博碩士論文 994201044 詳細資訊




以作者查詢圖書館館藏 以作者查詢臺灣博碩士 以作者查詢全國書目 勘誤回報 、線上人數:31 、訪客IP:18.189.143.164
姓名 劉哲瑋(Jer-wei Liu)  查詢紙本館藏   畢業系所 企業管理學系在職專班
論文名稱 貨櫃港口之科技選擇決策模型
(Decision modeling of technology selection for container security in maritime terminals)
相關論文
★ 美國軟體產業創新活動與財務效率分析★ Performance Measurements of Web 2.0, Social Media, and Mobile Apps for Municipal Emergency Management
★ 中國大陸股權結構與自願性財務預測之關聯性★ 我國半導體產業下游公司法人說明會對供應鏈上游公司投資現金流量敏感度的影響
★ 線上串流音樂服務之使用者抗拒意圖研究★ 從認知理論探討創業機會辨識對績效之影響
★ 影響Y世代消費者對智慧綠色產品購買意圖與使用意圖的因素:以智慧節能裝置為例★ Application of social media mining on the comparison between two-dimensional barcode and near field communication
★ 應用社群探勘技術分析城市之創業精神與新創公司的特性★ 科技接受度與學習風格對於頭戴式虛擬實境應用在學習行為意圖的影響
★ 電子發票巨量資料視覺化分析-以酒的消費為例★ 應用文字探勘分析ERP之趨勢發展:以Twitter為例
★ 社群媒體文字採礦之研究:以第三方物流公司為例★ 應用文字探勘技術分析遊戲產業趨勢:以兩大遊戲展之相關推文為例
★ 台灣有機食品消費與疾病死亡率之視覺化分析★ 酒類消費與犯罪率之視覺化分析
檔案 [Endnote RIS 格式]    [Bibtex 格式]    [相關文章]   [文章引用]   [完整記錄]   [館藏目錄]   [檢視]  [下載]
  1. 本電子論文使用權限為同意立即開放。
  2. 已達開放權限電子全文僅授權使用者為學術研究之目的,進行個人非營利性質之檢索、閱讀、列印。
  3. 請遵守中華民國著作權法之相關規定,切勿任意重製、散佈、改作、轉貼、播送,以免觸法。

摘要(中) 從911事件之後,為了加強貨櫃運輸的安全,政府機構和民間組織設立了許多新的安全規範。雖然遵從這些安全規範可以強化貨櫃安全,但也會降低港口的作業效率。藉由導入ICT解決方案,港口能夠增加本身的安全性並且加快貨櫃運送的流程。然而對於港口的管理者來說,考慮到港口作業流程的複雜度和ICT的多樣性,選擇出適合港口的ICT解決方案是一件困難的事情。
本研究利用影響圖等相關方法,建立了一個多目標決策模型以協助港口管理者選擇最適合港口的ICT解決方案,以提升港口轉口流程的安全性。此決策模型不僅可以考量到不確定因素的影響和決策者的風險態度,並能配合各港口的作業策略與決策者偏好,綜合衡量安全性、作業效率喊建置成本等目標,計算出各解決方案的效用值,依此來推論出對於港口的最佳選擇。最後,本研究利用一個案來驗證決策模型的實用性,並透過敏感度分析測試模型的穩定性。
摘要(英) Since the terrorist attacks on the United States on September 11th 2001, many government initiatives, regulations and mandates have introduced new requirements for container security. Implementation of information technology could help container terminal to achieve required security improvement. However, selecting suitable technology solutions is a challenging task for port authority because port processes are complicated and technological alternatives are divergent.
In this paper, a decision-making framework for evaluating technology solution alternatives for transshipment processes in maritime terminals was developed. The objective of this framework is to provide an approach for decision makers to select an optimal technology solution for security improvement in container terminal with respect to the operational strategies of port authority. This approach consists of a multistage influence diagram modeling the terminal’s sequential technology selection decisions. The influence diagram graphically describes the elements of the decision process and takes into account the preferences of decision makers under conditions of uncertainty. The solution procedure of framework is illustrated with a case study and a sensitivity analysis is performed to test the robustness of the decision model.
