簡易檢索 / 詳目顯示

研究生: 陳品元
Chen, Pin-Yuan
論文名稱: 本體論為基之虛擬企業知識分享研究
On Ontology-based Knowledge Sharing in Virtual Enterprises
指導教授: 陳裕民
Chen, Yuh-Min
學位類別: 碩士
Master
系所名稱: 電機資訊學院 - 製造工程研究所
Institute of Manufacturing Engineering
論文出版年: 2008
畢業學年度: 96
語文別: 中文
論文頁數: 93
中文關鍵詞: 信任模糊邏輯虛擬企業知識分享本體論
外文關鍵詞: Virtual Enterprise, Ontology, Fuzzy, Trust, Knowledge Sharing
相關次數: 點閱:58下載:2
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • 虛擬企業(Virtual Enterprise)為新興的企業經營策略,其核心係透過企業聯盟整合企業間的資源與價值活動,以快速反應市場變化與客戶需求。虛擬企業的運作多在一合理化、協同化的作業程序下,運用網路與資訊技術,共用與分享資訊與知識資源,並藉由溝通、協調與合作,來整合地、協同地進行產品生命週期各階段活動或提供服務。因此虛擬企業的成敗繫於企業間資源、資訊與知識有效整合與分享,而資訊與知識分享須考量虛擬企業流程、知識種類、角色權限及企業間的信任等因素。因此,建立一能適應此複雜環境的知識分享方法,為虛擬企業的重要課題之ㄧ。
    本研究目的在發展一「本體論為基之虛擬企業知識分享方法」,以有效整合分散在各聯盟企業的知識,使虛擬企業成員依其角色、權限即時取得與工作相關之知識。針對研究目標,本研究之主要研究項目包括:(1)虛擬企業流程分析、(2)虛擬企業知識界定與特性分析、(3)虛擬企業知識分享模型建構、(4)虛擬企業知識表達模型建構及(5)虛擬企業知識分享方法設計。本研究之成果將使虛擬企業之知識能有效的在成員間交流與分享,進而提升整體競爭力。

    Virtual enterprising is viewed as one of the most promising business strategies for manufacturing industries to meet global competition. The essence of virtual enterprising is to integrate the processes, activities, and resources from different enterprises through enterprise alliance to quickly respond to customer expectations. The success of virtual enterprising is heavily dependent on the effective sharing of knowledge across enterprises.The roles, authorities, business processes, knowledge classification and trust between enterprises are the important factors considering in knowledge sharing. To develop knowledge sharing method to support virtual enterprising becomes one of the issues of virtual enterprises.
    This study proposed a knowledge sharing approach based on ontology to integrate knowledge from allied enterprises and facilitate knowledge sharing on the bases of roles, authorities and trust. Research tasks involved in this research include (i) analyzing and identifying the characteristics of knowledge for VE, (ii) designing a knowledge sharing model, (iii)designing a multiple-layer knowledge structure model, and (iv) developing techniques for knowledge sharing. The result of this study will facilitate knowledge sharing and enhances global competitiveness of VE.

    第一章 緒論.........................................1 1.1 研究背景........................................1 1.2 研究動機........................................1 1.3 研究目的........................................2 1.4 問題分析........................................2 1.5 研究項目與方法..................................3 1.6 研究步驟........................................5 1.7 論文架構........................................6 第二章 文獻探討.....................................7 2.1 虛擬企業........................................7 2.1.1 虛擬企業定義..................................7 2.1.2 虛擬企業特性..................................7 2.1.3 虛擬企業生命週期..............................9 2.2 知識管理與知識分享.............................10 2.2.1 知識之定義與分類.............................10 2.2.2 知識管理定義與程序...........................12 2.2.3 知識分享.....................................14 2.3 存取控制.......................................15 2.4 本體論.........................................16 2.4.1 本體論定義與類型.............................16 2.4.2 本體論特性...................................17 2.4.3 本體論語言...................................17 2.5 模糊邏輯.......................................19 2.5.1 模糊集合與歸屬函數...........................19 2.5.2 模糊集合之運算...............................21 2.5.3 解模糊化.....................................22 第三章 虛擬企業知識分享模式分析與設計..............23 3.1 虛擬企業流程分析...............................23 3.2 虛擬企業知識界定與分析.........................24 3.3 虛擬企業知識分享模式...........................27 3.4 虛擬企業知識架構設計...........................28 3.4.1 虛擬企業知識架構.............................29 3.4.2 虛擬企業活動本體.............................30 3.4.3 虛擬企業活動知識本體.........................33 3.4.4 知識實體層...................................35 第四章 虛擬企業知識分享程序設計....................36 4.1 虛擬企業知識分享程序...........................36 4.2 虛擬企業知識分享廣度評估模式...................37 4.3 虛擬企業知識分享深度評估模式...................48 4.3.1 虛擬企業角色模型.............................48 4.3.2 虛擬企業知識分享深度評估模式設計.............50 4.4 虛擬企業知識分享信任評估模式...................59 4.4.1 虛擬企業知識分享信任模式.....................59 4.4.2 虛擬企業知識分享信任評估模式設計.............61 第五章 實例模擬與驗證..............................69 5.1 虛擬企業知識分享廣度評估模擬...................69 5.2 知識分享深度評估模擬...........................78 5.3 知識分享信任評估模擬...........................81 第六章 結論與未來研究方向..........................85 6.1 結論...........................................85 6.2 未來研究方向...................................86 參考文獻...........................................87

