跳到主要內容

臺灣博碩士論文加值系統

(44.201.94.236) 您好!臺灣時間:2023/03/25 01:10
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

我願授權國圖
: 
twitterline
研究生:陳建興
研究生(外文):Jian-Shing Chen
論文名稱:高科技產業導入雲端服務之評估模式
論文名稱(外文):The Assessment Model of High-tech Industries Implementation Cloud Services
指導教授:陳銘崑陳銘崑引用關係
指導教授(外文):Ming-kuen Chen
口試委員:郭晉源吳忠敏
口試委員(外文):Chin-Yuan GuoChung-min Wu
口試日期:2011-06-23
學位類別:碩士
校院名稱:國立臺北科技大學
系所名稱:商業自動化與管理研究所
學門:商業及管理學門
學類:企業管理學類
論文種類:學術論文
論文出版年:2011
畢業學年度:99
語文別:中文
論文頁數:103
中文關鍵詞:雲端運算服務權重模糊多目標抵換效果
外文關鍵詞:Cloud Computing ServicesWeighted Additive Fuzzy MutiObjective ModelTrade-Off
相關次數:
  • 被引用被引用:3
  • 點閱點閱:452
  • 評分評分:
  • 下載下載:0
  • 收藏至我的研究室書目清單書目收藏:4
金融海嘯後,雲端服務成為最受青睞的委外模式,然而目前國內採用雲端服務的大型企業只有1%,高達57.1%的台灣大型企業對雲端運算抱持觀望態度。因此,如何提供一雲端服務導入評估模式將有助於解決企業對於導入雲端運算之疑惑與不確定性。
綜觀目前國內外文獻在雲端運算導入評估的相關研究,均只針對成本或風險單一面向進行導入雲端之評估。然而在企業進行資訊委外的狀況下,除了希望可以降低成本外,同時也能在最低的風險狀況下並擁有最好的服務。因此,本研究希望透過考量多重目標抵換效果下建構一雲端導入評估模式。根據決策者對於導入雲端時在意的不同角度,將決策者分成平衡型、成本趨向者、風險趨向者及服務趨向者四個類型。文中以不同決策者類型思維進行情境模擬。希望以此模式提供給業界做為參考及後續研究之依據。


After the International Financial Tsunami, the cloud computing services became to the most popular outsourcing pattern, however, there is only 1% of Taiwan''s large enterprises adopt it at this moment, and up to 57.1% of enterprises are still sitting on the fence. Therefore, how to provide a lead-in assessment of the cloud computing services will assist the enterprises with reducing their doubts and uncertainties.
In comparison with the current study in assessment of cloud computing, which only consider single factor, such as cost or risk. However, once the enterprises adopt IT outsourcing, they attempt to not only in reducing the costs, but also having the best service under the lowest risk. Consequently, this study is establishing a lead-in assessment of cloud computing cervices through considering multiple goals that the situation is trade-off. Based on decision maker’ type, there are four types scenarios, such as balanced type, cost oriented, risk oriented, and service oriented. The simulation for the different kinds of scenarios was developed. The results can provide the industry as a reference.


摘要 I
Abstract II
誌 謝 III
目錄 IV
表目錄 VI
圖目錄 VIII
第一章 緒論 1
1.1 研究背景與動機 1
1.2 研究目的 2
1.3 研究範圍與限制 3
1.4 研究流程 3
第二章 文獻探討 5
2.1 雲端運算概論 5
2.1.1 雲端運算定義與特性 5
2.1.2 雲端運算服務內容 9
2.1.3 雲端運算相關研究 12
2.2 導入雲端服務考量因素 14
2.2.1 成本趨動因素 15
2.2.2 風險趨動因素 20
2.2.3 服務趨動因素 25
2.3 多目標決策模式 30
2.3.1 模糊多目標相關應用及研究 31
2.3.2 模糊多目標決策模式 32
第三章 研究方法 38
3.1 研究架構 38
3.2 導入雲端服務評估構面及因素探討 39
3.2.1 問題陳述與假設條件 39
3.2.2 導入雲端服務評估構面及因素 41
3.3 導入雲端服務評估模式建立 47
3.3.1 單一目標方程式定義 48
3.3.2 權重模糊多目標模式建立 56
第四章 案例探討 62
4.1 個案公司基本資料 62
4.2 案例分析 64
4.2.1 權重模糊多目標模式建立及求解 64
4.2.2 敏感度分析 69
第五章 結論 95
5.1 研究結論 95
5.2 未來研究與建議 97
參考文獻 98
附錄1 符號對照表 102