關鍵字(中) ★ 轉口流程
★ 決策分析
★ 貨櫃安全
★ 影響圖
關鍵字(英) ★ Decision-making
★ Influence diagram
★ Transshipment
★ Container security
論文目次 中文摘要 i
ABSTRACT ii
誌謝 iii
Table of Contents iv
List of Figures v
List of Table vii
Chapter 1 Motivation and Objectives 1
1.1 Background and Motivation 1
1.2 Objectives 4
Chapter 2 Literature Review 5
2.1 Solution alternatives 5
2.2 Technology selection problem 12
Chapter 3 Methodology 14
3.1 Decision objectives 15
3.2 Problem statement 20
3.3 Model of decision problem 31
3.4 Model of uncertainty and preferences 40
Chapter4 Case study 46
4.1 Data acqusition 49
4.2 Decision model analysis 53
4.3 Sensitivity analysis 57
Chapter 5 Conclusions 66
References 68
參考文獻 Abajo, V., O. (2009). Analysis of ICT solutions integration for tracking purposes in container terminal management and operation (Master’’s thesis). Retrieved from http://upcommons.upc.edu/pfc/handle/2099.1/7867
Anonymous (2003). Why does the market need GPS tracking? Retrieved from http://www.logjobs.com/content.php3?file=mobileapplications.html
Anonymous (2002a). PAR logistics and Savi team up to improve cargo container security. Retrieved from http://www.eyefortransport.com/print.asp?news=34025
Anonymous (2002b). GPS brings real time tracking to Australian logistics. Retrieved from http://www.spacedaily.com/news/gps-02n.html
Anonymous (200c2). James Brown trucking equip 1000 trailers with vistar tracking solution. Retrieved from http://www.eyefortransport.com/print.asp?news=31179
Bagchi, U., Guiffrida, A., O’Neill, L., Zeng, A., Hayya, J. (2007). The effect of RFID on inventory management and control. Springer Series in Advanced Manufacturing, London, England: Springer.
Barro-Torres, S., J., Fernandez-Carames, T., M., Gonzalez-Lopez, M. & Escudero-Cascon, C., J. (2010). Maritime freight container management system using RFID. The Third International EURASIP on RFID Technology, 93-96.
Bhatti, T. (2000). Justification of manufacturing technology capital investment: an intergrated approach. Proceedings of the IEEE International Conference on Management of Innovation and Technology, Singapore, 346-353.
Bernasek, A. (2002, Feburary). The Friction Economy American business just got the bill for the terrorist attacks: $151 billion a year. Fortune. Retrieved from http://money.cnn.com/magazines/fortune/fortune_archive/2002/02/18/318153/index.htm
CBP. (2006). Container Security Initiative: 2006-2011 strategic plan. Retrieved from http://epic.org/privacy/surveillance/spotlight/1006/csiplan.pdf
CBP. (2007). Customs-Trade Partnership Against Terrorism strategic plan. Retrieved from http://www.cbp.gov/linkhandler/cgov/trade/cargo_security/ctpat/ctpat_program_information/what_is_ctpat/ctpat_strat_plan.ctt/ctpat_strat_plan.pdf
City of Yokohama - Port and Harbor Bureau. (2010). Port & Harbor plan – Port of Yokohama. Retrieved from http://www.city.yokohama.lg.jp/kowan/english/pdf/portharborplan.pdf
Chan, F., T., S., Chan, M., H., & Tang, N., K., H. (2000). Evaluation methodologies for technology selection. Journal of Materials Processing Technology, 107, 330-337.
Chan F. T. S. (2003). Performance measurement in a supply chain. The international journal of advanced manufacturing technology, 21, 534-538.
Chappel, G., Durdan, D., Gilbert, G., Ginsburg, L., Smith, J., & Tobolski, J. (2003). Auto-ID on delivery: the value of Auto-ID technology in the retail supply chain. Technical Report, Auto-ID center.
Clemen, R. T. & Reilly, T. (2001). Making hard decisions with decision tools.
Pacific Grove, Central America: Duxbury/Thomson Learning.
Daschkovska, K., & Scholz-Reiter, B. (2008). Electronic Seals for Efficient Container Logistics. Dynamics in Logistics, 305-312.
Daschkovska, K., & Scholz-Reiter, B. (2011) How can Electronic Seals Contribute to the Efficiency of Global Container System. Dynamics in Logistics, 6, 457-467
Dutta, A., Lee, H., Whang, S., (2007). RFID and operations management: technology, value, and incentives. Production and Operations Management, 16(5), 646-655
Edosomwan, A., E. (1989). Integrating innovation and technology management. Wiley, New York.
