Journal of Information ManagementVol. 18 iss. 2
邵敏華;許家豪;
頁: 1-16
日期: 2011/04
關鍵字: Peer-to-peer;Free-rider;Dynamic access strategy;Feedback validation strategy;Reputation management;
Keywords: Peer-to-peer;Free-rider;Dynamic access strategy;Feedback validation strategy;Reputation management;
摘要: Peer-to-peer technology presents a realization of the internet and IT network in which it is a usual practice of content sharing over P2P systems. However, file quality unevenness and free-rider problems along with the development of network communit...
瀏覽次數: 40373 下載次數: 2612
引用 導入Endnote
頁: 1-16
日期: 2011/04
關鍵字: Peer-to-peer;Free-rider;Dynamic access strategy;Feedback validation strategy;Reputation management;
Keywords: Peer-to-peer;Free-rider;Dynamic access strategy;Feedback validation strategy;Reputation management;
摘要: Peer-to-peer technology presents a realization of the internet and IT network in which it is a usual practice of content sharing over P2P systems. However, file quality unevenness and free-rider problems along with the development of network communit...
瀏覽次數: 40373 下載次數: 2612
引用 導入Endnote
齊德彰;洪敘峰;
頁: 17-42
日期: 2011/04
關鍵字: Supplier Evaluation Model;SEM;RST;
Keywords: Supplier Evaluation Model;SEM;RST;
摘要: The purpose of this study is to build a model for supplier selection to improve organizational capability and competitiveness, and apply the model to solve the practical problems of supplier selection. First, this paper reviewed fourteen important li...
瀏覽次數: 33718 下載次數: 432
引用 導入Endnote
頁: 17-42
日期: 2011/04
關鍵字: Supplier Evaluation Model;SEM;RST;
Keywords: Supplier Evaluation Model;SEM;RST;
摘要: The purpose of this study is to build a model for supplier selection to improve organizational capability and competitiveness, and apply the model to solve the practical problems of supplier selection. First, this paper reviewed fourteen important li...
瀏覽次數: 33718 下載次數: 432
引用 導入Endnote
薛夙珍;呂瑞麟;白琤瑜;
頁: 43-71
日期: 2011/04
關鍵字: Adaptive learning;role-based access control;pedagogical rule;
Keywords: Adaptive learning;role-based access control;pedagogical rule;
摘要: In recent years, the adaptive learning becomes a hot spot topic, many various planning mechanisms of adaptive learning according to different learning styles, requirements and progress of learners are proposed to promote the learning effectiveness an...
瀏覽次數: 38040 下載次數: 3459
引用 導入Endnote
頁: 43-71
日期: 2011/04
關鍵字: Adaptive learning;role-based access control;pedagogical rule;
Keywords: Adaptive learning;role-based access control;pedagogical rule;
摘要: In recent years, the adaptive learning becomes a hot spot topic, many various planning mechanisms of adaptive learning according to different learning styles, requirements and progress of learners are proposed to promote the learning effectiveness an...
瀏覽次數: 38040 下載次數: 3459
引用 導入Endnote
楊欣哲;謝明宏;
頁: 73-97
日期: 2011/04
關鍵字: XML;Network Management System;RSS;Management Information Base;Fault Management;
Keywords: XML;Network Management System;RSS;Management Information Base;Fault Management;
摘要: The fault management is one of five essential network management tasks defined by ISO 7498-4. Fault detection and notification are the key pre-process of all the fault management, it is noted that the network manager can use the disposal time of the ...
瀏覽次數: 44108 下載次數: 5445
引用 導入Endnote
頁: 73-97
日期: 2011/04
關鍵字: XML;Network Management System;RSS;Management Information Base;Fault Management;
Keywords: XML;Network Management System;RSS;Management Information Base;Fault Management;
摘要: The fault management is one of five essential network management tasks defined by ISO 7498-4. Fault detection and notification are the key pre-process of all the fault management, it is noted that the network manager can use the disposal time of the ...
瀏覽次數: 44108 下載次數: 5445
引用 導入Endnote
黃貞芬;汪美香;
頁: 99-130
日期: 2011/04
關鍵字: Career Anchors;MIS Undergraduates;Career Management;IS Professionals;Longitudinal Research;
Keywords: Career Anchors;MIS Undergraduates;Career Management;IS Professionals;Longitudinal Research;
摘要: The career anchors of IS professionals play an important role in affecting the selection of occupations. MIS students are one of the principal sources for IS employees. Insight in the career anchors of MIS students provides information that can help ...
瀏覽次數: 40831 下載次數: 356
引用 導入Endnote
頁: 99-130
日期: 2011/04
關鍵字: Career Anchors;MIS Undergraduates;Career Management;IS Professionals;Longitudinal Research;
Keywords: Career Anchors;MIS Undergraduates;Career Management;IS Professionals;Longitudinal Research;
摘要: The career anchors of IS professionals play an important role in affecting the selection of occupations. MIS students are one of the principal sources for IS employees. Insight in the career anchors of MIS students provides information that can help ...
