Responsive image
博碩士論文 etd-0713114-203335 詳細資訊
Title page for etd-0713114-203335
論文名稱
Title
資訊系統委外專案中跨界管理之研究
Understanding the role of boundaries spanning in IT outsourcing project management
系所名稱
Department
畢業學年期
Year, semester
語文別
Language
學位類別
Degree
頁數
Number of pages
90
研究生
Author
指導教授
Advisor
召集委員
Convenor
口試委員
Advisory Committee
口試日期
Date of Exam
2014-07-04
繳交日期
Date of Submission
2014-08-27
關鍵字
Keywords
資訊系統委外專案、風險、跨越疆界、運作、社會、知識
risks, operational boundary, knowledge boundary, information systems (IS) outsourcing, boundary spanning, social boundary
統計
Statistics
本論文已被瀏覽 5854 次,被下載 638
The thesis/dissertation has been browsed 5854 times, has been downloaded 638 times.
中文摘要
隨著電腦及網路的發展,資訊系統的運用已普及在現在的公司之中,但是並非每個單位都具備系統開發的能力,因此資訊系統委外開發成為不論是在政府機關或者是民營公司,都已經成為一項重要的工作,但是在執行資訊系統委外開發時,卻常面對到兩個單位因為很多的不同點,而導致專案的推行產生許多的風險,本論文試著就資訊系統委外專案藉由跨越疆界,降低風險的觀點去探討,如何提升專案品質、降低專案延遲。
本研究整理過去文獻對於疆界的討論,定義出知識、運作及社會等3個疆界,並律定相關的物件、流程及角色,藉以協助委外專案的推行與管理。研究採用量化研究方式,以問卷調查的方法,針對委外系統開發端的人員實施調查,計回收105份有效問卷,並經過相關的整理及分析後,驗證本研究所提假說,有效跨域疆界確實是可以降低風險,提高專案品質及減少專案延遲的。
本研究在學術面上,針對過去未明確定義的疆界,定義出知識、運作及社會等3個疆界作為後續研究的參考,另外整理所得的物件、流程及規則等具體作法,可以最為實務界在執行委外專案跨越疆界管理運用。
Abstract
With the advance of technology and Internet, information system (IS) has become prevalent in organizations nowadays. But not every company possesses capability to develop information system independently. Therefore outsourcing of information system has become an important issue in both private and government organizations. However, there might be a lot of risks that caused by the divergence between venders and clients in the information system development process. This study aims to explore how an IS outsourcing project cross boundaries to reduce project risks, and further improve project performance and decrease delay. We review past studies of boundary spanning and define three boundaries (social boundary, knowledge boundary, and operational boundary) and the role, process, and objects of each boundary. The study result, based on data collected from 105 IS outsourcing project developers, supports our hypotheses that effectively boundary spanning can reduce project risks and lead to enhance project performance and decrease project delay. This study provides clear definition of social boundary, knowledge boundary, and operational boundary for future studies. Also, the specific practices of role, process, and object provide practical implications for managers
