(44.192.10.166) 您好!臺灣時間:2021/03/06 19:53
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果

詳目顯示:::

我願授權國圖
: 
twitterline
研究生:賴彥彣
研究生(外文):Yen Win, Lai
論文名稱:以制度理論觀點探討某電信公司雲端產業策略
論文名稱(外文):A case study on cloud computing strategy of a telecom company in Taiwan: an organizational legitimacy perspective.
指導教授:莊裕澤莊裕澤引用關係
指導教授(外文):Yuh-Jzer Joung
口試委員:孔令傑
口試委員(外文):Ling-Chieh Kung
口試日期:2014-07-11
學位類別:碩士
校院名稱:國立臺灣大學
系所名稱:資訊管理學研究所
學門:電算機學門
學類:電算機一般學類
論文種類:學術論文
論文出版年:2014
畢業學年度:102
語文別:英文
論文頁數:84
中文關鍵詞:雲端運算產業創造電信廠商制度理論合法性內容分析
外文關鍵詞:cloud computingindustry creationtelecom operatorinstitutional theorylegitimacycontent analysis
相關次數:
  • 被引用被引用:0
  • 點閱點閱:145
  • 評分評分:系統版面圖檔系統版面圖檔系統版面圖檔系統版面圖檔系統版面圖檔
  • 下載下載:0
  • 收藏至我的研究室書目清單書目收藏:0
雲端運算為資訊科技資源之創新服務提供模式,雲端運算的興起,重塑全新資訊產業價值鏈,被視為將資訊科技視作公用資源之典範轉移,影響下一波資訊產業發展方向。在台灣,雲端運算尚為新興產業,正式雲端產業採用與推廣仍未成熟,新興雲端產業有待建立市場,產業中廠商如何拓展雲端產業成為本研究擬探討之方向。另一方面,雲端運算大量需要資源池供應的特性,使電信廠商成為雲端產業拓展上的關鍵角色。
因此本研究採用新創產業合法性創造之觀點,結合合法性取得策略模型,探討中華電信在雲端產業上之開展策略。研究方法上,結合訪談資料與二手資料進行內容分析。研究結果指出欲創造新興產業,電信廠商必須取得企業內部、相同產業間、不同產業間以及最終整體政府、教育與媒體制度環境之綜合策略。本研究有助於釐清新興產業創造所需策略,可供後續研究開展新創事業之參考。

Cloud computing, an emerging industry in Taiwan, relies heavily on information communication technology (ICT) infrastructure; thus, a telecom operator can play an important role in establishing this industry. This thesis takes an organizational legitimacy approach to understand how a Taiwanese telecom company can develop a legitimacy strategy for cloud computing services. Our preliminary data analysis indicates that an organization can adopt multiple strategies to achieve legitimacy at the organizational, intra-industrial, inter-industrial, and institutional levels. This study enhances our practical understanding of organizational strategies for forming nascent businesses.

摘要 i
Abstract ii
List of Tables v
List of Figures v

Chapter 1. Introduction 1
1.1 Research Motivation and Scope 1
1.2 Research Objective 3
1.3 Structure of the Thesis 4

Chapter 2. Literature Review 5
2.1 Definition of Cloud Computing 5
2.2 Current Status of Cloud Computing Research 9
2.2.1 Major Research Topics in the Cloud Computing Domain 9
2.2.2 Major Perspectives Used in Cloud Adoption Research 12

Chapter 3. Theoretical Model 18
3.1 Institutional Theory 18
3.2 Concept of Legitimacy 22
3.3 Industry Creation 23
3.4 Legitimacy-acquiring Strategy 25

Chapter 4. Methodology 28
4.1 Data Collection 28
4.2 Data Analysis 29
4.3 Case Background 29

Chapter 5. Research Finding 33
5.1 Organizational Level 33
5.2 Intraindustrial Level 37
5.3 Interindustrial Level 43
5.4 Institutional Level 48

Chapter 6. Discussion and Implications 57
6.1 Main Strategy Taken at Different Levels 57
6.2 Industry Creation Analysis 58
6.2.1 Cognitive Organizational Legitimacy 59
6.2.2 Socialpolitical Organizational Legitimacy 60
6.2.3 Cognitive Intraindustry Legitimacy 62
6.2.4 Socialpolitical Intraindustry Legitimacy 63
6.2.5 Cognitive Interindustry Legitimacy 65
6.2.6 Socialpolitical Interindustry Legitimacy 65
6.2.7 Cognitive Institutional Legitimacy 66
6.2.8 Socialpolitical Institutional Legitimacy 67
6.3 Further Implications for Industry Creation Strategy 75

