簡易檢索 / 詳目顯示

研究生: 陳建邦
Chen, Chien-Pang
論文名稱: 新資訊技術方案導入評估研究 - 以IAAS雲端服務與資料中心比較為例
The study of Evaluation IT solution proposal - The case of IAAS cloud service and datacenter
指導教授: 王泰裕
Wang, Tai-Yu
學位類別: 碩士
Master
系所名稱: 管理學院 - 高階管理碩士在職專班(EMBA)
Executive Master of Business Administration (EMBA)
論文出版年: 2016
畢業學年度: 104
語文別: 中文
論文頁數: 96
中文關鍵詞: 層級分析法雲端科技資訊方案評估
外文關鍵詞: AHP, Cloud technology, IT solution evaluation
相關次數: 點閱:88下載:6
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • 鑒於在IT技術越來越複雜且產品生命週期越來越短的今日。身為IT從業人員與專業經理人,在面臨如何評估並且採用新科技,並確保其在導入後能滿足並符合商業流程需求的決定上,是一個很大的挑戰。其中最典型的難題,就是以雲端科技取代傳統機房的議題上,在IT業界已經被討論很久而沒有定論。有鑑於此,為了能夠找強化業主信心、增加決策效率、縮短評估流程並能符合企業或營運需求,本研究透過專家訪談與層級分析法(Analytic Hierarchy Process, AHP)所得到的評估因子順序與權重來提出一套評估方法。根據研究結果,對於評估雲端科技之因素權重與順序為:營運持續性(0.2713)、資訊安全(0.2430),商業目標一致性(0.2223),服務可得性(0.0945),成本效益(0.0901),以及技術效益(0.0787)在採用雲端科技取代傳統機房的議題上,結果說明雲端科技是可行的,且建議最好的採用方式是:對內部系統進行分類與重要性排序後,以階段性的方式逐步將適合系統由傳統機房移轉到雲端平台,並保留營運必要或是資料存取量高的系統於傳統機房內。並持續投資網路與資訊安全設備,來維持穩定與可靠的網路連線,以支持企業對雲端平台的存取能力。

    As the Information Technology (IT) advances and the life cycle of IT product is shortening in each day, it becomes a great challenge for IT practitioners and professional managers to evaluate the new technology and to ensure it can satisfy business needs. A typical dilemma for those IT professionals is whether to replace premise data centers with cloud computing technology. This issue has been long discussed without clear conclusion.

    This study seeks to find an evaluation approach by using weighted assessment factors via AHP (Analytic Hierarchy Process) and interviewing IT professionals. We believe through the process, this study can strengthen corporate owners’ confidence, improve decision-making efficiency, shorten evaluation process and meet business or operation requirement. The study found the weighted factors to evaluate cloud platforms in sequence are: business continuity (0.2713), information security (0.2430), business goal consistency (0.2223), service availability (0.0945), cost effectiveness (0.0901) and technical benefits (0.0787).

    It has been found by the study that cloud technology provides a solution to this issue and we recommend the best practice is to classify and prioritize internal systems, gradually transfer them from data center to suitable cloud platforms, consider hosting operational essentials and data access resource intensive systems in on premise data center, and provides sustaining investment on network and information security appliances to maintain a stable and reliable network connectivity to support cloud platforms accessibility.

    摘要 i Abstract ii 誌謝 vi 目錄 vii 表目錄 ix 圖目錄 xi 第一章 緒論 1 第一節 研究背景與動機 1 第二節 研究目的 3 第三節 研究流程 4 第四節 研究範圍與限制 5 第五節 論文概要 6 第二章 文獻探討 7 第一節 資訊系統沿革與方案評估概況 7 第二節 雲端運算簡介 14 第三節 雲端運算的挑戰與抉擇因素 18 第四節 層級分析法理論 23 第五節 小結 30 第三章 研究方法 31 第一節 研究架構與流程 31 第二節 研究對象與樣本說明 33 第三節 專家訪談與評估因素篩選 36 第四節 問卷設計與說明 44 第四章 研究分析與結果 46 第一節 層級分析架構與研究樣本 46 第二節 雲端科技評估因子層級權重分析 48 第三節 開放性問題分析與專家訪談 62 第五章 結論與建議 70 第一節 研究發現與結論 70 第二節 實務界建議與研究檢討 73 參考文獻 75 附錄 80 第一階段專家問卷內容 80 第二階段專家AHP評比問卷內容 84 針對雲端科技相關開放性問題之專家回答結果 92