目次 Table of Contents
論文審定書 i
摘要 ii
Abstract iii
第一章 導論 1
1.1研究背景 1
1.2研究動機 3
1.3研究目的 4
1.4研究流程 4
第二章 文獻探討 6
2.1專案管理 7
2.1.1專案的定義 7
2.1.2 專案管理的定義 7
2.1.3軟體開發專案管理 8
2.2資訊系統委外 11
2.2.1資訊系統委外的定義 11
2.2.2資訊系統委外 ( outsourcing )類別 13
2.2.3資訊系統委外的成功關鍵因素 15
2.3風險及專案風險 19
2.3.1風險 19
2.3.2委外專案風險 22
2.3.3風險管理 26
2.4疆界與跨越疆界 29
2.4.1 疆界(boundary) 29
2.4.2跨越疆界(Boundary spanning) 31
第三章 研究方法 34
3.1研究模型 34
3.2研究假說 35
3.3變數定義與衡量 40
3.4問卷設計與資料收集 42
第四章 結果與討論 43
4.1 樣本敘述統計 43
4.2信度與效度 48
4.3假說檢定 57
第五章 結論 62
5.1結論 62
5.2研究貢獻與建議 62
5.3研究限制與未來研究方向 65
參考文獻 67
附錄:研究問卷 74
參考文獻 References
中文文獻:
1.Kelly。(2010)。資訊委外服務的成功關鍵。ARES資通安全電子報。臺北:資通電腦(股)公司。網址:http://edm.ares.com.tw/dm/newsletter-2010-08/focus.html。上網日期:2014-06-30
2.戎懷章。(2000)。資訊業務委外管理機制之設計與應用。碩士論文。新北市。淡江大學資訊管理學系。
3.行政院。(2009)。風險管理及危機處理作業手冊。臺北:行政院研究發展考核委員會。
4.行政院主計處。(2005)。政府機構「資訊系統委外開發」之專案管理概況報告。臺北:行政院主計處。
5.行政院主計處。(2008)。政府機關「資訊系統委外開發」概況調查報告。臺北:行政院主計處。
6.行政院主計處。(2009)。「政府機構資訊系統委外管理實務」調查報告。臺北:行政院主計處。
7.吳升皓。(2011)。提早預防、加速應變,將不確定降到最低。臺北:經理人雜誌。網址:http://www.managertoday.com.tw/?p=2040。上網日期:2014-6-30
8.吳博華。(2008)。政府採購「資訊系統或維護案」決策模式之研究。碩士論文。臺東。國立臺東大學資訊管理學系研究所。
9.吳琮藩,謝清佳。(2000)。資訊管理-理論與實務。台北:智勝。
10.李淑芳。(1995)。台灣地區資訊系統外包決策考慮因素之研究。碩士論文。桃園。中央大學資訊管理研究所。
11.李雪津。(1997)。淺談政府資訊業務整體委外。電腦科技45:42-63。
12.李慧菁。(2007)。資訊科技產業產品研發專案關鍵成功因素之研究 -- AHP 方法之應用。碩士論文。臺北。大同大學事業經營研究。
13.林東清。(2005)。知識管理理論與實務。臺北:電子工業出版社。
14.苗栗縣政府。(2011)。資訊系統服務委外之風險管理。苗栗:苗栗縣政府。
15.張君瑤。(2008)。知識整合能力對資訊系統委外績效之影響。碩士論文。桃園。國立中央大學資訊管理研究所。
16.張慧莉。(1996)。資訊系統委外成功因素之探討-以我國海關為例。碩士論文。臺北。國立台灣大學資訊管理研究所。
17.許書榕。(2010)。以雙元觀點探討連鎖體系智慧資本與知識創造之關聯性研究。碩士論文。高雄。正修科技大學資訊管理研究所。
18.許瓊文。(1998) 。政府資訊系統委外推動因素之研究。碩士論文。新北市。淡江大學資訊管理研究所。
19.陳文賢。(2002)。資訊管理。臺北:東華。
20.陳盛輝。(1997)。資訊系統外包服務品質之實證研究。碩士論文。臺北。東吳大學商學院企業管理研究所。
21.陳麗娟。(2006)。從跨域管理觀點論述災害防救組織-以行政院災害防救委員會為例。碩士論文。臺北。世新大學行政管理學研究所。
22.黃仁伯。(1996)。資訊系統委外環境與類型之探討。碩士論文。新竹。國立交通大學經營管理研究所。
23.黃淑秋。(2001)。資訊系統委外過程參與成員認知差異之研究-以科技框架分析。碩士論文。高雄。國立中山大學資訊管理學系研究所。
24.黃錦桂。(2006)。公務機關資訊系統委外影響驗收因素之研究。碩士論文。嘉義。國立中正大學會計與資訊科技研究所。
25.溫紹群、沈恬憶。(2013)。軟體開發專案管理探討(一) 軟體開發專案的管理重點與績效指標。勤業眾信通訊2013年07月號。臺北:勤業眾信聯合會計師事務所。
26.劉文良。(2012)。專案管理。第二版。結合實務與專案管理師認證。臺北:碁峯。
27.林信惠、黃明祥與王文良。(2005)。軟體專案管理。臺北:智勝文化。
28.劉曉玲。(1998)。「借力使力:資訊委外有春天」。資訊與電腦212:46-47。
29蔡敦浩、李慶芳。(2006)。疆界管理:探索情境知識的本質與知識轉移。科技管理學刊11(3):89-118。
30.蘇祐毅。(1998)。資訊外包關鍵因素之探討。碩士論文。臺北。國立台灣大學商學研究所。
英文文獻:
1.Atinkemer, K., Chaturvedi, and R. Gulati,(1994), “Information Systems Outsourcing: Issues and Evidence”, Information Systems Management, 14( 4),33-35.
