博碩士論文 102453014 詳細資訊




以作者查詢圖書館館藏 以作者查詢臺灣博碩士 以作者查詢全國書目 勘誤回報 、線上人數:16 、訪客IP:18.220.97.161
姓名 蔡文宏(WEN-HUNG TSAI)  查詢紙本館藏   畢業系所 資訊管理學系在職專班
論文名稱 全球供應鏈下新產品的安全控管-以C公司為例
(Security Protection of New Product under Global Supply Chain - A Case Study of C Company)
相關論文
★ 利用資料探勘技術建立商用複合機銷售預測模型★ 應用資料探勘技術於資源配置預測之研究-以某電腦代工支援單位為例
★ 資料探勘技術應用於航空業航班延誤分析-以C公司為例★ 資料探勘應用於半導體雷射產業-以A公司為例
★ 應用資料探勘技術於空運出口貨物存倉時間預測-以A公司為例★ 使用資料探勘分類技術優化YouBike運補作業
★ 特徵屬性篩選對於不同資料類型之影響★ 資料探勘應用於B2B網路型態之企業官網研究-以T公司為例
★ 衍生性金融商品之客戶投資分析與建議-整合分群與關聯法則技術★ 應用卷積式神經網路建立肝臟超音波影像輔助判別模型
★ 基於卷積神經網路之身分識別系統★ 能源管理系統電能補值方法誤差率比較分析
★ 企業員工情感分析與管理系統之研發★ 資料淨化於類別不平衡問題: 機器學習觀點
★ 資料探勘技術應用於旅客自助報到之分析—以C航空公司為例★ 應用機器學習建立單位健保欠費催繳後繳納預測模型
檔案 [Endnote RIS 格式]    [Bibtex 格式]    [相關文章]   [文章引用]   [完整記錄]   [館藏目錄]   至系統瀏覽論文 ( 永不開放)
摘要(中) 在產品生命週期日趨短暫的全球化市場的競爭環境下,各國際大廠為贏得競爭優勢,紛紛進行全球化的供應鏈布局,促使供應鏈管理日益複雜與困難。而資訊科技的蓬勃發展與網際網路的盛行,雖然對於全球化的供應鏈管理帶來很大的助益,卻也助長了「洩密問題」這個重要議題的增長。洩密事件對各產業的業者影響皆甚,其中尤以對產品生命週期相對短暫的資訊電子業影響最鉅,輕則影響公司商譽,重則將使公司失去市場競爭力並損失新產品上市可能帶來的可觀利益,因此各國際資訊電子大廠都相當重視新產品保密等安全工作,對於其供應鏈廠商之新產品的安全控管要求亦日趨嚴格。身處微利化的代工行業競爭環境裡的各家廠商,更須快速反應及快速滿足客戶對於新產品安全控管工作的需求,才能在產業中立足。
本研究以一個案例來探討如何以企業安全管理、資訊安全管理等國際標準及文獻為基礎,結合產業屬性及公司特性,以建置在資訊電子產業全球供應鏈下的新產品安全控管機制,乃提出SCFNP(Security Control Framework for New Product)方法,並透過問卷的方式,詢問各產業專家的意見,期使身處資訊電子產業全球化供應鏈下的各家廠商能有一參考依據,能建置快速反應及確實滿足國際大廠對於新產品安全控管的要求,以在該產業中立足與發展。
摘要(英) In an increasingly competitive environment with a shorter and shorter product life cycle in global market, the international firms have deployed their layout of global supply chain to gain competitive advantages. The stringent situation makes this supply chain become more complicated and also difficult to manage. Though, the booming of information technology and Internet has brought great help for the globalization of supply chain management, they also lead to the growth of the “Information leakage” issue. “Information leak” incidents make great impacts on these industries, especially for the electronics related industries due to their relative short product life cycles and the time-to-market nature. The impacts range from losing business reputations to the loss of their market competitiveness as well as not getting advantages from the new products launched to market. To prevent from these potential damages, the international companies are all putting great efforts to the security protection for new product launch. In addition, the security control of new products for suppliers also becomes increasingly stringent than before. In order to survive the “battle”, the manufacturers in marginal profit and competitive environment of foundry industry have to take actions for rapid responses and to meet customer demands for the security control of new products.
In this thesis, how a corporate to apply security management, information security management and other international standards as well as literature to combine with the characteristics of industrial properties and companies to build in the mechanism of security control for new products under the global IT supply chain and electronic industries are studied. The author proposes the SCFNP (Security Control Framework for New Product) method. Based on tailored questionnaires, we are able to acquire the views from broad industry experts. The manufacturers that under the global supply chain of information and electronic industries can refer SCFNP for not only maintaining their business agilities, but also meeting the multinational company’s requirements of security control for new products.
