跳到主要內容

臺灣博碩士論文加值系統

(18.97.14.85) 您好!臺灣時間:2024/12/12 12:04
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

我願授權國圖
: 
twitterline
研究生:徐英訓
研究生(外文):HSU, YING-HSUN
論文名稱:物聯網世代智能監控商業模式之研究
論文名稱(外文):A Study on the Business Model of Intelligent Monitoring in Internet of Things Age
指導教授:吳忠敏吳忠敏引用關係
指導教授(外文):Chung-Min Wu Ph.D.
口試委員:陳俊廷蔡榮發
口試委員(外文):Jung-Fa Tsai, Ph.D.
口試日期:2017-06-02
學位類別:碩士
校院名稱:國立臺北科技大學
系所名稱:經營管理系碩士在職專班
學門:商業及管理學門
學類:其他商業及管理學類
論文種類:學術論文
論文出版年:2017
畢業學年度:105
語文別:中文
論文頁數:83
中文關鍵詞:智能監控商業模式情境分析法
外文關鍵詞:Video surveillanceBusiness modelScenario planning
相關次數:
  • 被引用被引用:1
  • 點閱點閱:187
  • 評分評分:
  • 下載下載:0
  • 收藏至我的研究室書目清單書目收藏:0
物聯網世代與工業 4.0 浪潮下,全球各地正連結著數十億個感應裝置,分佈在各
種智慧工廠環境監控,交通與醫療系統,智慧零售及服務等產業,這些連結的感應裝
置不斷地蒐集擷取前所未見的大量數據,物與物之間不斷的相互溝通。在 2020 年後,
各工業垂直市場預計將有五千億個連結裝置及超過五百萬個應用程式,成功應用在各
種工業應用領域.迎接物聯網世代帶來的巨大商機,產業合作成為致勝關鍵,而智能
監控扮演著舉足輕重的角色,而其商業模式的運作及調整就顯得格外重要。本研究採
用專家訪談以及情境分析法,產出智能監控大數據的情境,來推演四個未來可能的情
境,並從經濟角度選出已日乃革為最具發展潛力的情境,並以 Osterwalder 九宮格商
業模式架構發展其商業模式。

在已日乃革情境推演結論,智能監控導出客戶價值主張,是大數據分析導入 AI
人工智慧情境中,商業模式的核心價值,及提供專業數據分析服務將是獲利商業模式。
智能監控大數據的趨勢已經確立,對於系統整合業者建議是瞭解目標產業需求及強化
軟實力,從提供大數據來導入 AI 人工智慧服務的定位來達到獲利目標。
Under the era of Internet of Things and the industrial 4.0 wave,the world is connected
with billions of sensing devices which are distributed in a variety of intelligent
factories,such as environmental monitoring,mass transportation system, intellectual-
agricultural retailment and service industries. These connecting sensors capture our
unprecedented and unforseeable large amounts of data.
After 2020,the industrial vertical market will be expected to have 500 billion
connections and 5 million industrial applications successfully applied in a variety of
industrial applications. Meeting the networking applications brought about by the
tremendous business opportunities, industrial cooperation has become the key to success.
Intelligent monitoring plays a very important role in it, and moreover,running and adjusting
business mode seems to be extremely important.
This study interviewed with experts and analyzing the scenario and it brings out four
possible scenarios in the future with the intelligent monitoring data. Also, we picked the
most potential scenario from economic view, and used the construction of Osterwalder’s 3-
by-3-grid business mode to prove it.
To the conclusion,intelligent monitoring should provide customer’s value
proposition, and use big data to offer artificial intelligence’s running factors to be its
winning business mode. The trend of intelligent monitoring data has been established,this
research suggests that system-organizing business should understand its industry demand
and enhance its soft power, and set its point from offering AI data to gain profit,the final
goal.
