跳到主要內容

臺灣博碩士論文加值系統

(3.236.28.137) 您好!臺灣時間:2021/07/25 21:19
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

我願授權國圖
: 
twitterline
研究生:徐鈺宗
研究生(外文):Yu-Tsung Hsu
論文名稱:資訊安全服務業–長青國際–創業個案研究
論文名稱(外文):Information Security Service Industry - EverGreen International Development Co Ltd.. - Entrepreneur Case Study
指導教授:林芬慧林芬慧引用關係
指導教授(外文):Fen-Hui Lin
學位類別:碩士
校院名稱:國立中山大學
系所名稱:資訊管理學系研究所
學門:電算機學門
學類:電算機一般學類
論文種類:學術論文
論文出版年:2004
畢業學年度:92
語文別:中文
論文頁數:72
中文關鍵詞:個案研究創業資訊安全
外文關鍵詞:Information SecurityCase StudyEntrepreneur
相關次數:
  • 被引用被引用:1
  • 點閱點閱:167
  • 評分評分:
  • 下載下載:0
  • 收藏至我的研究室書目清單書目收藏:0
隨著透過網際網路推動電子商務的企業日增,資訊系統複雜性不斷提升之際,資訊安全對企業組織而言愈發重要。其不但能改善企業之資訊作業環境,保護組織內部的策略資訊資產,亦是電子商務的基礎要件。另一方面,現今資訊的傳播無遠弗屆,企業無時無刻皆必須面臨著接踵而至的駭客攻擊和病毒入侵,保護企業系統的正常運作及組織內部之資料實乃當務之急。因應此一新情勢之形成,資訊安全服務業(Information Security Service Industry)成為近年來新崛起的產業之一,而隨著企業急於應用資訊科技以提升其整體競爭力的同時,資訊安全服務業的重要性與日俱增。
本研究針對目前尚無國內學者研究的台灣資訊安全服務業之創業個案進行研究,以國內某一家資訊安全服務公司為研究對象,採用個案研究的方式,運用實地觀察、親自參與及閱讀個案公司的相關資料,深入瞭解該公司創業者如何分析創業環境、評估創業機會與資金設備人才等資源需求,以及實際創業過程中所面臨的挑戰與影響創業成敗之要素。研究重點著重在於分析創業環境與機會、創業團隊及組織架構、產品策略和營運模式、顧客及市場型態、產品核心競爭力及執行方式等因素,對實際創業成功之影響。
With the increasing number of enterprises which provides e-business via Internet and the complex of information system, Information Security becomes more and more important to a company. Information Security not only can improve a company’s information system but also can protect its information asset. It becomes a basic element for e-business. In addition, since information today goes beyond boundaries, a company may face the threat of being attacked by hackers or virus all the time. Maintaining system operation and protecting internal information become an essential issue to a company. Due to this new trend, Information Security Service Industry becomes one of the newly developed industries. At present, a company has the urgent need of adopting information technology to increase competitive advantages. The importance of Information Security is increasing day by day.
This research mostly focuses on Taiwan Information Security Service Industry which is still lack of research literatures. The research uses a local Information Security Service company as its research target. Case study, field observation, and reading company’s related materials help to understand how entrepreneurs analyze environment and evaluate opportunities, required resources, threats, and key success/failure factors. The research mainly focuses on how environment and opportunities analysis, entrepreneur team and organization structure, product strategy and operating model, consumers and market, product competitive advantage and implementation influence a company’s success.
第一章 概論
第一節 研究背景與動機
第二節 研究目的與範圍
第二章 文獻探討
第一節 創業
第二節 資訊安全
第三節 服務
第三章 研究方法與架構
第一節 研究方法
第二節 研究架構
第三節 研究限制
第四章 創業歷程研究與分析
第一節 創業契機
第二節 創業團隊及組織架構
第三節 產品策略及營運模式
第四節 顧客
第五章 分析討論和管理意涵
第一節 創業成功外部情勢分析討論
第二節 創業成功內部情勢分析討論
第六章 結語
附錄:個案公司創業歷程大事記
參考書目
中文部分
Michael E. Porter 著,周旭華譯,競爭策略 - 產業環境及競爭者分析,臺北市:天下文化出版,1998。
Michael E. Porter著,李明軒、邱如美合譯,競爭優勢,臺北市:天下遠見出版,1999。
Moore Geoffrey A. 著,陳正平譯,龍捲風暴 - 矽谷的高科技行銷策略,臺北市: 麥田出版,1996。
刁明芳,一百億國票風暴,臺北市:天下文化出版,1997。
王玉民,社會科學研究方法原理,臺北市:紅葉出版社,1994。
司徒達賢,「服務業四大管理特性」,卓越 26期(1986),p. 154。
白錦門,「個案法之研究」,教育研究方法論文集,臺北市:台灣書店,1994。
余宏揚,「資訊服務業現況與展望」,資訊傳真雜誌,121期(1989年12月),p. 124。
吳以文,「從第七屆世界軟體大會展望資訊服務業的未來」,資訊與電腦,122期(1990年9月),pp. 12-14。
吳勉勤,觀光旅館業服務品質改善策略之研究,私立中國文化大學未出版碩士論文,1992,pp. 21-26.