2.Bagozzi, R. P.,Yi, Y., and Phillips, L. W.(1991).Assessing construct validity in organizational research . Administrative Science Quarterly,36(3),421-458.
3.Bechky, B. A. (1999). Crossing Occupational Boundaries: Communication and Learning on a Production Floor. unpublished Ph.D. dissertation.Stanford University. CA.
4.Bechky, B. A. (2003). “Sharing Meaning across Occupational Communities: The Transformation of Understanding on a Product Floor”. Organization Science,14(3), 312-330.
5.Boland Jr, R. J., and Tenkasi, R. V. (1995). Perspective making and perspective taking in communities of knowing. Organization science, 6(4), 350-372.
6.Boonstra, A., and De Vries, J. (2005). Analyzing inter-organizational systems from a power and interest perspective. International Journal of Information Management, 25(6), 485-501.
7.Bowker, G., Timmermans, S., and Star, S. L. (1996). Infrastructure and Organizational
8.Carlile, P. R. (2002). “A Pragmatic View of Knowledge and Boundaries: Boundary Objects in New Product Development”. Organization Science, 13(4), 442-455.
9.Chapman, C., and Ward, S. (1996). Project risk management: processes, techniques and insights. John Wiley.
10.Chin. W. W. (1998).Commentary : Issues and opinion on structural equation modeling . MIS Quarterly,22(1),vii-xvi.
11.Cleland, D, I, and W, R, King(1983).System Analysis and Project Management . New York:McGraw-Hil,Inc.
12.Cleland, D. I., and Ireland, L. R. (1999). Project management: strategic design and implementation Vol. 4. New York: McGraw-Hill.
13.Cross, R., Parker, A., Christensen, C. M., Anthony, S. D., and Roth, E. A. (2004). The hidden power of social networks. Audio-Tech Business Book Summaries, Incorporated.
14.DeLone, W. H., and McLean, E. R. (1992). Information systems success: the quest for the dependent variable. Information systems research, 3(1), 60-95.
15.Fornell, C., and Larcker, D. F. (1981). Evaluating structural equation models with unobservable variables and measurement error . Journal of Markering Research,18(1),39-50.
16.Gemino, A., Reich, B. H., & Sauer, C. (2007). A temporal model of information technology project performance. Journal of Management Information Systems, 24(3), 9-44.
17.Gopal, A., and Gosain, S. (2009). Research note-The role of organizational controls and boundary spanning in software development outsourcing: Implications for project performance. Information Systems Research, 21(4), 960-982.
18.Gove, P. B. (Ed.). (2002). Webster's third new international dictionary of the English language, unabridged. Merriam-Webster.
19.Grover, V., Cheon, M. J., and Teng, J. T. C. (1996). The effect of service quality and partnership on the outsourcing of information systems functions. Journal of Management Information Systems, 12(4), 89-116.
20.Hair, J. F., Black, W. C., Babin B. J., Anderson, R. E. and Tatham, R. L..(2006). Mulitivariate Date Analysis 6th editiiob .Pearson Education. Inc.
21.Hirschheim, R., and Lacity, M. (2000). The myths and realities of information technology insourcing. Communications of the ACM, 43(2), 99-107.