Chapter 7. Conclusion and Contribution 76
7.1 Conclusion 76
7.2 Contribution 78
7.3 Limitations and Future Research 79

References 80


Abrahamson, E., &; Fairchild, G. (1999). Management fashion: Lifecycles, triggers, and collective learning processes. Administrative Science Quarterly, 44, 708-740.
Aldrich, H. E., &; Fiol, M. C. (1994). Fools Rush in: The Institutional Context of Industry Creation. The Academy of Management Review, 19 (4), 645-670.
Armbrust, M., Fox, A., Griffith, R., Joseph, A. D., Katz, R., Konwinski, A., Lee, G., Patterson, D., Rabkin, A., Stoica, I., &; Zaharia, M. (2010). A view of cloud computing. Commun. ACM, 53(4), 50-58. doi: 10.1145/1721654.1721672
Birman, K., Chockler, G., &; Van-Renesse, R. (2009). Toward a Cloud Computing Research Agenda. ACM SIGACT News, 40(2), 68-80.
Carr, N. (2009). The Big Switch: Rewiring the World, from Edison to Google.: W. W. Norton &; Company.
Chang, C. H., Yang, C. T., Lu, C. W., Chen, J. N., Hsiung, P. A., Chu, C. C., &; Lee, H. M. (2012). Cloud computing in Taiwan. Computer, 45(6), 48-56. doi: 10.1109/MC.2012.188
Chen, W. C., Hu, C. H., Hsu, Y. Y., Chu, C. C., Wu, C. S., Huang, C. C., Huang, Y. T., Young, H. C., &; Liang, K. H. (2011). Design and Implementation of CHT Cloud-Centric BSS/OSS. Telecom Research, 41(3), 487-502.
Cusumano, M. (2010). Cloud Computing and SaaS as New Computing Platforms. Communications of the ACM, 53(4), 27-29.
David, R. J., Sine, W. D., &; Haveman, H. A. (2013). Seizing Opportunity in Emerging Fields: How Institutional Entrepreneurs Legitimated the Professional Form of Management Consulting. Organization Science, 24(2), 356-377.
DiMaggio, P. J., &; Powell, W. W. (1983). The Iron Cage Revisited Institutional Isomorphism and Collective Rationality in Organization Fields. American Sociological Review, 48(2), 147-160.
Egwutuoha, I. P., Schragl, D., &; Calvo, R. (2013). A Brief Review of Cloud Computing, Challenges and Potential Solutions. Parallel and Cloud Computing, 2(1), 7-14.
Ericsson. (2012). The Telecom Cloud Opportunity (pp. 1-13): Ericsson.
Fernando, N., Loke, S. W., &; Rahayu, W. (2013). Mobile cloud computing: A survey. Future Generation Computer Systems,, 29(1), 84–106.
Geczy, P., Izumi, N., &; Hasida, K. (2012). Cloudsourcing: Managing Cloud Adoption. Global Journal of Business Research, 6(2), 57-70.
Gardner, H. K., Anand, N., &; Morris, T. (2008). Chartering new territory : diversification, legitimacy, and practice area creation in professional service firms. Journal of Organizational Behavior, 29, 1101-1121.
Garud, R., Jain, S., &; Kumaraswamy, A. (2002). Institutional entrepreneurship in the sponsorship of common technical standards: The case of Sun Microsystems and Java. Academic Management Journal, 45, 196–214.
Greenwood, R., Suddaby, R., &; Hinings, C. (2002a). Theorizing Change: The Role of Professional Associations in the Transformation of Institutionalized Fields. Academic Management Journal, 45, 58–80.
Greenwood, R., Suddaby, R., &; Hinings, C. R. (2002b). Theorizing change: The role of professional associations in the transformation of institutionalized fields. Academic Management Journal, 45, 58–80.
Haag, S., &; Eckhardt, A. (2014). Organizational cloud service adoption: a scientometric and content-based literature analysis. Journal of Business Economics, 84(2), 1-34.
Hannan, M. T., &; Carroll, G. R. (1992). Dynamics of organizational populations: Density, legitimation, and competition. New York: Oxford University Press.
Hannan, M. T., &; Freeman, J. H. (1986). Where do organizational forms come? Sociological Forum, 1, 50-72.
Hargadon, B., &; Douglas, Y. (2001). When Innovations Meet Institutions: Edison and the Design of the Electric Light. Administrative Science Quarterly, 46, 476-501.
Hargreaves, S. (2003). Conceptualising Legitimacy for New Venture Research. Paper presented at the Small Enterprise Association of Australia and New Zealand 16th Annual Conference, Ballarat.