吳琮璠,「國外政府機構資訊系統安全稽核制度」,存款保險資訊季刊,第10卷第2期(1996)。
吳琮璠,「資訊管理個案研究方法」,中山大學資訊管理研究方法研討會會刊,1996。
我國網路服務發展現況及趨勢(上、下),台北市:資訊工業策進會資訊市場情報中心MIC,2000。
李宏麟,「情報產業,快又準!」,商業周刊,57期(1988年12月),p. 64。
李東峰、林子銘,「企業資訊安全控制制度之研究」,第三屆全國資訊管理博士生聯合研討會論文集,2002,pp. 1-22。
李東峰、林子銘,「資訊安全的風險管理」,第五屆國際資訊管理研究暨實務研討會論文集,1999,pp. 165-172。
狄英,「訪創業管理專家 - 布蘭德談:創業精神的『文藝復興』」,天下雜誌,1987年2月,pp. 41-47。
林秀英,台灣經濟研究月刊,第20卷第10期, 1997年10月。
林明哲,創業環境與創業動機之實證研究,國立政治大學企業管理研究所,1989年6月。
林秉忠、長青國際研究人員,「2001年台灣Web伺服器安全性調查」,資訊安全通訊,第7卷第2期,2001,pp. 76-90。
林陽助,服務行銷Services marketing,台灣金融研訓院,2003。
施穎偉、湯宗益,「評選資訊服務公司之關鍵性準則的研究」,管理與系統,第8卷3期,2001,pp. 279-296。
柯宏澤,「資訊服務業」,產業經濟,205期(1998),pp. 54-59。
柳孝一,總裁的創業哲學,臺北市:臺灣廣廈出版,1999。
洪順慶,從心行銷:從滿意到愛慕的服務祕訣,臺北市:天下雜誌,大和圖書總經銷,2003。
樊國楨,「資訊安全管理系統CNS17800(BS7799-2:2002)標準簡介」,堅實我國資訊安全管理系統稽核作業相關標準系列討論會會議資料,2003年8月1日。
樊國楨,啟動新版資訊安全管理系統-CNS17800(BS7799-2 : 2002),資訊安全,Vol. 12,2003,pp. 33-36。
尉謄蛟,「透視創業家的特質」,世界經理文摘,1987年2月,p. 16。
梁朝雲、陳偉如、鄭鳳生,「『資訊服務』的範疇與趨勢」,資訊傳播與圖書館學報,2卷3期(1996),p. 81。
許通安、黃豐慶、皮世明,「資訊服務業廠商競爭策略與績效之研究 The study of corporate competitive strategy and performance on the information service industry」,企業管理學報,第44期,1999。
陳明璋,創業的智慧,宏�眲鴔瑎瑊z教育中心出版,1989年7月。
陳萬淇,個案研究法,臺北市:華泰書局,1981。
楊國樞、文崇一、吳聰賢與李亦園,社會及行為科學研究法,臺北市:東華書局,1989。
楊敏玲,青年女性創業家創業動機、創業類型之研究,國立台灣大學商學研究所,1993年6月。
楊嘉麗,「我國資訊服務業市場現況及發展趨勢分析」,台北市:資訊工業策進會資訊市場情報中心MIC,1998年7月。
經濟部標準檢驗局資訊技術-資訊安全管理之作業要點,CNS 17799,經濟部標準檢驗局,2002。
虞金燕,「資訊安全發展趨勢與科專研發方向建議」,台北市:資訊工業策進會資訊市場情報中心MIC,2001。
虞金燕、鄭祥勝,「資訊安全發展趨勢與科專研發方向建議」,台北市:資訊工業策進會資訊市場情報中心MIC,2001。
資訊服務業市場現況與發展趨勢分析,台北市:資訊工業策進會資訊市場情報中心MIC,1996。
劉水深,產品規劃與策略運用,臺北市:著者自刊,1981。
樊國楨、方仁威、徐士坦,建立我國通資訊基礎建設安全機制標準規範實作芻議研究報告書2001d,經濟部標準檢驗局委辦計畫,pp. 1-52。
樊國楨、時崇德,「一般認同系統安全原則與通資系統的永續經營計畫初探」,建立我國通資訊基礎建設安全機制研究報告書2000,國家安全局,pp. 256-300。
樊國楨、楊晉寧,「互連網(Internet)電子信息交換安全-以電子公文交換作業安全為本」,電腦稽核,1996,pp. 14-25 。

英文部分
「Relative Size Of IT Solutions Market , 2003-2007」, IDC.
