C. H. 2000. Creating a dynamic knowledge management maturity continuum for increased enterprise performance and innovation. Doctoral Dissertation. Engineering Management and Systems Engineering, The George Washington University, Washington, DC.
    Björkman, I., Barner-Rasmussen, W., & Li, L. 2004. Managing knowledge transfer in MNCs: The impact of headquarters control mechanisms. Journal of International Business Studies, 35: 443-455.
    Bonora, E, A., & Revang. 1991. A Strategic Framework for Analyzing Professional Service Firms-Development Strategies for Sustained Performance. Strategic Management Society Interorganizational Conference, Toronto, Canada.
    Brand, A. 1998. Knowledge management and innovation at 3M. Journal of Knowledge Management, 2(1): 17-22.
    British Standard, Part 1 .1999. Information security management.
    Buniyamin, N., & Barber, K. D. 2004. The intranet: A platform for knowledge management system based on knowledge mapping. International Journal of Technology Management, 28(7/8): 729-746.
    Chen, C.-J. 2004. The effects of knowledge attribute, alliance characteristics, and absorptive capacity on knowledge transfer performance. R&D Management, 34(3): 311-321.
    Chen, C.-J., & Lin, B.-W. 2004. The effects of environment, knowledge attribute, organizational climate, and firm characteristics on knowledge sourcing decisions. R&D Management, 34(2): 137-146.
    Clark, K., & Wheelwright, S. C. 1993. Managing New Product and Process Development. Free Press, NY, pp. 457–480.
    Conner, K. R., & Prahalad, C. K. 1996. A resource-based theory of the firm: Knowledge versus opportunism. Organization Science, 7(5): 477-501.
    Cross, R. & Baird, L. 2000. Technology is not enough: Improving performance by building organizational memory. Sloan Management Review, 41(i3): 69-78.
    Davenport, T. H. 1999. Some Principles of Knowledge Management.
    Desouza, K. C., & Vanapalli, G. K. 2005. Securing knowledge in organizations: Lessons from the defense and intelligence sectors. International Journal of Information Management, 25: 85-98.
    Dimitris, A. G. 2004. Embedding privacy in IT applications development. Information Management & Computer Security, 12(1): 8-26.
    Eisenhardt, K. M. 1989. Building theories from case study research. Academy of Management Review, 14(4): 532-550.
    Farmer, S. M., Tierney, P., & Kung-Mcintyre, K. 2003. Employee creativity in Taiwan: An application of role identity theory. Academy of Management Journal, 46(5): 618-630.
    Grant, R. M. 1996. Prospering in dynamically competitive environments: Organizational capability as knowledge integration. Organization Science, 7: 375-387.
    Haas, M. R., & Hansen, M. T. 2005. When using knowledge can hurt performance: The value of organizational capabilities in a management consulting company. Strategic Management Journal, 26: 1-24.
    Hemmert, M. 2004. The influence of institutional factors on the technology acquisition performance of high-tech firms: Survey results from Germany and Japan. Research Policy, 33: 1019-1039.
    Hult, G. T., Ketchen, D. J., & Slater, S. F. 2004. Information processing, knowledge development, and strategic supply chain performance. Academy of Management Journal, 47(2): 241-253.
    ISO/IEC 13335-1 (2000). Information technology --- Guidelines for Management of IT Security, International Organization for Standardization
    ISO/IEC 17799:2000 (2000). Information technology --- Code of Practice for Information Security Management, International Organization for Standardization
    Jensen, R., & Szulanski, G. 2004. Stickiness and the adaptation of organizational practices in cross-border knowledge transfers. Journal of international Business studies, 35: 508-523.
    Kogut, B., & Zander, U. 1992. Knowledge of the firm, combinative capabilities, and the replication of technology. Organization Science, 3: 383-397.
    Kregg, A., & Terry, C. 2004. Computer Security and Risky Computing Practices: A Rational Choice Perspective. Journal of Organizational and End User Computing, 16: 22-40.
    Krogh, G. V., Nonaka, I., & Aben, M. 2001. Making the most of your company’s knowledge: A strategic framework. Long Range Planning, 34: 421-439.
    Ler, W. L. 1999. Business@ the speed of though: using a digital nervous system. Business Journal, ROC.
    Levitt, B. & March, J. G. 1988. Organizational Learning. Annual Review of Sociology, 14: 319-340.
    Liebowitz, J., & Wright, K. 1999. Does measuring knowledge make ‘cents’ ? Expert Systems with Applications, 17(2): 99-103.
    Liu, P.-L., Chen, W.-C., & Tsai, C.-H. 2004. An empirical study on the correlation between knowledge management capability and competitiveness in Taiwan’s industries. Technovation, 24: 971-977.
    Malhotra, Y. 2000. Global knowledge management in e-economy. (Industry Trend or Event). Journal of Global Information Management, 8(3): 3-4.
    McFadyen, M. A., & Cannella, A. A. 2004. Social capital and knowledge creation : Diminishing returns of the number and strength of exchange relationships. Academy of Management Journal, 47(5): 735-746.
    Minbaeva, D., Pedersen, T., Björkman, I., Fey, C. F., & Park, H. J. 2003. MNC knowledge transfer, subsidiary absorptive capacity, and HRM. Journal of International Business Studies, 34: 586-599.