Farre Barbera, J. (2009). Modeling processes in the operation of an automated container terminal. (Master’s thesis). Retrieved from http://upcommons.upc.edu/pfc/handle/2099.1/6680
Gaukler, G., M. (2005). RFID in supply chain management (Doctor’s thesis). Availabe from ProQuest Dissertation and theses database. (UMI No. 3187292)
Gaukler, G. M., Seifert, R. W., (2007). Application of RFID in supply chain. Springer Series in Advanced Manufacturing, London, England: Springer.
Glickman, T. & White, S. (2006). Security, visibility and resilience: the keys to mitigating supply chain vulnerabilities. International Journal of Logistics Systems and Management, 2(3), 107-119.
Griffiths, J., L., Phelan, A., Osman, K., A., & Furness, A. (2007). Using item-attendant information and communications technologies to improve supply chain visibility. Agile Manufacturing, ICAM 2007, 9-11.
Gobel, C. & Gunther, O. (2009). The value of visibility and RFID in transshipment operations – a simulation study. Wirtschaftinformatik Proceeding 2009, 129-138.
Gui, Z. & Xie, P. (2010). RTK GPS enhanced reliability for automatic container terminal. Progress in Informatics and Computing (PIC), 2(4), 1199-1202.
Handfield, R., Walton, S. V., Sroufe, R. & Melnyk, S. A. (2002). Applying environmental criteria to supplier assessment: A study in the application of the Analytical Hierarchy Process. European Journal of Operational Research, 141(2), 70-87.
Hayashi, K. (2007). An e-Seal in Container Security Program: How to maximize the benefits of e-Seal in the battle against terrorism(Master’’s thesis). Retrieved from http://rfid-a-gogo.cocolog-nifty.com/Koichiro_Hayashi_Thesis.pdf
Jones, E. C. & Chung, C. A. (2008). RFID in logistics: a practical introduction. Taylor & Francis Group, LLC.
KaErkkaEinen, M. (2003). Increasing efficiency in the supply chain for short shelf life goods using RFID tagging. International Journal of Retail and Distribution Management, 31(10), 529–536.
Lai, C. T. (2010). E-seal system design and benefits evaluation for global container transport security (Master’s thesis). Retrieved from http://pc01.lib.ntust.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0608111-162606
Lee, H. & Ozer, O. (2009). Unlocking the value of RFID. Production and Operations Management, 16(3), 40-64.
Li, S., Visich, J. K., Khumawala, B. M., Zhang, C. (2006). Radio frequency identification technology: applications, technical challenges and strategies. Sensor Review, 26(10), 193-202.
Liu, S., S. (2009). The Critical Success Factors for RFID System Implementation---A Case study on Kaohsiung Harbor Electronic Seal System (Master’’s thesis). Retrieved from http://repository.nkfust.edu.tw/ir/handle/987654321/5277
Lu, C. S. & Yang, C. S. (2010). Safety leadership and safety behavior in container terminal operations. Safety science, 48(2), 123-134.
Kim, D. K., Lee, M., Kang, Y. S., Chung, S., Yoon, W., Min, J. & Kim, H. (2007). Design and performance analysis of electronic seal protection systems based on AES. ETRI Journal, 29(6), 755-768.
Kim S., J., Deng G., Gupta S., K., S., & Hoye, M. M. (2008). Enhancing cargo container security during transportation: A mesh networking based approach. Paper presented at Technologies for Homeland Security, 2008 IEEE Conference, Waltham, MA.
Khouja, M. (1995). The use of data envelopment analysis for technology selection. Compters and Industrial Engineering, 28(3), 123-132.
Kwek, K. H., & Goswami, N. (2004). Cost and productivity implications of increased security in sea trade processes. The Logistics Institute-Asia-Pacific, National University of Singapore.
Maspero, E., Van Dyk, E., & Ittmann, H. (2008). Maritime supply chain security: navigating through a sea of compliance requirements. Journal of Transport and Supply Chain Management, 2(1), 12-14.
McCormack, E., Jensen, M., Hovde, A. (2008). Evaluating the Use of Electronic Door Seals (E-Seals) on Shipping Containers. International Journal of Applied Logistics, 1(4), 17-34.
Min, J.U., Park, M. (2007). Electronic cargo seal for safe and secure supply chain traceability. Journal of international logistics and trade, 5(1), 47-56.
Mullen, D. (2004).The application of RFID technology in a Port. Port Technology International, 22, 181–182.
Ngai, E.W.T., Cheng, T.C.E, Au, S., & Lai, Kee-hung (2007, February). Mobile commerce integrated with RFID technology in a container depot. Decision Support Systems, 43(1), 62-76.
European Conference of Ministers of Transport (2005). Container Transport Security Across Modes. :OECD Publishing.