書籍:
[1]李允中、王小璠、蘇木春 (2003)。模糊理論及其應用。台北市:全華科技圖書股份有限公司。
[2]許志義 (1984) 。多目標決策。台北市:五南圖書出版有限公司。
[3]許志義 (2003) 。多目標決策-第二版。台北市:五南圖書出版有限公司。
[4]陳瀅 (2010) 。雲端策略:雲端運算與虛擬化技術-第三版。台北市:天下雜誌股份有限公司。
[5]Hamid R. M., Strphenson, B., & Singhal, S. (2009). Outsourcing Business to Cloud Computing Service: Opportunity and Challenges, Palo Alto: Hewlett-Packard (HP).
[6]Hwang, C. L., & Yoon, K. (1981). Multiple attribute decision making: Methods and applications: a state-of-the-art survey, Springer-Verlag: Heidelberg.
[7]Revelle, C. S., Whitlatch, E., & Wright, J. (2003). Civil and Environmental Systems Engineering, New Jersey: Prentice Hall.
期刊論文:
[8]鐘嘉德、高天助、楊嘉栩(2010)。雲端運算與產業發展。研考雙月刊,34(4), 20-31。
[9]Amid, A., Grodsypour, S. H., & O’Brien, C. (2009). A Weighted additive fuzzy multiobjectvie model for the supplier selection problem under price brecks in a supply Chain, International Journal of Production Economics, Vol. 121, No. 2, pp. 323-332.
[10]Bellman, R. E., & Zadeh, L. A. (1970). Decision-Making in a Fuzzy Environment, Management Science, Vol. 17, No. 4, pp. 141-164.
[11]Carroll, J. M. (1983). Decision support for risk analysis, Computer and Security, Vol. 2, No. 3, pp. 230-236.
[12]Durkee, D. (2010). Why Cloud Computing Will Never Be Free, Communications of The Acm, Vol. 53, No. 5, pp. 62-69.
[13]Erdogmus, H. (2009). Cloud Computing: Does Nirvana Hide behind the Nebula? IEEE software, Vol. 26, No. 2, pp. 4-6.
[14]Grossman, R. L. (2009). The case for cloud computing, IT Professional, Vol. 11, No. 2, pp. 23-27.
[15]Lai, Y. J., Liu, T. Y, Hwang, C. L. (1994) TOPSIS for MODM, European Journal of Operational Research, Vol. 76, No. 3, pp. 486-500.
[16]Leavitt, N. (2009). Is cloud computing really ready for prime time? IEEE Computer Society, Vol. 42, No. 1, pp. 15-20.
[17]Li, S., Member, S., & Hu, C. (2007). Two-Step Interactive Satisfactory Method for Fuzzy Multiple Objective Optimization With Preemptive Priorities, Fuzzy Sets and Systems, Vol. 15, No. 3, pp. 417-425.
[18]Lin, C. C. (2007). Using the weighted max–min approach for stochastic fuzzy goal programming: A case of fuzzy weights, Fuzzy Sets and Systems, Vol. 188, No.1, pp. 456-461.
[19]Lin, G., Fu, D., Zhu, J., & Dasmalchi, G. (2009). Cloud computing: IT as a server, IT professional, Vol. 11, No. 2, pp. 10-13.
[20]Lombardi, F., & Pietro, R. D. (2011). Secure virtualization for cloud computing, Journal of Network and Computer applications, Vol. 34, No. 4, pp. 1113-1122.
[21]Misra, S. C., & Mondal, A. (2011). Identification of a company''s sutiability for the adoption of cloud computing and modelling its corresponding Retrun on Investment, Mathematical and Computer Modelling, Vol. 53, No. 3-4, pp. 504-521.
[22]Rosenthal, A., Mork, P., Li, M. H., Stanford, J., Koester, D., & Reynolds, P. (2010). Cloud Computing: A new business paradigm for biomedical information sharing, Journal of Biomedical Information, Vol. 43, No. 2, pp. 342-353.
[23]Shi, Y., & Zeleny, M. (1975). The Set of all Nondominated Solutions in Linear Cases and a Multicriteria Simplex Method, Journal of Mathematical Analysis and Applications, Vol. 49, No. 2, pp. 430-468.
[24]Subashini, S., & Kavitha, V. (2011). A survey on security issues in service delivery models of cloud computing, Journal of network and computer application, Vol. 34, No.1, pp. 1-111.