關鍵字(中) ★ 供應鏈
★ 供應鏈管理
★ 企業安全管理
★ 資訊安全管理
★ 新產品
★ 新產品的安全控管
★ SCFNP
關鍵字(英) ★ Supply Chain
★ Supply Chain Management
★ Corporate Security Management
★ Information Security Management
★ New Product
★ Security Control for New Product
★ SCFNP (Security Control Framework for New Product)
論文目次 摘要 iv
Abstract v
誌謝 vii
目錄 viii
圖目錄 x
表目錄 xi
第一章 緒論 1
1.1 研究背景 1
1.2 研究動機 3
1.3 研究目的 3
1.4 研究流程 4
1.5 論文架構 5
第二章 文獻探討 6
2.1 供應鏈及供應鏈管理 6
2.1.1 供應鏈 6
2.1.2 供應鏈管理 7
2.2 ISO/IEC 27001資訊安全管理系統 8
2.3 企業安全管理 13
2.3.1 企業安全的範疇 13
2.3.2 企業安全管理的架構 16
2.4 新產品 18
第三章 研究方法 23
3.1 個案公司介紹 23
3.2 問卷設計 25
3.3 資料收集方式 25
3.4 SCFNP(Security Control Framework for New Product)方法 25
第四章 結果討論與評估 35
4.1 問卷發放與回收說明 35
4.2 第一部分(封閉式問卷)調查結果統計 36
4.3 第二部分(開放式問卷)調查結果統計 42
4.4 小結 44
第五章 結論與建議 46
5.1 研究結論 46
5.2 研究貢獻 46
5.3 研究限制 47
5.4 未來研究方向 47
參考文獻 48
附錄一 問卷內容 52
附錄二 問卷填答內容 55
參考文獻 參考文獻
【英文文獻】
1. Porter, M. E. (1985), “The Competitive Advantage: Creating and Sustaining Superior Performance ”, The Free Press, New York, NY.
2. Vernon, R. (1996), “International Investment and International Trade in the Product Cycle”, The Quarterly Journal of Economics, 80, 190−207.
3. A. T. Kearney (1994), “Supply Chain Optimization”, 22.
4. Oliver, R.K. and Webber, M.D. (1982), “Supply-chain management: logistics catches up with strategy”, in Christopher, M.G. (Ed.), Logistics, The Strategic Issue, Chapman & Hall, London.
5. Houlihan, J.B. (1984), “Supply Chain Management”, Proceedings of the 19th International Technical Conference of the British Production and Inventory Control Society, 101-110.
6. Ellram, L. M. (1991), “A Managerial Guideline for the Development and Implement of Purchasing Partnerships”, International Journal of Purchasing and Materials Management, 2-6.
7. Metz, P. J. (1998), “Demystifying supply chain management”, Supply Chain Management Review, (Winter): 46–55.
8. Brooks, D. J. (2008), “Defining the science of security through knowledge categorisation”, Acta Criminologica, CRIMSA Conference Special Edition 2008, 1, 12-23.
9. ASIS International. (2009), “Security body of knowledge (BoK): Substantive considerations.”, Unpublished ASIS International Academic/Practitioner Symposium 2009, ASIS International.
10. Brooks, D.J. (2013), ”Corporate Security: Using Knowledge Construction to Define a Practising Body of Knowledge.”, Asian Journal of Criminology 8/2: 89–101.
11. Levitt, T. (1965), “ Exploit the Product Life Cycle.”, Harvard Business Review Nov.-Dec., 81-94.
12. White, R. (1976), “ Consumer Product Development.”, Penguin Book.
13. Sands, S. and Warwick, L. M. (1977), “Successful Business Innovation: A Survey of Current Professional View”, Californian Management Review, Vol. 20, No.2, P. 5-12.
14. Booz Allen Hamilton(1982), “ New Product Management For The 1980’s.”, NY: Booz-Allen and Hamilton, Inc.
15. Zong, T.B. and Jin, J.L. (1986), “ Technology Development Patterns of Small and Medium Sized Companies in the Korean Machinery Industry.”, Technovation;4:279-296.
16. Utterback, J.M. and Kim, L. (1986), “Invasion of A Stable Business by Redical Innovation. ”, R&D Management 113-151.
17. Gobeli, D.H. and Brown, D.J.(1987), “Analyzing Product Innovations.”, Research Management;30(4):25-31.
18. Kuczmarski, T.D. (1988), “Success isn’t Always Its Own Reward-Big Bucks Help.”, Marketing News,22(24), pp.10.
19. Keegan, W.J. (1989), “ Global Marketing Management.”, N.J.: Prentice-Hall Inc..
20. Kotler, P. (1991), “Marketing Management: Analysis, Planning and Control.”, 5th ed, Englewood Cliffs: Prentice-Hall Inc..
21. Brown, R. (1992), “ Managing the ‘S’ Curves of Innovation.”, Journal of Consumer Marketing;9(1):61-72.
22. BS 7799-1 (1999), “Information Security Management - Part 1 : Code of Practice for Information Security Management.”, BS 7799-1 : 1999, British Standards Institution (BSI), London.
23. BS 7799-2 (1999), “Information Security Management - Part 2 : Specification for Information Security Management System.”, British Standards Institution (BSI), London.
24. ISO/IEC 17799 (2000), “Information technology - Code of practice for information security management.”, International Organization for Standardization (ISO), Switzerland.
25. ISO/IEC 17799 (2005), “Information technology - Code of practice for information Security management.”, International Organization for Standardization (ISO), Switzerland.
26. ISO/IEC 27001 (2005), “Information technlolgy - Security techniqes -Information security management systems - Requirements.”, International Organization for Standardization (ISO), Switzerland.
【中文文獻】
1. 北美智權報 (06/04/2014)。
http://www.naipo.com/Portals/1/web_tw/Knowledge_Center/Industry_Economy/publish-242.htm
2. 徐子文,「企業安全暨風險管理策略之研究— 台北101大樓個案分析」,15。
3. 徐子文,「企業安全暨風險管理策略之研究— 台北101大樓個案分析」,21-22。
指導教授 蔡志豐(Chih-Fong Tsai) 審核日期 2015-8-20
推文 facebook   plurk   twitter   funp   google   live   udn   HD   myshare   reddit   netvibes   friend   youpush   delicious   baidu   
網路書籤 Google bookmarks   del.icio.us   hemidemi   myshare   

若有論文相關問題,請聯絡國立中央大學圖書館推廣服務組 TEL:(03)422-7151轉57407,或E-mail聯絡  - 隱私權政策聲明