Panagopoulos, N. (2007). Analyzing the use of radio frequency identification (RFID) on the container industry (Master’’s thesis). Retrieved from http://hdl.handle.net/1721.1/39884
Patterson, A., Kirk, Grimm, M., Curtis, & Corsi, M., Thomas (2003). Adopting new technologies for supply chain management. Transportation Research Part E: Logistics and Transportation Review, 39, 95-121.
Peleg-Gillai, B., Bhat G. & Sept, L. (2006). Innovators in supply chain security – better security drives business value. The Manufacturing Innovation Series, Stanford University – The Manufacturing Institute.
Peterson, J. & Treat, A. (2008). The post 9/11 global framework for cargo security. USITC Journal of International Commerce and Economics, 3, 1-30.
Punniyamoorthy, M. & Ragavan, P. (2003). A strategic decision model for the justification of technology selection. The International Journal of Advanced Manufacturing Technology, 21, 72-78.
Ramanathan, R. (2001). A note on the use of the analytic hierarchy process for environmental impact assessment. Journal of Environmental Management, 63, 27-35.
Reidy S. & Redbro M. (2007). Envisioning an efficient and secure global supply chain, IBM Global Business Services, February 2007.
Rosenbloom, E. S. (1996). A probabilistic interpretation of the final rankings in AHP. European Journal of Operational Research, 96, 371-378
Shachter, R. D. (1986). Evaluating influence diagrams. Operations Research, 33(6), 871-882.
Shehabuddeen, N., Probert, D. & Phaal, R. (2006). From theory to practice: challenges in operationalising a technology framework. Technovation, 26, 324-335.
Siror, J., K., Liang., G., Pang, K., Sheng, H. & Wang, D. (2010). Use of RFID for intelligent pre-shipment inspection. Journal of Convergence Information Technology, 5(9), 190-199.
Steenken, D., Vos, S. & Stahlbock, R. (2004). Container terminal operation and operations research – a classification and literature review. OR Spectrum, 26(1), 3-49.
Tataman, J. A. & Shachter R. D. (1990). Dynamic programming and influence diagrams. IEEE Transactions on Systems, Man, and Cybernetics, 20(2), 365-379.
Theiss, A., Yen, D., C. & Ku, C. (2005). Global Positioning Systems: an analysis of applications, current development and future implementations. Computer Standards & Interfaces, 27(2), 89-100.
Thonemann, U. W., (2002). Improving supply-chain performance by sharing advance demand information. European Journal of Operational Research, 142(2), 81-107
Tsai, M. (2006). Constructing a logistics tracking system for preventing smuggling risk of transit containers. Transportation Research Part A: Policy and Practice, 40(6), 526-536.
Unisys corp. (2007). An evaluation of the economics of trade security enhancement via the Smart and Secure Trade Lanes (SST) initiative. APEC Security Trade Project Final Report, Retrieved from http://www.apec-tptwg.org.cn/new/Projects/APEC%20Final%20Report%20vFINAL.pdf
Urciuoli, L. (2010). Supply chain security – mitigation measures and a logistics multi-layered framework. Journal of Transportation Security, 3(4), 1-28.
Van Oosterhout, M., P., A., Veenstra, A., W., Meijer, M., A., G., Popal, N. & Van den Berg, J. (2007). Visibility Platforms for Enhancing Supply Chain Security: a Case Study in the Port of Rotterdam. Proceedings of the International Symposium on Maritime Safety, Security and Environmental Protection, Athens, 20-21.
Whitaker, J., Mithas, S., Krishnan, M. S., (2007). A field study of RFID deployment and return expectations. Production and Operations Management, 16(5), 599-612.
Yixiu, Z. (2008). Benefit analysis of IT visibility platforms in containerized supply chains (Master thesis). Retrieved from http://www.transumofootprint.nl/upload/documents/03%20Projecten/Beveiliging%20in%20de%20logistieke%20keten/03%20Output/05%20Rapporten,%20notities,%20verslagen/rapportage%20informatie%20analysie%20II.pdf
指導教授 沈建文(Chen-weng Shen) 審核日期 2012-7-22
推文 facebook   plurk   twitter   funp   google   live   udn   HD   myshare   reddit   netvibes   friend   youpush   delicious   baidu   
網路書籤 Google bookmarks   del.icio.us   hemidemi   myshare   

若有論文相關問題,請聯絡國立中央大學圖書館推廣服務組 TEL:(03)422-7151轉57407,或E-mail聯絡  - 隱私權政策聲明