[25]Sultan, N. (2010). Cloud computing for education: A new dawn? International Journal of Information Management, Vol. 30, No. 2, pp. 109-116.
[26]Svatesson, D., & Clarke, R. (2010). Privacy and consumer risks in cloud computing, Computer Law and Security Review, No. 26, Vol. 4, pp. 391-397.
[27]Tiwari, R. N., Dharmahr, S., & Rao, J. R. (1987). Fuzzy Goal Programming-An additive model, Fuzzy Sets and Systems, Vol. 24, No.1, pp.27-34.
[28]Truong, H. L., & Dustdar, S. (2010). Composable cost estimation and monitoring for computational applications in cloud computing environments, Procedia Computer Science, Vol. 1, No. 1, pp. 2175-2184.
[29]Yang, L., Jones, B, F., & Yang, S. H. (2007). A fuzzy multi-objective programming for optimization of fire station location through genetic algorithms, European Journal of Operational Research, Vol. 181, No, 2. pp. 903-915.
[30]Zimmermann, H. J. (1978). Fuzzy programming and linear programming with several objective functions, Fuzzy Sets and Systems, Vol. 1, No. 1, pp. 45-55.
會議論文:
[31]Lee, J. Y., Lee, J. W., Cheun, D. W., & Kim, S. D. (2009, December). A Quality Model for evaluating Software-as-a-Service in Cloud Computing, 7th, ACIS International Conference on Software Engineering Research, Management and Applications.
[32]Jin, K., Zhang, C., Balasubramaniam, P., & Nage, S. (2009). A Multiple Objective Optimization Model for Environmental Benign Process Planning, 16th, International Conference on Industrial Engineering and Engineering Management, pp. 869-873.
[33]Li, R., Tang, S., & Hu, X. (2010). Thinking the cloud computing in China, 2nd, International Conference on Information Management and Engineering (ICIME).
[34]Zang, S., Zhang, S., Chen, X., & Huo, X. (2010). Cloud Computing Research and Development Trend, 2nd, Inetnational Conference on Future Networks.
[35]Dillom, T. (2010). Cloud Computing: Issues and Challenges, 24th, IEEE International Conference on Advanced Information Networking and Applications (AINA), pp. 20-23.
[36]Li, X., Li, Y., Liu, T., Qiu, J., & Wang, F. (2009). The Method and Tool of cost analysis for cloud computing, IEEE International Conference on cloud computing.
[37]Ke, H., & Member, W. M. (2009, August). A Dependent-Chance Programming Model for Fuzzy Time-Cost Trade-off Problem, IEEE International Conference on Fuzzy System, pp. 20-24.
[38]Bao, D., Xiao, Z., Sun, Y., & Zhao, J. (2010, August). A Method and Framework for Quality of Cloud Service Measurement, 3rd, International Conference on Advanced Computer Theory and Engineering.
學位論文:
[39]張佳蓉(2009)。考慮模糊多目標之產品可靠度設計。博士論文,國立成功大學工業與資訊管理學系碩博士班,台南。
[40]黃國峰(2008)。模糊多目標線性規劃應用於模具業委外之成本效能分析。碩士論文,屏東科技大學工業管理系所,屏東。
[41]羅婉毓(2008) 。結合模糊多目標規劃及模糊品質機能展開之綠色產品設計模式。博士論文,國立成功大學工業與資訊管理學系碩博士班,台南。
其他:
[42]Brodkin, J. (2008). Cloud computing hype spurs confusion, Gartner says, Computerworld.
[43]Catteddu, D., & Hogben, G. (2009). Cloud Computing-Benefit, risks and recommendations for information security, European Network and Information Security Agency, pp. 1-125.
[44]IBM,http://www.ibm.com/ibm/cloud/
[45]IDC各項趨勢分析資訊,http://brianmyth.blogspot.com/2010/05/blog-post_31.html
[46]MIC (2009)。雲端運算應用趨勢與我國商機研究,頁1-110。
[47]MIC (2010)。雲端運算服務資訊安全評估,頁1-5。
[48]Salefore.com,http://www.salesforce.com/tw/cloudcomputing/
[49]維基百科,http://zh.wikipedia.org/zh-tw/雲端運算。


QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top