Hoberg, P., Wollersheim, J., &; Krcmar, H. (2012). The business perspective on cloud computing: a literature review of research on cloud computing. Paper presented at the 18th Americas conference on information systems, Seattle.
IBM. (2012). Exploring the role of ecosystems in evolving cloud markets (pp. pp.1-12): IBM.
Kunsemoller, J., &; Karl, H. (2011). A game-theoretical approach to the benefits of cloud computing. Paper presented at the 8th international conference on Economics of Grids, Clouds, Systems, and Services.
Koehler, P., Anandasivam, A., Dan, M., &; Weinhardt, C. (2010). Customer heterogeneity and tariff biases in cloud computing. Paper presented at the 31st international conference on information systems, St.Louis.
Kumar, K., &; Lu, Y. H. (2010). Cloud Computing for Mobile Users: Can Offloading Computation Save Energy. Computer, 43(4), 51–56.
Leavitt, N. (2009). Is Cloud Computing Really Ready for Prime Time. Computer, 42(1), 15-20.
Leimeister, S., Riedl, C., Bohm, M., &; Krcmar, H. (2010). The Business Perspective of Cloud Computing: Actors, Roles and Value Networks. Paper presented at the 18th European Conference on Information Systems (ECIS 2010), Pretoria, South Africa.
Link, B. G. (1987). Understanding labeling effects in the area of mental disorders: An assessment of the effects of expectations of rejection. American Sociological Review, 52, 96-112.
Lounsbury, M., &; Crumley, E. T. (2007). New practice creation: An institutional perspective on innovation. Organational Study, 28, 993-1012.
Low, C., Chen, Y., &; Wu, M. (2011). Understanding the determinants of cloud computing adoption. Industrial Management &; Data Systems, 111(7), 1006-1023.
Maguire, S., Hardy, C., &; Lawrence, T. B. (2004). Institutional entrepreneurship in emerging fields: HIV/AIDS treatment advocacy in Canada. . Academic Management Journal, 47, 657–679.
Martens, B., Poeppelbuss, J., &; Teuteberg, F. (2011). Understanding the Cloud Computing Ecosystem: Results from a Quantitative Content Analysis. Paper presented at the 10th International Conference on Wirtschaftsinformatik, Wirtschaftinformatiks.
Mell, P., &; Grance, T. (2011). The NIST Definition of Cloud Computing. . National Institute of Standards and Technology, Information Technology Laboratory, 15.
Meyer, J., &; Rowan, B. (1977). Institutionalized organizations: Formal structure as myth and ceremony. American Journal of Sociology, 83, 340-363.
Microsoft. (2011). Microsoft Survey Highlights Cloud Movement Across the US: Microsoft.
Motta, G., Sfondrini, N., &; Sacco, D. (2012). Cloud Computing: a Business and Economical Perspective. Paper presented at the 2012 International Joint Conference on Service Sciences.
Ou-Yang, S., &; Hsu, C. (2011). The organizing Vision for Cloud Computing in Taiwan. Journal of electronic Commerce Research, 12(4), 257-271.
Powell, W. W., White, D. R., Koput, K. W., &; Smith, J. O. (2005). Network dynamics and field evolution. American Journal Sociol, 110, 1132–1205.
Reay, T., Golden-Biddle, K., &; GermAnn, K. (2006). Legitimizing a new role: Small wins and microprocesses of change. Academic Management Journal, 49, 977–998.
Romanelli, E. (1989). Organization birth and population variety: A community perspective on origins. (Vol. 11). Greenwich, CT JAI Press.
Saya, S., Pee, L., &; Kankanhalli, A. (2010). The Impact on Instituional Influences on Perceived Technological Characteristics and Real Option in Cloud Computing Adoption. Paper presented at the International Conference of Information System.
Scott, W. R. (1995). Instituions and organizations. Thousand Oaks, CA: Sage.
Stinchcombe, A. L. (1965). Social Structure and Organizations. In J. G. March (Ed.), Handbook of Organization (pp. 142-193). Chicago: Rand McNally.