    [1]Allee, V., “The Knowledge Evolution: Expanding Organizational Intelligence”, Butterworth-Heinemann, Boston, 1997.
    [2]Amoroso, E., “Fundamentals of computer security technology”, Prentice-Hall, USA, 1994.
    [3]Arthur Andersen Business Consulting, “Zukai Knowledge Management”, Tokyo Keizai, Tokyo, 1999.
    [4]Asuncion, Gomez-Perez., Oscar, Corcho., Mariano, Fernandez-Lopez., “Ontological Engineering: with examples from the areas of Knowledge Management, e-Commerce and the Semantic Web”, Springer, New York, 2004.
    [5]Au, R., Looi, M., & Ashley, P., “Automated cross-organizational trust establishment on extranets”, Proceeding of workshop on Information Technology for Virtual Enterprise, Australia, 2001.
    [6]Beckman, T., “A Methodology for Knowledge Management”, International Association of Science and Technology for Development AI and Soft Computing Conference, Brooking, Annie, 1999.
    [7]Birgit, Renzl., “Trust in management and knowledge sharing:The mediating effects of fear and Knowledge documentation”, Omega, Volume 36, Issue 2, pp.206-220, 2008.
    [8]Chen, K.Y., “A method of hierarchical case representation in case-based reasoning" , Artificial Intelligent Laboratory, Electrical Engineering Department of National Chung Cheng University. June, 2000.
    [9]Daconta, M.C., Obrst, L.J. and Smith, K.T., “The Semantic Web: A Guide to the Future of XML, Web Services, and Knowledge Management”, Wiley Publishing, Indiana, 2003.
    [10]Davenport, T. H., Prusak, L., “Working Knowledge: How Organization Manage What They Know”, Harvard Business School, Boston, 1998.
    [11]Davidow, W. H., “The Virtual Corporation”, Harper Collins Publishing Inc., New York, 1992.
    [12]Elizabeth J. Chang, Farookh Khadeer Hussain, Tharam S. Dillon., “Fuzzy nature of trust and dynamic trust modeling in service oriented environments”, Workshop On Secure Web Services Proceedings of the 2005 workshop on Secure web services, Fairfax, VA, USA, p75-83, 2005.
    [13]FIPS 183, “Integration Definition for Information Modeling (IDEF 0). ”, National Institute of Standards and Technology, 1993.
    [14]Fla´ via Maria Santoro a, Marcos R.S. Borges b, Erick A. Rezende ,, “Collaboration and knowledge sharing in network organizations”, Expert Systems with Applications Volume 31 ,pp715–727, 2006.
    [15]Frust, K., Schmidt, t., and Wippel, G.., “Managing Access in Extend Enterprise Networks,” IEEE Internet Computing, p224-274, 2001.
    [16]Geir Agnarsson, Raymond Greenlaw, “Graph Theory: Modeling, Applications, and Algorithms”, Prentice Hall, Harlow, 2007.
    [17]Guha, S., Rastogi, R., Shim, k., “Cure:An Efficient clustering algorithm for large database”, ACM SIGMOD International Conference on Management of Data, Seattle, Washington, USA, pp. 73-84, 1998.
    [18]Guarino, N., “Understanding, Building and Using Ontologies, ” International Journal of Human and Computer Studies, 46(2/3), 293-310, 1997。
    [19]Handy, C. “Trust and Virtual Organization: How Do You Manage People Whom You Do Not See”, Harvard Business Review, Vol.73, No.2, pp.40-50, 1995.
    [20]Hansen M. T., Nohria N., and Tierney T. “What’s your strategy for managing knowledge?”, Harvard Business Review, 77(2), pp106-116, 1999.
    [21]Hendriks, P., “Why share knowledge? The influence of ICT on Motivation for knowledge sharing”, Knowledge and Process Management, 6(2), pp.91-100, 1999.
    [22]Gido, Jack., James P. Clements, “Successful Project Management”, South-Western, Cincinnati, Inc, 2003.
    [23]Gollmann, D., “COMPUTER SECURITY”, John Wiley & Sons, Cambridge, UK, 1999.
    [24]Jae-Nam Lee., “The impact of knowledge sharing, organizational capability and partnership quality on IS outsourcing success”, Information and Management, Volume 38, Issue 5, pp.323 - 335, 2001.
    [25]Jarvenpaa,S.L., Ives,B., “The Global Network Organization of the Future: Information Management Opportunities” ,Journal of Management of Information System, Spring, 1994
    [26]Kern, A., “Advanced features for enterprise-wide role-base access control”, Computer Security Applications Conference, pp.333-342, 2002.
