Journal of Information ManagementVol. 18 iss. 2
邵敏華;許家豪;
頁: 1-16
日期: 2011/04
關鍵字: Peer-to-peer;Free-rider;Dynamic access strategy;Feedback validation strategy;Reputation management;
Keywords: Peer-to-peer;Free-rider;Dynamic access strategy;Feedback validation strategy;Reputation management;
摘要: Peer-to-peer technology presents a realization of the internet and IT network in which it is a usual practice of content sharing over P2P systems. However, file quality unevenness and free-rider problems along with the development of network communit...
瀏覽次數: 27808 下載次數: 2437
引用 導入Endnote
頁: 1-16
日期: 2011/04
關鍵字: Peer-to-peer;Free-rider;Dynamic access strategy;Feedback validation strategy;Reputation management;
Keywords: Peer-to-peer;Free-rider;Dynamic access strategy;Feedback validation strategy;Reputation management;
摘要: Peer-to-peer technology presents a realization of the internet and IT network in which it is a usual practice of content sharing over P2P systems. However, file quality unevenness and free-rider problems along with the development of network communit...
瀏覽次數: 27808 下載次數: 2437
引用 導入Endnote
齊德彰;洪敘峰;
頁: 17-42
日期: 2011/04
關鍵字: Supplier Evaluation Model;SEM;RST;
Keywords: Supplier Evaluation Model;SEM;RST;
摘要: The purpose of this study is to build a model for supplier selection to improve organizational capability and competitiveness, and apply the model to solve the practical problems of supplier selection. First, this paper reviewed fourteen important li...
瀏覽次數: 23670 下載次數: 278
引用 導入Endnote
頁: 17-42
日期: 2011/04
關鍵字: Supplier Evaluation Model;SEM;RST;
Keywords: Supplier Evaluation Model;SEM;RST;
摘要: The purpose of this study is to build a model for supplier selection to improve organizational capability and competitiveness, and apply the model to solve the practical problems of supplier selection. First, this paper reviewed fourteen important li...
瀏覽次數: 23670 下載次數: 278
引用 導入Endnote
薛夙珍;呂瑞麟;白琤瑜;
頁: 43-71
日期: 2011/04
關鍵字: Adaptive learning;role-based access control;pedagogical rule;
Keywords: Adaptive learning;role-based access control;pedagogical rule;
摘要: In recent years, the adaptive learning becomes a hot spot topic, many various planning mechanisms of adaptive learning according to different learning styles, requirements and progress of learners are proposed to promote the learning effectiveness an...
瀏覽次數: 26508 下載次數: 3305
引用 導入Endnote
頁: 43-71
日期: 2011/04
關鍵字: Adaptive learning;role-based access control;pedagogical rule;
Keywords: Adaptive learning;role-based access control;pedagogical rule;
摘要: In recent years, the adaptive learning becomes a hot spot topic, many various planning mechanisms of adaptive learning according to different learning styles, requirements and progress of learners are proposed to promote the learning effectiveness an...
瀏覽次數: 26508 下載次數: 3305
引用 導入Endnote
楊欣哲;謝明宏;
頁: 73-97
日期: 2011/04
關鍵字: XML;Network Management System;RSS;Management Information Base;Fault Management;
Keywords: XML;Network Management System;RSS;Management Information Base;Fault Management;
摘要: The fault management is one of five essential network management tasks defined by ISO 7498-4. Fault detection and notification are the key pre-process of all the fault management, it is noted that the network manager can use the disposal time of the ...
瀏覽次數: 30239 下載次數: 5328
引用 導入Endnote
頁: 73-97
日期: 2011/04
關鍵字: XML;Network Management System;RSS;Management Information Base;Fault Management;
Keywords: XML;Network Management System;RSS;Management Information Base;Fault Management;
摘要: The fault management is one of five essential network management tasks defined by ISO 7498-4. Fault detection and notification are the key pre-process of all the fault management, it is noted that the network manager can use the disposal time of the ...
瀏覽次數: 30239 下載次數: 5328
引用 導入Endnote
黃貞芬;汪美香;
頁: 99-130
日期: 2011/04
關鍵字: Career Anchors;MIS Undergraduates;Career Management;IS Professionals;Longitudinal Research;
Keywords: Career Anchors;MIS Undergraduates;Career Management;IS Professionals;Longitudinal Research;
摘要: The career anchors of IS professionals play an important role in affecting the selection of occupations. MIS students are one of the principal sources for IS employees. Insight in the career anchors of MIS students provides information that can help ...
瀏覽次數: 28029 下載次數: 238
引用 導入Endnote
頁: 99-130
日期: 2011/04
關鍵字: Career Anchors;MIS Undergraduates;Career Management;IS Professionals;Longitudinal Research;
Keywords: Career Anchors;MIS Undergraduates;Career Management;IS Professionals;Longitudinal Research;
摘要: The career anchors of IS professionals play an important role in affecting the selection of occupations. MIS students are one of the principal sources for IS employees. Insight in the career anchors of MIS students provides information that can help ...