「Worldwide Security Software Forecast, 2003-2007」, IDC.
Bem, Darryl M., “Self-perception Theory”, in L. Berkowitz, ed., Advances in Experimental Social Psychology, New York: Academic Press, 1972.
Bogdan, R. and Biklen, S., Qualitative Research for Education: An Introduction to Theory and Method, Boston: Allyn and Bacon, 1982.
BSi, Information Security Management - Part 2: Specification for Information Security Management Systems, BS7799-2: 1999, BSi.
Certification Criteria for the Information Security Management Systems Auditor/Lead Auditor Training Course, IRCA/2016, Nov 2002, IRCA.
Chrisman, J. J., Bauerschmidt, A., Hofer, C. W., “The Determinants of New Venture Performance: An Extended Model,” Entrepreneurship Theory and Practice (23:1), 1998, pp. 5-29.
Clark, D. D. et al., Computers at Risk: Safe Computing in the Information Age, National Academy Pass, 1990.
Cooper, Arnold C., “Spin-offs and Technical Entrepreneurship,” IEEE Transactions of Engineering Management (Feb., 1971).
Dhillon, G. and Backhouse, J., “Information System Security Management in the New Millennium, ” Communication of the ACM (43:7), July 2000, pp. 125-128.
Dutka, Alan, AMA Handbook for Customer Satisfaction, Lincolnwood, Ill.: NTC Business Books, c1994.
Eisenhard, K. M., “Building Theories from Case Study Research,” Academy of Management Review (14:4), 1989, p. 533.
Eloff, M. M. and Von Sloms, S. H., “Information Security Management: An Approach to Combine Process Certification and Product Evaluation,” Computers & Security (19:8), 2000, pp. 698-709.
Etzioni, O. and Weld, D. S., “Intelligent agents on the Internet: Fact, Fiction, and Forecast,” IEEE Expert (104), 1995, pp. 44-49.
Finne, T., “A Conceptual Framework for Information Security Management,” Computer & Security (17:4), 1998, pp. 303-307.
Fontes, M. and Coombs, R., “New Technology-based Firm Formation in a Less Advanced Country: A Learning Process,” International Journal of Entrepreneurial Behaviour & Research (2:2), 1996, pp. 82-101.
Gartner, William B., “A Conceptual Framework for Describing the Phenomenon of New Venture Creation,” Academy of Management Review (10:4), 1985, pp. 696-706.
Goreman, G. E. and Clayton, Peter, Qualitative Research for the Information Professional: A Practical Handbook, London: Library Association Publishing, 1997.
Greenberger, David B. and Sexton, Donald L., “An Interactive Model of New Venture Initiation,” Journal of Small Business Management (26:3), July 1998, pp. 1-7.
Harvard Business Review, May-June 1987, p. 43.
Hill, T. P., “On Goods and Services,” Review of Income and Wealth, No. 23, Dec. 1977, pp. 315-338.
Hinde, S., “If You Can Meet With Triumph and Disaster and Treat Those Two Impostors Just the Same,” Computers & Security, No. 20, 2001, pp. 657-666.
Hirsch, S., “Services and Services Intensity in International Trade,” Weltwirtschaftliches Archiv (125:1), 1988, p. 25.
Hoffer, J. A. and Straub, D. W., “The 9 to 5 Underground: Are you Policing Computer Crimes?” In P. Gray, W.R. King, E.R. Mclean, & H. Watson (Eds), The Management of Information Systems, Fort Worth, TX: Harcourt Brace, pp. 388-401.
Hsu, Paul S. C., “Entrepreneurship and the Motivational Effect of Family in Taiwan,” a paper prepared for International Conference on Cultural Change in Postwar Taiwan, sponsored by National Taiwan University and University of Washington, April 9-14, 1990.
Information Technology – Code of Practice for Information Security Management ,ISO/IEC 17799: 2000(E), ISO.