Su, N. (2011). Emergence Of Cloud Computing: an Institutional Innovation Perspective. Paper presented at the Thirty Second International Conference on Information Systems, Shanghai.
Subashini, S., &; Kavitha, V. (2011). A Survey on Security Issues in Service Delivery Models of Cloud Computing. Journal of Network and Computer Applications, 34(1), 1-11.
Suchman, M. C. (1995). Managing Legitimacy: Strategic and Institutional Approaches. Academy of Management Review, 20(3), 571-610.
Sultan, N. A. (2011). Reaching for the cloud: How SMEs can manage. International Journal of Information Management, 31, 272–278.
Tai, W. C., Chu, Y. H., Chen, Y. J., Huang, J., Hsu, H. J., Hsieh, C. T., Chang, Y. C., Chang, L. M., &; Ko, C. H. (2011). The Design and Implementation of Chunghwa Cloud Computing Testing Center. Telecom Research, 41(3), 477-486.
Teng, C. C., Yang, C. W., Cheng, W. L., Lin, Y. H., Liu, M., &; Hsu, K. S. (2012). Chunghwa Telecom Cloud Services and Network Operation Support System. Telecom Research, 42(4), 959-972.
Turcan, R. V., &; Fraser, N. M. (2012). The Emergence of an International New Software Venture from an Emerging Economy. Paper presented at the The 3rd International Conference on Software Business, Cambridge, United States.
Vaquero, L., Rodero-Merino, L., &; Moran, D. (2011). Locking the Sky: A Survey on IaaS Cloud Security. Computing. Archives for Informatics and Numerical Computation, 91(1), 93.
Vieira, K., Schulter, A., &; Westphall, C. (2010). Intrusion Detection for Grid and Cloud Computing. IT Professional, 12(4), 38.
Vouk, M. A. (2008). Cloud Computing – Issues, Research and Implementations. Journal of Computing and Information Technology, 16(4), 235-246.
Walker, E. T., &; McCarthy, J. D. (2010). Legitimacy, Strategy, and Resources in the Survival of Community-Based Organizations. Social Problems, 57(3), 315-340.
Wang, C., Ren, K., Lou, W., &; Li, J. (2010). Toward Publicly Auditable Secure Cloud Data Storage Services. IEEE Network, 24(4), 5.
Wang, Q., Wang, C., Ren, K., Lou, W., &; Li, J. (2011). Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing. . Parallel and Distributed Systems, IEEE Transactions., 22(5), 847–859.
Warneke, D., &; Kao, O. (2011). Exploiting Dynamic Resource Allocation for Efficient Parallel Data Processing in the Cloud. Parallel and Distributed Systems, IEEE Transactions., 22(6), 985–997.
Weinhardt, C., Anandasivam, A., Blau, B., &; Stosser, J. (2009). Business Models in the Service World. IT Professional, 11(2), 28.
Wong, W. C. (2011). The trend and perspective of cloud computing in Taiwan. (Vol. 12, pp. 14-18). Taipei: MIC.
Wu, M. Y., Hsu, C. C., Hung, C. F., &; Ho, Y. C. (2011). Plan and Design of CHT Cloud Computing Service Development Platform. Telecom Research, 41(3), 503-514.
Xin, M., &; Levina, N. (2008). Software-as-a-service model: Elaborating client-side adoption factors. Paper presented at the The International Conference on Information Systems, ICIS., Paris, France.
Xu, B., Zhao, C., Hu, E., &; Hu, B. (2011). Job Scheduling Algorithm Based on Berger Model in Cloud Environment. Advances in Engineering Software, 42(7), 419-425.
Yang, H., &; Tate, M. (2012). A Descriptive Literature Review and Classification of Cloud Computing Research. Communications of the Association for Information Systems, 31, 35-60.
Yunis, M. (2010). A ‘Cloud-free’ Security Model for Cloud Computing. International Journal of Services and Standards, 5, 354.
Zhang, Q., Cheng, L., &; Boutaba, R. (2010). Cloud Computing: State-of-the-art and Research Challenges. Journal of Internet Services and Applications, 1(1), 7–18.
Zimmerman, M. A., &; Zeitz, G. J. (2002). Beyond Survival : Achieving New Venture Growth By Building Legitimacy. The Academy of Management Review, 27(3), 414-431.
Zissis, D., &; Lekkas, D. (2010). Addressing Cloud Computing Security Issues. Future Generation Computer Systems, 28(3), 583-592.

QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top
無相關期刊
 
系統版面圖檔 系統版面圖檔