目錄
第一章 緒論 1
1.1 研究背景與動機 1
1.2 研究目的 2
1.3 研究範圍與步驟 3
1.4 研究架構 4
第二章 文獻探討 6
2.1 物聯網產業發展 6
2.1.1 物聯網的定義 6
2.1.2 物聯網發展 8
2.1.3 物聯網市場應用技術趨勢 10
2.1.4 物聯網所面臨的挑戰 14
2.1.5 物聯網潛在商機 15
2.2 智能監控產業發展現況與分析 17
2.2.1 智能監控應用趨勢與市場發展分析 20
2.2.2 全球市場需求 23
2.3 雲端服務 23
2.3.1 雲端服務之定義 24
2.3.2 雲端服務之服務模式 25
2.3.3 雲端服務之特色 29
2.4 商業模式 32
2.4.1 商業模式定義 32
2.4.2 商業模式之組成要素 34
2.4.3 商業模式的競爭 35
2.5 情境分析法 36
2.5.1 情境分析基本觀念 36
2.5.2 情境分析的適用原則 36
2.5.3 情境分析執行 37
第三章 研究方法 41
3.1 研究步驟流程 41
3.2 專家深度訪談 42
3.3 情境分析法 43
第四章 情境發展與商業模式的建立 48
4.1 情境發展 48
4.2 形成情境軸面 54
4.2.1 出師未捷 55
4.2.2 利涉大川 56
4.2.3 鴻漸於陸 57
4.2.4 已日乃革 58
4.2.5 情境選擇 60
4.3 建立商業模式 61
4.3.1 價值主張與目標客戶 66
4.3.2 客戶關係與行銷通路 67
4.3.3 營收模式 67
4.3.4 關鍵活動與關鍵資源 68
4.3.5 成本結構 69
4.3.6 合作網絡 69
第五章 結論與建議 71
5.1 研究結論 71
5.2 研究建議 72
參考文獻 74
附錄 80
中文文獻
1.鐘明男,雲端服務可獲利商業模式之探索性研究。國立台灣科技大學資訊管理系。EMBA 碩士學位論文,2009。
2.邱奕璿,藉由情境分析法發展影像監控即服務的商業模式,國立臺北科技大學管理學院經營管理 EMBA 專班碩士論文,2012。
3.楊威國,建構物聯網服務系統評選模式-以智慧家庭系統為例,國立高雄應用科技大學資訊管理系碩士在職專班碩士論文,2015,第 4-6頁。
4.林松毅,物聯網之前瞻研究,開南大學多媒體與行動商務學系碩士論文,2013,第22~26頁。
5.張菀茹,微型企業的價值創造:餐飲業商業模式為例,國立雲林科技大學企業管理系碩士論文,2016,第42-50頁。
6.陳俊綸,台灣有機化粧品規範與商業模式探討,嘉南藥理大學化粧品應用與管理系化粧品科技碩士班碩士論文,2016,第92-105頁。
7.黃長泰、吳吉政,結合商業生態系統與情境分析法探討我國中小型車載資通訊服務商之利基者策略-以OOO公司為例,第 15 屆科技整合管理研討會,2012。
8.張冠群,醫療產業導入雲端服務關鍵成功因素,國立臺北科技大學管理學院經營管理 EMBA 專班碩士論文,2012,臺北,第20-29頁。
9.許孟祥,黃博信,張兆翔,探討雲端計算對企業商業模式之衝擊:以 Google、Amazon 及趨勢科技為例。ICIM2009 第二十屆國際資訊管理學術研討會:2385-2844。台北市,2009。
10.余序江、許志義、陳澤義,科技管理導論:科技預測與規劃,臺北市:五南圖書出版有限公司,1998,第84-103頁。
11.產業情報研究所 MIC (2009)。雲端運算應用趨勢與我國商機研究,第 1-110頁。
12.張宛茹,微型企業的價值創造:餐飲業商業模式為例。國立雲林科技大學企業管理系碩士論文,2012,第32-頁
13.吳顯東(2005),SRI 情境分析方法,資訊工業策進會。


網路文獻資料:
1.DIGITIMES企劃(2010.05.09)。物聯網為智慧家庭帶來的無限商機,
DIGITIMES活動網,2017年11月06日,取自:
http://www.digitimes.com.tw/tw/b2b/Seminar/shwnws_new.asp?Cnl
ID=18&cat=99&product_id=051A20418&id=0000333269_XEY1V4 B07O1QLI8ZX27UQ2
2.價值主張世代 http://topic.cw.com.tw/value-proposition-design/
3.獲利世代 http://www.books.com.tw/products/0010567254
4.IBM,http://www.ibm.com/ibm/cloud/
5.壹讀網,2017視頻監控行業應用趨勢與市場發展分析 https://read01.com/3xOR84.html
6.NIST,2009,http://csrc.nist.gov/groups/SNS/cloud-computing/
7.李傑(2010.07.08)。歷數物聯網三大硬傷“成本、安全和隱私”,
PCPOP,2012年07月23日,取自:http://www.cioage.com/art/201007/88923.htm
8.廖峻鋒,物聯網(IoT):技術與應用,政治大學,Department of Computer Science National Chengchi University,Page 16
https://cc.video.nccu.edu.tw/sysdata/doc/3/37e3ab8046a35fea/pdf.pdf
9.Heiser, J., and Nicolett, M., 2008. Assessing the Security Risks of Cloud Computing, Technical report, Gartner, http://www.gartner.com/DisplayDocument?id=685308, June 3.