瀏覽次數: 28029 下載次數: 238
引用 導入Endnote
6. When Oranges Become Sour: An Analysis of Organizing Practices in Cross-context Technology Adoption
蕭瑞麟;廖啟旭;陳蕙芬;
頁: 131-160
日期: 2011/04
關鍵字: structuration theory;technology adoption;technology transfer;work practices;organizing practices;qualitative methods;
Keywords: structuration theory;technology adoption;technology transfer;work practices;organizing practices;qualitative methods;
摘要: In the analysis of technology adoption, the prior literature stresses on either technology functions or organizational constraints enacted by institutions. However, relatively few studies focused on the structural properties embedded in information s...
瀏覽次數: 29519 下載次數: 319
引用 導入Endnote
頁: 131-160
日期: 2011/04
關鍵字: structuration theory;technology adoption;technology transfer;work practices;organizing practices;qualitative methods;
Keywords: structuration theory;technology adoption;technology transfer;work practices;organizing practices;qualitative methods;
摘要: In the analysis of technology adoption, the prior literature stresses on either technology functions or organizational constraints enacted by institutions. However, relatively few studies focused on the structural properties embedded in information s...
瀏覽次數: 29519 下載次數: 319
引用 導入Endnote
劉家儀;郭峰淵;
頁: 161-182
日期: 2011/04
關鍵字: creative self-efficacy;ethical self-efficacy concerning software piracy;social sanction;self sanction;software piracy;
Keywords: creative self-efficacy;ethical self-efficacy concerning software piracy;social sanction;self sanction;software piracy;
摘要: Today, the problem of piracy is a major concern for governments, academia and software industry as it has become a prevailing phenomenon. While much effort has been devoted to identify the factors that cause software piracy, most studies focus primar...
瀏覽次數: 25145 下載次數: 275
引用 導入Endnote
頁: 161-182
日期: 2011/04
關鍵字: creative self-efficacy;ethical self-efficacy concerning software piracy;social sanction;self sanction;software piracy;
Keywords: creative self-efficacy;ethical self-efficacy concerning software piracy;social sanction;self sanction;software piracy;
摘要: Today, the problem of piracy is a major concern for governments, academia and software industry as it has become a prevailing phenomenon. While much effort has been devoted to identify the factors that cause software piracy, most studies focus primar...
瀏覽次數: 25145 下載次數: 275
引用 導入Endnote
8. The Impact of Strategic Alignment between Knowledge Management Strategy and Strategic Information Technology Management on Knowledge Management Performance
陳岳陽;
頁: 183-213
日期: 2011/04
關鍵字: Knowledge Management Strategy;Strategic IT Management;Strategic Alignment;Knowledge Management Performance;
Keywords: Knowledge Management Strategy;Strategic IT Management;Strategic Alignment;Knowledge Management Performance;
摘要: Recently, both researchers and practitioners have started to realize the importance of the information technology (IT) for effective KM activities. It is found that an organization which was high quality in both KM and IT fit achieved high KM perform...
瀏覽次數: 28330 下載次數: 5992
引用 導入Endnote
頁: 183-213
日期: 2011/04
關鍵字: Knowledge Management Strategy;Strategic IT Management;Strategic Alignment;Knowledge Management Performance;
Keywords: Knowledge Management Strategy;Strategic IT Management;Strategic Alignment;Knowledge Management Performance;
摘要: Recently, both researchers and practitioners have started to realize the importance of the information technology (IT) for effective KM activities. It is found that an organization which was high quality in both KM and IT fit achieved high KM perform...
瀏覽次數: 28330 下載次數: 5992
引用 導入Endnote
李金鳳;簡宏宇;賴溪松;
頁: 215-235
日期: 2011/04
關鍵字: security;key agreement;insider attack;STS;forward secrecy;man-in-the-middle attack;
Keywords: security;key agreement;insider attack;STS;forward secrecy;man-in-the-middle attack;
摘要: The Station-to-Station (STS) protocol is a well known two-party key agreement scheme that provides mutual entity authentication, key confirmation and forward secrecy. Al-Riyami and Paterson (2003) extended the STS protocol to the tripartite case, whi...
瀏覽次數: 21465 下載次數: 1724
引用 導入Endnote
頁: 215-235
日期: 2011/04
關鍵字: security;key agreement;insider attack;STS;forward secrecy;man-in-the-middle attack;
Keywords: security;key agreement;insider attack;STS;forward secrecy;man-in-the-middle attack;
摘要: The Station-to-Station (STS) protocol is a well known two-party key agreement scheme that provides mutual entity authentication, key confirmation and forward secrecy. Al-Riyami and Paterson (2003) extended the STS protocol to the tripartite case, whi...
瀏覽次數: 21465 下載次數: 1724
引用 導入Endnote