    Moorman, C. 1995. Organizational market information processes: cultural antecedents and new product outcomes. Journal of Marketing Research, (August), 318–335.
    Nonaka, I. & Konno, N. 1998. The Concept of “Ba”: Building a Foundation for Knowledge Creation. California Management Review, 40(3): 40-54.
    Nonaka, I., & Takeuchi, H. 1995. The Knowledge-Creating Company. Oxford University Press: New York.
    Norman, P. M. 2004. Knowledge acquisition, knowledge loss, and satisfaction in high technology alliances. Journal of Business Research, 57:610-610.
    Peterson, B., Brown, M., & Maw, R. 2002. Information security in outsourcing agreements. http://www.outsourcing-journal.com/issues/mar2002/legal.html. Accessed in March 2002.
    Quinn, J. B. 1992. Intelligent Enterprise: A Knowledge and Service Based Paradigm for Industry. New York: Free Press.
    Ragin, C. C. 1987. The comparative methods. Los Angeles: University of California Press.
    Ritter, T., & Gemünden, H. G. 2004. The impact of a company’s business strategy on its technological competence, network competence and innovation success. Journal of Business Research, 57: 548-556.
    Ritter, T., & Gemünden, H. G. 2003.Network competence: Its impact on innovation success and its antecedents. Journal of Business Research, 56: 745-755.
    Rodan, S., & Galunic, C. 2004. More than network structure: How knowledge heterogeneity influences managerial performance and innovativeness. Strategic Management Journal, 25: 541-562.
    Scott, S. G., & Bruce, R. A. 1994. Determinants of innovative behavior: A path model of individual innovation in the workplace. Academy of Management Journal, 37(3): 580-607.
    Simonin, B. L. 1999. Ambiguity and the process of knowledge transfer in strategic alliances. Strategic Management Journal, 20: 595-623.
    Sodiya, A. S., Longe, H. O. D., & Akinwale, A. T. 2004. A new two-tiered strategy to intrusion detection. Information Management & Computer Security, 12(1): 27-44.
    Spencer, J. W. 2003. Firm’s knowledge-sharing strategies in the global innovation system: Empirical evidence from the flat panel display industry. Strategic Management Journal, 24: 217-233.
    Stein, E. W. 1995. Organizational memory: Review of concepts and recommendations for management. International Journal of Information Management, 15: 17-32.
    Teece, D. J., Pisano, G., & Shuen, A. 1997. Dynamic capabilities and strategic management. Strategic Management Journal, 18(7), 509–533.
    Teece, D. J., & Pisano, G. 1994. The dynamic capabilities of firms: an introduction. Industrial and Corporate Change, 3(3): 537–556.
    Tiwana, A. 2000. The knowledge management toolkit: Practical techniques for building a knowledge management system. Prentice Hall PTR.
    Tsang, E. W. K. 2002. Acquiring knowledge by foreign partners from international joint ventures in a transition economy: Learning-by-doing and learning myopia. Strategic Management Journal, 23: 835-854.
    Tsai, W. 2002. Social structure of “coopetition” within a multiunit organization: Coordination, competition, and intraorganizational knowledge sharing. Organization Science, 13(2): 179-190.
    Tsai, W. 2001. Knowledge transfer in intraorganizational networks: Effects of network position and absorptive capacity on business unit innovation and performance. Academy of Management Journal, 44(5): 996-1004.
    Wang, P., Tong, T. W., & Koh, C. P. 2004. An integrated model of knowledge transfer from MNC parent to China subsidiary. Journal of World Business, 39: 168-182.
    Wiig, K. M. 1995. Knowledge management foundations-thinking about thinking-how people and organizations create, represent, and use knowledge. Schema Press Arlington, Texas.
    Wiig, K. M. 1997. Knowledge management: An introduction and perspectative. Journal of Knowledge Management, 1(1): 6.
    Winter, S. 1987. Knowledge and Competence as Strategic Assets. The Competitive Challenge: Strategies for Industrial Innovation and Renewal D. Teece (ed.), Cambridge, MA: Ballinger.
    Yin, R. K. 1994. Case study research: Design and methods. Sage, London, CA, 2nd Ed.
    Yin, R. K., Bateman, P. G., Moore, G. B. 1983. Case studies and organizational innovation: Strengthening the connection. Washington, DC: COSMOS Corporation.
    Yli-Renko, H., Autio, E., & Sapienza, H. J. 2001. Social capital, knowledge acquisition, and knowledge exploitation in young technology-based firms. Strategic Management Journal, 22: 587-613.
    Young, G., Sapienza, H., & Baumer, D. 2003. The influence of flexibility in buyer-seller relationships on the productivity of knowledge. Journal of business Research, 56: 443-451.
    其他
    AS/NZS 4360:2004 (2004), Risk Management, Standards Australia and Standards New Zealand.
    BS 7799-2:2002 (2002). Information security management systems --- Specification with guidance for use, British Standards Institution.
    2001 CSI/FBI Computer Crime and Security Survey, Computer Security Institute.
    2002 CSI/FBI Computer Crime and Security Survey, Computer Security Institute.
    2003 CSI/FBI Computer Crime and Security Survey, Computer Security Institute.
    2004 CSI/FBI Computer Crime and Security Survey, Computer Security Institute.

    下載圖示 校內:2006-09-06公開
    校外:2006-09-06公開
    QR CODE