    一、中文文獻
    Seagate (2016). "雲端運算和雲端儲存架構." Seagate. Retrieved from: http://www.seagate.com/tw/zh/tech-insights/cloud-compute-and-cloud-storage-architecture-master-ti/
    田中豊治與荘家怡 (2009). "成爲專家的條件." 佐賀大学文化教育学部研究論文集/佐賀大学文化教育学部 13(2): 169-178.
    吳萬益 (2015). “企業研究方法”. 華泰文化: 461-492.
    張瀚文 (2012). "李克特量表." 圖書館學與資訊科學大辭典(國家教育研究院).
    游伯龍等 (2015). "從決策到妙策: 突破習慣領域、洞見決策盲點、優化競爭策略、激發絕頂妙策." 時報文化出版: 136-139.
    黃鎮台等 (1989). "台灣資訊電子產業之展望與未來." 國家政策研究基金會.Retrieved from: http://old.npf.org.tw/Symposium/s90/900713-TE.htm
    褚志鵬 (2009). "層級分析法 (AHP) 理論與實作." Retrieved from: http://faculty.ndhu.edu.tw/~chpchu/POMR_Taipei_2009/AHP2009.pdf.
    楊硯婷等 (2005). "旅遊行程選擇之決策分析." 2005 決策分析研討會,元智大學資訊管理研究所.
    盧一帆 (2006). 利用QFD與FAHP於養護機構服務品質改善之研究. 資訊管理學系. 新竹市, 中華大學. 碩士: 112.

    二、英文文獻
    Amazon Web Service (2016). "Benefits of Amazon Web Service." Retrieved from: https://aws.amazon.com/security/platform/?nc1=h_ls
    Bass, T. and R. Robichaux (2001). Defense-in-depth revisited: qualitative risk analysis methodology for complex network-centric operations. Military Communications Conference, 2001. MILCOM 2001. Communications for Network-Centric Operations: Creating the Information Force. IEEE, IEEE.
    Belton, V. and T. Gear (1983). "On a short-coming of Saaty's method of analytic hierarchies." Omega 11(3): 228-230.
    Brodkin, J. (2008). "Gartner: Seven cloud-computing security risks." Infoworld 2008: 1-3.
    Brynjolfsson, E., et al. (1994). "Does information technology lead to smaller firms?" Management Science 40(12): 1628-1644.
    Buco, M. J., et al. (2004). Utility computing SLA management based upon business objectives. IBM Systems Journal, 43(1), (pp. 159-178).
    Cerullo, V. and M. J. Cerullo (2004). "Business continuity planning: a comprehensive approach." Information Systems Management 21(3): 70-78.
    Cooper, R. G. and S. J. Edgett (2010). "Developing a product innovation and technology strategy for your business." Research-Technology Management 53(3): 33-40.
    Dewan, S. and K. L. Kraemer (2000). "Information technology and productivity: evidence from country-level data." Management Science 46(4): 548-562.
    Duckstein, L. and S. Opricovic (1980). "Multiobjective optimization in river basin development." Water Resources Research 16(1): 14-20.
    Gordon, T. J. (1994). "The delphi method." Futures research methodology 2.
    Harris, S. E. and J. L. Katz (1991). "Firm size and the information technology
    investment intensity of life insurers." MIS quarterly: 333-352.
    Holstein, J. A. and J. F. Gubrium (2004). "The active interview." Qualitative research: Theory, method and practice 2: 140-161.
    Lacoma, T. (2016). "Cloud Storage vs. Cloud Computing: Which Are You Using?" Gadget Review. Retrieved from: http://www.gadgetreview.com/cloud-storage-vs-cloud-computing-which-are-you-using
    Leiner, B. M., et al. (2009). "A brief history of the Internet." ACM SIGCOMM Computer Communication Review 39(5): 22-31.
    Mell, P. and T. Grance (2011). "The NIST definition of cloud computing."
    Microsoft (2016). "Microsoft Azure Trust Center.” Retrieved from: https://azure.microsoft.com/en-us/support/trust-center/
    Miller, G. A. (1956). "The magical number seven, plus or minus two: some limits on our capacity for processing information." Psychological review 63(2): 81.
    Millet, I. and P. T. Harker (1990). "Globally effective questioning in the analytic hierarchy process." European journal of operational research 48(1): 88-97.
    Opricovic, S. and G.-H. Tzeng (2004). "Compromise solution by MCDM methods: A comparative analysis of VIKOR and TOPSIS." European journal of operational research 156(2): 445-455.
    Qian, L., et al. (2009). Cloud computing: an overview. Cloud computing, Springer: 626-631.
    Rodero-Merino, L., et al. (2010). "From infrastructure delivery to service management in clouds." Future Generation Computer Systems 26(8): 1226-1240.
    Saaty, T. L. (1980), "The Analytic Hierarchy Process", McGrew-Hill, New York.
    Saaty, T. L. (2008). "Decision making with the analytic hierarchy process." International journal of services sciences 1(1): 83-98.
    Schmidt, E. (2006). Conversation with Eric Schmidt hosted by Danny Sullivan. Search engine strategies conference (August 2006).
    Schut, J. H. (2003). Insurance: Lessons from Disasters. Institutional Investor, 297.
    Sircar, S., et al. (2000). "A framework for assessing the relationship between information technology investments and firm performance." Journal of management information systems 16(4): 69-97.
    Yoon, K. P. and C.-L. Hwang (1995). Multiple attribute decision making: an introduction, Sage publications.
    Zhang, Q., et al. (2010). "Cloud computing: state-of-the-art and research challenges." Journal of internet services and applications 1(1): 7-18.

    下載圖示 校內:2021-06-30公開
    校外:2021-06-30公開
    QR CODE