    [27]Laurie J.,”Harnessing the power of intellectual capital”, Training & Development,. Vol.51, No.12, p.25-30., 1997
    [28]Leonard-Barton, Dorothy, “Wellsprings of Knowledge", Harvard Business School Press, Masachusetts, 1995.
    [29]Michael Negnevitsky, “Artificial Intelligence-A Guide to Intelligent Systems 2nd Editon”, Addison-Wesley, UK, 2005.
    [30]Musen, M.A., “Ontology-Oriented Design and Programming”, Knowledge Engineering and Agent Technology, 2000.
    [31]Natalya F. Noy and Deborah L. McGuinness, “Ontology Development 101: A Guide to Creating Your First Ontology”, Stanford Medical Informatics Technical Report SMI-2001-0880, 2001.
    [32]Nonaka, I., and Takeuchi, H., “The knowledge creating company:how japanese companies Ccreate the dynamics of innovation”,Oxford University Press, New York,USA,1995.
    [33]Nonaka, I. “A Dynamic theory of organizational knowledge creation”, Organization Science(5:10), pp.14-37,1994.
    [34]Probst et al., “Managing Knowledge-Building Block for Success”,John wiley & Sons Ltd, England, 2000.
    [35]Quinn, J. B., P. Anderson and S. Finkelstein “Managing Professional Intellect:Making the Most of the Best, Harvard Business Review, March- April, pp.71-80,1996.
    [36]Rob van der Spek and Andre Spijkervet, “Knowledge Management: Dealing Intelligently with Knowledge”, Knowledge Management and Its Integrative Elements, pp.31-35., 1997.
    [37]Roshan, K.T.and Sandhu R.S., “Conceptual Foundations for a Model of Task-based Authorizations,” Proceedings of the 7th IEEE Computer Security Foundations Workshop, Franconia, NH, June, pp.66-79, 1994.
    [38]Sandhu, R.S., Coyne, E.J., Feinstein, H.L.and Youman, C.E., “Role-Base Access Control Models”, IEEE Computer, pp.38-47, 1996.
    [39]Sandhu, R. S., Samarati P., “Access Control: Principles and Practice,” IEEE Comm. Magazine, Sep, p40-48., 1994.
    [40]Saknkar K. Pal, Simon C. K. Shiu, “Foundations of Soft Case-Based Reasoning”, Wiley, New Jersey, 2004.
    [41]Schonseleben, P., “With Agility and Adequate Partnership Strategies Towards Effective Logistics Networks,” Computers in Industry. , Vol. 42, No.1, pp. 33-42, 2000.
    [42]Schmidt, Stefan; Steele, Robert; Dillon, Tharam S.Chang, Elizabeth, ”Fuzzy trust evaluation and credibility development in multi-agent system”, Applied Soft Computing Journal, Volume: 7, Issue: 2, pp. 492-505, 2007.
    [43]Staab, S. and Maedche, A., “Knowledge Portals Ontologies at Work”, AI Magazine, Summer, Vol. 22, No. 2, pp. 63-75, 2001.
    [44]Strader, T.J.,Lin, F.R. and Shaw, M. J., “Information Infrastructure for Electronic Virtual Organization Management”, Decision support System, pp.75-94, 1998.
    [45]T. Y. Chen, Y. M. Chen, H.C. Chu, C. B. Wang, ” Distributed access control architecture and model for supporting collaboration and concurrency in dynamic virtual enterprises”, International Journal of Computer Integrated Manufacturing, March, 2007.
    [46]Tuma, A. “Configuration and coordination of virtual production networks,” International Journal of Production Economics, Vol.56-57, No.1, pp.641-649, 1998.
    [47]Uschold, M. and Gruninger, M., “Ontologies: Principles, Methods and Applications”, The Knowledge Engineering Review (11:2), pp: 93-136. 14, 1996.
    [48]Yu-Cheng Lin, Lung-Chuang Wang, H. Ping Tserng, “Enhancing knowledge exchange through web map-based knowledge management system in construction: Lessons learned in Taiwan”, Automation in Construction, Volume 15, pp 693–705, 2006.
    [49]White, G. B., Fisch E. A. and Pooch Udo W., “Computer System and Network Security,” CRC Press, Inc., Boca Raton, FL, 1996.
    [50]Wiig, K. M., “Knowledge Management Foundation”, Schema Press, Arlington, 1993.
    [51]Wilf Greenwood. "Harnessing Individual Brilliance for Team Creation The Six C's of the Knowledge Supply Chain." Online Collaboration Conference, Berlin, June 9th, 1998.
    [52]李允中、王小璠、蘇木春,2002,模糊理論及其應用,台北,全華科技圖書。
    [53]林東清,知識管理,2003,台北,智勝文化。
    [54]汪培庄,1990,模糊集合論及其應用,台北,中國生產力中心。
    [55]黎文龍,2000,工程設計與分析-創意設計分析與模擬,台北,東華書局。
    [56]蘇彩妤,1996,以本體論為基之虛擬企業知識存取控制方法研究,台南,國立成功大學製造工程所碩士論文

    下載圖示 校內:2009-08-07公開
    校外:2009-08-07公開
    QR CODE