Information Technology – Guidelines for the Management of IT Security (All Parts), 2001, ISO.
Kotler, Philip, Marketing Professional Services, Englewood Cliffs, NJ: Prentice-Hall, c1984.
Krueger, Jr. N. F., Reilly M. D. and Carsrud, “Competing Models of Entrepreneurial Intentions,” Journal of Business Venturing 15(2000), pp. 411-432.
LaForte, Susan R., “Information Brokers:Friend and/or Foe?”Public Library Quarterly, No. 3, Winter 1982, p. 87.
Mill, J. S., Principles of Political Economy with Some of Their Applications to Socail Philosophy, London: John W. Parker, 1948.
Nicolaides, Phedon, “Services in Growing Economies and Global Markets,” Informal Workshops with Dynamic Asia Economies, 1990.
Osborne, R. L., “The Essence of Entrepreneurial Success,” Management Decision (33:7), 1995, pp. 4-9.
Powell, James Donald and Bimmerle, Charles F., “A Model of Entrepreneurship: Moving toward Precision and Complexity,” Journal of Small Business Management (18:1), Oct. 1980, pp. 33-36.
Rathmell, John M., Marketing in the Service Sector, Cambridge, Mass.: Winthrop Publishers, c1974.
Riddle, Dorothy I., Service-Led Growth: The Role of the Service Sector in World Development, New York: Praeger, 1986.
Rusell, D. and Gangemi, G. T., Computer Security Basics, California, U.S.A., O’Reilly & Associates Inc., 1992.
Schultz, E. E., Proctor, R. W., Lien, M. C. and Salvendy, G., “Usability and Security An Appraisal of Usability Issues in Information Security Methods,” Computer & Security (20:7), 2001, pp. 620-634.
Schumpeter, Joseph A., The Theory of Economic Development, Cambridge: Harvard University Press, 1934, p. 56.
Shame, William H., Venture Management: The Business of the Inventor, Entrepreneur. Venture Capitalist, and Established Company, New York: The Free Press, 1974.
Shapero, Albert, “Entrepreneurship and Economic Development,” Entrepreneurship and Enterprise Development: A Worldwide Perspective, 1975.
Shelp, Ronald, Beyond Industrialization: Ascendancy of the Global Service Economy, New York: Praeger, 1981.
Shemnner, Roger W., “How Can Service Business Survive and Prosper?” Soloan Management Review, Spring 1986, pp. 23-28.
Siponen, M. T., “A Paradigmatic Analysis of Convention Approaches for Developing and Managing Secure IS, IFIP,” International Federation for Information Processing, Sec. 1, 2001, pp. 437-452.
Siropolis, Nicholas C., Small Business Management: A Guide to Entrepreneurship, Boston: Houghton Mifflin Company, 1982, p. 29.
Smith, M., “Computer Security-Threats, Vulnerabilities and Countermeasures,” Information Age, Oct. 1989, pp. 205-210.
Solms, Von R., Haar, Van H., Caelli, W. J., “A Framework for Information Security Evaluation,” Information & Management, 26(1994), pp. 143-153.
Tudor, J. K., Information Security Architecture, Auerbach of CRC Press LLC, 2001.
Vanderwerf, P. A., “A Model of Venture Creation in New Industries,” Entrepreneurship Theory and Practice (17:2), 1993, pp. 39-74.
Walker, Francis A., The Wages Question, New York: A. M. Kelley Publishers, 1876.
Waston, K., Hogarth-Scott, S. and Wilson, N., “Small Business Start-ups: Success Factors and Support Implications,” International Journal of Entrepreneurial Behaviour & Research (4:3), 1998, pp. 217-238.
Webster’s Third New International Dictionary, Chicago; London: Encyclopedia Britiannica, Inc., 1961.
Yin, Robert K., Applications of Case Study Research, Newbury Park, Calif.: Sage, 1993.
Yin, Robert K., Case Study Research: Design and Methods, Newbury Park, Calif.: Sage, 1988.
Zeithmal, Valarie A., A. Parasuraman and Leonard L. Berry, “A Conceptual Model of Service Quality and Its Implications for Future Research,” Journal of Marketing, 49(1985).
Zeithmal, Valarie A., A. Parasuraman and Leonard L. Berry, Delivering Quality Service: Balancing Customer Perceptions and Expectations, New York: Free Press, c1990.
Zeithmal, Valarie A., A. Parasuraman and Leonard L. Berry, Services Marketing: Integrating Customer Focus Across the Firm, Boston, Mass.: Irwin/McGraw-Hill, c2003.
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top