10.ITU.,2005,“ITU Internet Reports 2005: The Internet of Things”, Geneva:
International Telecommunication Union (ITU), Retrieved June 11, 2015
http://www.itu.int/osg/spu/downloads.

英文部分
1.Osterwalder (2004),The Business Model Ontology -a proposition in a design science approach.University of Lausanne, Switzerland.
2.Osterwalder & Yves Pigneur & Tucci, C. L. (2005), Clarifying Business Models: Origins, Present, and Future of the Concept Communications of AIS, vol.15, pp. 1-40.
3.Osterwalder A & Yves Pigneur (2010). Business Model Generation. John Wiley & Sons Inc. Hoboken, New Jersey.
4.Osterwalder A., Pigneur Y., Smith A., and Bernarda G., (2015), ”Value Proposition Design”, pp. 10-43.
5.Bao, D., Xiao, Z., Sun, Y., and Zhao, J. (2010, August). A Method and
Framework for Quality of Cloud Service Measurement, 3rd, International
Conference on Advanced Computer Theory and Engineering.
6.Brodkin, J. (2008). Cloud computing hype spurs confusion, Gartner says,
Computerworld.
7.Chesbrough, H. (2006), Open Business Model, Harvard Business School Press.
8.Casadesus-Masanell, R., and Ricart, J. E. (2011), How to Design a Winning Business Model, Harvard Business Review articles.
9.Collopy, F., and Boland, R. J. (2004), Managing as Designing, Stanford University Press.
10.Chesbrough, H., 2003, Open innovation: The new imperative for creating and profiting from technology, Boston, MA: Harvard Business School Press.
11.Chesbrough, H., 2010, Business Model Innovation: Opportunities and Barriers, Long Range Planning, Vol.43, no.3, pp.354-363.
12.Chesbrough, 2006. Open Business Model-How to thrive in the new innovation landscape: Harvard Business School Press.
13.Das, T. K., and Teng, B.2000,A Resource-based Theory of Strategic Alliances.Journal of Management, vol.26,pp. 31-61.
14.Dubbson-Torbay, Alexander, and Pigneur.2001,E-business model design,
classification and measurements. Thunderbird International Business Review, vol.44,no.1,pp. 5-23.
15.Erdogmus, H. (2009). Cloud Computing: Does Nirvana Hide behind the Nebula? IEEE software, Vol. 26, No. 2, pp. 4-6.
16.Gelernter, D. H. (1992), Mirror Worlds, Oxford University Press.
17.Girotra, K., and Netessine, S., How to Build Risk into Your Business Model, Harvard Business Review articles.
18.Gansky, L. (2010), The Mesh, Penguin Group.
19.Gordon, R. J. (2012), Is U.S. Economic Growth Over? Faltering Innovation Confronts The Six Headwinds, National Bureau of Economic Research Working Paper No. 18315.
20.Grossman, R. L. (2009). The case for cloud computing, IT Professional, Vol. 11, No. 2, pp. 23-27. Heiser and Nicolett, 2008;
21.Johnson, Christensen, and Kagermann .2008, Johnson, M. W., Christensen, C. M., & Kagermann, H. 2008, Reinventing your business model. Harvard business review, vol.86, no.12, pp. 57-68.
22.Johnson, M. W., Christensen, C. M., & Kagermann, H. 2008, Reinventing your business model. Harvard Business Review, vol.86,no.12,pp. 50-59.
23.Kaufman, L.M., (2010), Can a Trusted Environment Provide Security?, IEEE Journal Security and Privacy, Vol. 8, Issue 1, pp. 50-52.
24.Klems, M., Nimis, J., and Tai, S., (2009) “Do Clouds Compute? A Framework for Estimating the Value of Cloud Computing, ” Springer Berlin Heidelberg.
25.Kim, W., (2009), Cloud Computing: Today and Tomorrow, Journal of Object Technology, Vol. 8, No. 1, pp.65-72.
26.Lin, Ming-jie., & Zang,Jin-guo., 2011, “The Application and Development of Internet of Things with its Solutions of Restrictive Factors”. In Mechatronic Science, Electric Engineering and Computer (MEC), 2011 International Conference on, pp. 282-285.
27.Leavitt, N. (2009). Is cloud computing really ready for prime time? IEEE Computer Society, Vol. 42, No. 1, pp. 15-20.
