f Journal of Information Management | 期刊檢索

Journal of Information ManagementVol. 18 iss. 2


邵敏華;許家豪;
頁: 1-16
日期: 2011/04
關鍵字: Peer-to-peer;Free-rider;Dynamic access strategy;Feedback validation strategy;Reputation management;
Keywords: Peer-to-peer;Free-rider;Dynamic access strategy;Feedback validation strategy;Reputation management;
摘要: Peer-to-peer technology presents a realization of the internet and IT network in which it is a usual practice of content sharing over P2P systems. However, file quality unevenness and free-rider problems along with the development of network communit...

瀏覽次數: 40373     下載次數: 2612

引用     導入Endnote
齊德彰;洪敘峰;
頁: 17-42
日期: 2011/04
關鍵字: Supplier Evaluation Model;SEM;RST;
Keywords: Supplier Evaluation Model;SEM;RST;
摘要: The purpose of this study is to build a model for supplier selection to improve organizational capability and competitiveness, and apply the model to solve the practical problems of supplier selection. First, this paper reviewed fourteen important li...

瀏覽次數: 33718     下載次數: 432

引用     導入Endnote
薛夙珍;呂瑞麟;白琤瑜;
頁: 43-71
日期: 2011/04
關鍵字: Adaptive learning;role-based access control;pedagogical rule;
Keywords: Adaptive learning;role-based access control;pedagogical rule;
摘要: In recent years, the adaptive learning becomes a hot spot topic, many various planning mechanisms of adaptive learning according to different learning styles, requirements and progress of learners are proposed to promote the learning effectiveness an...

瀏覽次數: 38040     下載次數: 3459

引用     導入Endnote
楊欣哲;謝明宏;
頁: 73-97
日期: 2011/04
關鍵字: XML;Network Management System;RSS;Management Information Base;Fault Management;
Keywords: XML;Network Management System;RSS;Management Information Base;Fault Management;
摘要: The fault management is one of five essential network management tasks defined by ISO 7498-4. Fault detection and notification are the key pre-process of all the fault management, it is noted that the network manager can use the disposal time of the ...

瀏覽次數: 44108     下載次數: 5445

引用     導入Endnote
黃貞芬;汪美香;
頁: 99-130
日期: 2011/04
關鍵字: Career Anchors;MIS Undergraduates;Career Management;IS Professionals;Longitudinal Research;
Keywords: Career Anchors;MIS Undergraduates;Career Management;IS Professionals;Longitudinal Research;
摘要: The career anchors of IS professionals play an important role in affecting the selection of occupations. MIS students are one of the principal sources for IS employees. Insight in the career anchors of MIS students provides information that can help ...

瀏覽次數: 40831     下載次數: 356

引用     導入Endnote
蕭瑞麟;廖啟旭;陳蕙芬;
頁: 131-160
日期: 2011/04
關鍵字: structuration theory;technology adoption;technology transfer;work practices;organizing practices;qualitative methods;
Keywords: structuration theory;technology adoption;technology transfer;work practices;organizing practices;qualitative methods;
摘要: In the analysis of technology adoption, the prior literature stresses on either technology functions or organizational constraints enacted by institutions. However, relatively few studies focused on the structural properties embedded in information s...

瀏覽次數: 42478     下載次數: 473

引用     導入Endnote
劉家儀;郭峰淵;
頁: 161-182
日期: 2011/04
關鍵字: creative self-efficacy;ethical self-efficacy concerning software piracy;social sanction;self sanction;software piracy;
Keywords: creative self-efficacy;ethical self-efficacy concerning software piracy;social sanction;self sanction;software piracy;
摘要: Today, the problem of piracy is a major concern for governments, academia and software industry as it has become a prevailing phenomenon. While much effort has been devoted to identify the factors that cause software piracy, most studies focus primar...

瀏覽次數: 36170     下載次數: 404

引用     導入Endnote
陳岳陽;
頁: 183-213
日期: 2011/04
關鍵字: Knowledge Management Strategy;Strategic IT Management;Strategic Alignment;Knowledge Management Performance;
Keywords: Knowledge Management Strategy;Strategic IT Management;Strategic Alignment;Knowledge Management Performance;
摘要: Recently, both researchers and practitioners have started to realize the importance of the information technology (IT) for effective KM activities. It is found that an organization which was high quality in both KM and IT fit achieved high KM perform...

瀏覽次數: 40416     下載次數: 6120

引用     導入Endnote
李金鳳;簡宏宇;賴溪松;
頁: 215-235
日期: 2011/04
關鍵字: security;key agreement;insider attack;STS;forward secrecy;man-in-the-middle attack;
Keywords: security;key agreement;insider attack;STS;forward secrecy;man-in-the-middle attack;
摘要: The Station-to-Station (STS) protocol is a well known two-party key agreement scheme that provides mutual entity authentication, key confirmation and forward secrecy. Al-Riyami and Paterson (2003) extended the STS protocol to the tripartite case, whi...

瀏覽次數: 30029     下載次數: 1917

引用     導入Endnote