f Journal of Information Management | 期刊檢索

Journal of Information ManagementVol. 18 iss. 2


邵敏華;許家豪;
頁: 1-16
日期: 2011/04
關鍵字: Peer-to-peer;Free-rider;Dynamic access strategy;Feedback validation strategy;Reputation management;
Keywords: Peer-to-peer;Free-rider;Dynamic access strategy;Feedback validation strategy;Reputation management;
摘要: Peer-to-peer technology presents a realization of the internet and IT network in which it is a usual practice of content sharing over P2P systems. However, file quality unevenness and free-rider problems along with the development of network communit...

瀏覽次數: 17522     下載次數: 2308

引用     導入Endnote
齊德彰;洪敘峰;
頁: 17-42
日期: 2011/04
關鍵字: Supplier Evaluation Model;SEM;RST;
Keywords: Supplier Evaluation Model;SEM;RST;
摘要: The purpose of this study is to build a model for supplier selection to improve organizational capability and competitiveness, and apply the model to solve the practical problems of supplier selection. First, this paper reviewed fourteen important li...

瀏覽次數: 15548     下載次數: 122

引用     導入Endnote
薛夙珍;呂瑞麟;白琤瑜;
頁: 43-71
日期: 2011/04
關鍵字: Adaptive learning;role-based access control;pedagogical rule;
Keywords: Adaptive learning;role-based access control;pedagogical rule;
摘要: In recent years, the adaptive learning becomes a hot spot topic, many various planning mechanisms of adaptive learning according to different learning styles, requirements and progress of learners are proposed to promote the learning effectiveness an...

瀏覽次數: 17120     下載次數: 3174

引用     導入Endnote
楊欣哲;謝明宏;
頁: 73-97
日期: 2011/04
關鍵字: XML;Network Management System;RSS;Management Information Base;Fault Management;
Keywords: XML;Network Management System;RSS;Management Information Base;Fault Management;
摘要: The fault management is one of five essential network management tasks defined by ISO 7498-4. Fault detection and notification are the key pre-process of all the fault management, it is noted that the network manager can use the disposal time of the ...

瀏覽次數: 18668     下載次數: 5226

引用     導入Endnote
黃貞芬;汪美香;
頁: 99-130
日期: 2011/04
關鍵字: Career Anchors;MIS Undergraduates;Career Management;IS Professionals;Longitudinal Research;
Keywords: Career Anchors;MIS Undergraduates;Career Management;IS Professionals;Longitudinal Research;
摘要: The career anchors of IS professionals play an important role in affecting the selection of occupations. MIS students are one of the principal sources for IS employees. Insight in the career anchors of MIS students provides information that can help ...

瀏覽次數: 17692     下載次數: 108

引用     導入Endnote
蕭瑞麟;廖啟旭;陳蕙芬;
頁: 131-160
日期: 2011/04
關鍵字: structuration theory;technology adoption;technology transfer;work practices;organizing practices;qualitative methods;
Keywords: structuration theory;technology adoption;technology transfer;work practices;organizing practices;qualitative methods;
摘要: In the analysis of technology adoption, the prior literature stresses on either technology functions or organizational constraints enacted by institutions. However, relatively few studies focused on the structural properties embedded in information s...

瀏覽次數: 18531     下載次數: 118

引用     導入Endnote
劉家儀;郭峰淵;
頁: 161-182
日期: 2011/04
關鍵字: creative self-efficacy;ethical self-efficacy concerning software piracy;social sanction;self sanction;software piracy;
Keywords: creative self-efficacy;ethical self-efficacy concerning software piracy;social sanction;self sanction;software piracy;
摘要: Today, the problem of piracy is a major concern for governments, academia and software industry as it has become a prevailing phenomenon. While much effort has been devoted to identify the factors that cause software piracy, most studies focus primar...

瀏覽次數: 15749     下載次數: 119

引用     導入Endnote
陳岳陽;
頁: 183-213
日期: 2011/04
關鍵字: Knowledge Management Strategy;Strategic IT Management;Strategic Alignment;Knowledge Management Performance;
Keywords: Knowledge Management Strategy;Strategic IT Management;Strategic Alignment;Knowledge Management Performance;
摘要: Recently, both researchers and practitioners have started to realize the importance of the information technology (IT) for effective KM activities. It is found that an organization which was high quality in both KM and IT fit achieved high KM perform...

瀏覽次數: 18340     下載次數: 5800

引用     導入Endnote
李金鳳;簡宏宇;賴溪松;
頁: 215-235
日期: 2011/04
關鍵字: security;key agreement;insider attack;STS;forward secrecy;man-in-the-middle attack;
Keywords: security;key agreement;insider attack;STS;forward secrecy;man-in-the-middle attack;
摘要: The Station-to-Station (STS) protocol is a well known two-party key agreement scheme that provides mutual entity authentication, key confirmation and forward secrecy. Al-Riyami and Paterson (2003) extended the STS protocol to the tripartite case, whi...

瀏覽次數: 14488     下載次數: 1514

引用     導入Endnote