瀏覽次數: 40831 下載次數: 356
引用 導入Endnote
6. When Oranges Become Sour: An Analysis of Organizing Practices in Cross-context Technology Adoption
蕭瑞麟;廖啟旭;陳蕙芬;
頁: 131-160
日期: 2011/04
關鍵字: structuration theory;technology adoption;technology transfer;work practices;organizing practices;qualitative methods;
Keywords: structuration theory;technology adoption;technology transfer;work practices;organizing practices;qualitative methods;
摘要: In the analysis of technology adoption, the prior literature stresses on either technology functions or organizational constraints enacted by institutions. However, relatively few studies focused on the structural properties embedded in information s...
瀏覽次數: 42478 下載次數: 473
引用 導入Endnote
頁: 131-160
日期: 2011/04
關鍵字: structuration theory;technology adoption;technology transfer;work practices;organizing practices;qualitative methods;
Keywords: structuration theory;technology adoption;technology transfer;work practices;organizing practices;qualitative methods;
摘要: In the analysis of technology adoption, the prior literature stresses on either technology functions or organizational constraints enacted by institutions. However, relatively few studies focused on the structural properties embedded in information s...
瀏覽次數: 42478 下載次數: 473
引用 導入Endnote
劉家儀;郭峰淵;
頁: 161-182
日期: 2011/04
關鍵字: creative self-efficacy;ethical self-efficacy concerning software piracy;social sanction;self sanction;software piracy;
Keywords: creative self-efficacy;ethical self-efficacy concerning software piracy;social sanction;self sanction;software piracy;
摘要: Today, the problem of piracy is a major concern for governments, academia and software industry as it has become a prevailing phenomenon. While much effort has been devoted to identify the factors that cause software piracy, most studies focus primar...
瀏覽次數: 36170 下載次數: 404
引用 導入Endnote
頁: 161-182
日期: 2011/04
關鍵字: creative self-efficacy;ethical self-efficacy concerning software piracy;social sanction;self sanction;software piracy;
Keywords: creative self-efficacy;ethical self-efficacy concerning software piracy;social sanction;self sanction;software piracy;
摘要: Today, the problem of piracy is a major concern for governments, academia and software industry as it has become a prevailing phenomenon. While much effort has been devoted to identify the factors that cause software piracy, most studies focus primar...
瀏覽次數: 36170 下載次數: 404
引用 導入Endnote
8. The Impact of Strategic Alignment between Knowledge Management Strategy and Strategic Information Technology Management on Knowledge Management Performance
陳岳陽;
頁: 183-213
日期: 2011/04
關鍵字: Knowledge Management Strategy;Strategic IT Management;Strategic Alignment;Knowledge Management Performance;
Keywords: Knowledge Management Strategy;Strategic IT Management;Strategic Alignment;Knowledge Management Performance;
摘要: Recently, both researchers and practitioners have started to realize the importance of the information technology (IT) for effective KM activities. It is found that an organization which was high quality in both KM and IT fit achieved high KM perform...
瀏覽次數: 40416 下載次數: 6120
引用 導入Endnote
頁: 183-213
日期: 2011/04
關鍵字: Knowledge Management Strategy;Strategic IT Management;Strategic Alignment;Knowledge Management Performance;
Keywords: Knowledge Management Strategy;Strategic IT Management;Strategic Alignment;Knowledge Management Performance;
摘要: Recently, both researchers and practitioners have started to realize the importance of the information technology (IT) for effective KM activities. It is found that an organization which was high quality in both KM and IT fit achieved high KM perform...
瀏覽次數: 40416 下載次數: 6120
引用 導入Endnote
李金鳳;簡宏宇;賴溪松;
頁: 215-235
日期: 2011/04
關鍵字: security;key agreement;insider attack;STS;forward secrecy;man-in-the-middle attack;
Keywords: security;key agreement;insider attack;STS;forward secrecy;man-in-the-middle attack;
摘要: The Station-to-Station (STS) protocol is a well known two-party key agreement scheme that provides mutual entity authentication, key confirmation and forward secrecy. Al-Riyami and Paterson (2003) extended the STS protocol to the tripartite case, whi...
瀏覽次數: 30029 下載次數: 1917
引用 導入Endnote
頁: 215-235
日期: 2011/04
關鍵字: security;key agreement;insider attack;STS;forward secrecy;man-in-the-middle attack;
Keywords: security;key agreement;insider attack;STS;forward secrecy;man-in-the-middle attack;
摘要: The Station-to-Station (STS) protocol is a well known two-party key agreement scheme that provides mutual entity authentication, key confirmation and forward secrecy. Al-Riyami and Paterson (2003) extended the STS protocol to the tripartite case, whi...
瀏覽次數: 30029 下載次數: 1917
引用 導入Endnote