28.Lin, G., Fu, D., Zhu, J., and Dasmalchi, G. (2009). Cloud computing: IT as a
server, IT professional, Vol. 11, No. 2, pp. 10-13.
29.Lumpkin, G. T., and Dess, G. G.2004,.E-business strategies and Internet bu
siness models:How the Internet adds value. Organizational Dynamics, vol.33,
no.2,pp. 161-173.
30.Magretta, J. (2002), What Management Is, Simon & Schuster Inc.
31.Magretta, J., 2002, ”Why Business Models Matter”, Harvard Business Review,vol. 80,no.5, pp.86-93.
32.Matthew J. Eyring, Mark W. Johnson, Hari Nair(2011/1),New Business Models in Emerging Markets, Harvard Business Review articles.
33.Misra, S. C., and Mondal, A. (2011). Identification of a companys sutiability for the adoption of cloud computing and modelling its corresponding Retrun on Investment, Mathematical and Computer Modelling, Vol. 53, No. 3-4, pp. 504-521.
34.Magretta, J., 2002, ”Why Business Models Matter”, Harvard Business Review, vol. 80,no.5, pp.86-93.
35.Nabil, S., (2010). Cloud Computing for Education: A new dawn? International Journal of Information Management, Vol.30,pp.109-116.
36.Neal, D. J., Rahman, S. (2012), Video Surveillance in the Cloud, International
Journal on Cryptography and Information Security (IJCIS).
37.Porter, M. E. (1980), Competitive Strategies,NY: Free Press.
38.Porter, M. E. (1985),Competitive Advantage,NY: Free Press.
39.Porter, M. E. (1996), What Is Strategy, Harvard Business Review articles.
40.Porter,A.L;Roper,A.T.;Mason,T.M.;Rossini,F.A.,Banks,J.;Wiederholt,
B.J. (1991 )Forecasting and Management of Technology,New
York :John Wiley &Sons,Inc., pp. 94-97,and pp. 259-271.
41.Rosenthal, A., Mork, P., Li, M. H., Stanford, J., Koester, D., and Reynolds, P. (2010). Cloud Computing: A new business paradigm for biomedical information sharing, Journal of Biomedical Information, Vol. 43, No. 2, pp. 342-353.
42.Schoemaker, Paul J. H. (1995), Scenario Planning: A tool for Strategic Thinking, MIT Sloan management review, Volume 36, Issue # 2.
43.Stähler, P. (2002), Business Models as an Unit of Analysis for Strategizing,
Patrick.Staehler@alumni.unisg.ch.
44.Subashini, S., and Kavitha, V. (2011). A survey on security issues in service delivery models of cloud computing, Journal of network and computer application, Vol. 34, No.1, pp. 1-111.
45.Sultan, N. (2010). Cloud computing for education: A new dawn? International Journal of Information Management, Vol. 30, No. 2, pp. 109-116.
46.Shuai, Z., Shufen, Z., Xuebin, C. and Xiuzhen, H., (2010). Cloud Computing
Research and Development Trend. 2010 Second International Conference on
Future Networks, Vol.17,pp.93-97.
47.Subashini, S., and Kavitha, V. (2011). A survey on security issues in service
delivery models of cloud computing, Journal of network and computer
application, Vol. 34, No.1, pp. 1-111.
48.Shafer, S. M., Smith H. J. and Linder, J. C., 2005, “The Power of Business
Models”, Business Horizons, vol.48,no.3,pp. 199-207.
49.Sinfield, J. V., Calder, E., McConnell, B. and Colson, S. 2012, “How to Identify New Business Models”, Sloan Management Review, vol.53,no.2, pp.85-90.
50.Timmers, P., 1998, “Business Models for Electronic Markets”,
Journal on Electronic Markets, vol.8,no.2,pp. 3-8.
51.The Information Technology Security Council (ITSC) and Physical Security Council (PSC) (2010), Cloud Computing and Software as a Service (SaaS), ASIS International.
52.Truong, H. L., and Dustdar, S. (2010). Composable cost estimation and
76 monitoring for computational applications in cloud computing environments, Procedia Computer Science, Vol. 1, No. 1, pp. 2175-2184.
53.Yu, C., 2011, “Research and Design of Logistics Management System Based
on Internet of Things”, In Artificial Intelligence, Management Science and
Electronic Commerce (AIMSEC), 2011 2nd International Conference on, pp.
6314-6317.
連結至畢業學校之論文網頁點我開啟連結
註: 此連結為研究生畢業學校所提供,不一定有電子全文可供下載,若連結有誤,請點選上方之〝勘誤回報〞功能,我們會盡快修正,謝謝!
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top