22.Keith Harrison - Broninsk (2011).Cross-Boundary Processes. http://www.bpm.com/cross-boundary-processes.html . Viewed at 2014.07.01
23.Kelinger, F. N.(1986). Foundations of Behavioral Research : Rinehart and Winston.
24. Laudon, K. C., & Laudon, J. P. (1998). Information systems and the internet. Harcourt College Publishers.
25.Kerzner, H. R. (2013). Project management: a systems approach to planning, scheduling, and controlling. John Wiley and Sons.
26.Kirsch, L. J., Sambamurthy, V., Ko, D. G., and Purvis, R. L. (2002). Controlling information systems development projects: The view from the client. Management Science, 48(4), 484-498.
27.Lamont, M., and Molnár, V. (2002). The study of boundaries in the social sciences. Annual review of sociology,28, 167-195.
28.Levina, N., and Vaast, E. (2004). Understanding boundary-spanning in knowledge work: Implications for IT use. Unpublished manuscript. Retrieved December, 13, 2004.
29.Lowell,M.. 1992. "Managing Your Outsourcing Vendor In the Financial Services Industry.". Journal of Systems Management,23-36.
30.Marrone, J. A. (2010). Team boundary spanning: A multilevel review of past research and proposals for the future. Journal of Management, 36(4), 911-940.
31.McNurlin, B. C., Sprague, R. H., and Bui, T. X. (1989). Information systems management in practice 8th. Prentice-Hall International.
32.McNurlin, Barbara C. and Ralph H.Sprague Jr.,(1998).Information system management in Practice 4th edition,236-237.
33.Minoli, D.(1995).Analyzing Outsourcing: Reengineering Information and Communication System. McGraw-Haill, Inc.
34.Nam et al..(1996). A two Level Investigation of Information System Outsourcing . Communication of the ACM,39(7),36-44.
35.Patnayakuni, R., Rai, A., & Tiwana, A. (2007). Systems development process improvement: A knowledge integration perspective. IEEE Transactions on Engineering Management, 54(2), 286-300.
36.Pinto, J. K., and Slevin, D. P. (1987). Critical factors in successful project implementation. IEEE Transactions on Engineering Management, 34(1), 22-27.
37.Ranganathan, R., & Krishnan, C. (2012). Extracting synergies in gait: Distinguishing neural organization from task-related activity. Journal of Neurophysiology, 108(5), 1537-1544.
38.Rao, H. Raghav, Nam, K., and Chaudhury , A..(1996).Information system outsourcing. Communication of the ACM,39(7),27-28
39.Rosenkopf, L., and Nerkar, A. (2001). Beyond local search: boundary‐spanning, exploration, and impact in the optical disk industry. Strategic Management Journal, 22(4), 287-306.
40.Scholl, H. J., and Klischewski, R. (2007). E-government integration and interoperability: framing the research agenda. International Journal of Public Administration, 30(8-9), 889-920.
41.Sung Kim,Young-Soo Chung.(2003).Critical Success Factors For IS Outsourcing Implementation from an Interorganizational relationship perspective. Journal of Computer Information System,43(3),81-90.
42.The Outsourcing Institute Membership.(1998).Employment outsourcing in information system. Communication of the ACM, 39(7), 47-54.
43.Tilly, C. (2004). Social boundary mechanisms. Philosophy of the social sciences, 34(2), 211-236.
44.Transformations: Classifying Nurses' Work”. in Orlikowski, W. J., Walsham, G., Jones, M. R., anda DeGross, J. I. (eds.), Information Technology and Changes in Organizational Work, London:Chapman and Hall, 344-369.
45.Tyler, G. (1998). Information Technology - The Take Away Version, Management Services 42(1), 28 – 30. 46.Michell, V., and Fitzgerald, G. (1997). The IT outsourcing market-place: vendors and their selection. Journal of Information Technology, 12(3), 223-237.
47.van den Hooff, B., & de Winter, M. (2011). Us and them: a social capital perspective on the relationship between the business and IT departments. European Journal of Information Systems, 20(3), 255-266.
48Wallace, L., Keil, M., and Rai, A. (2004). Understanding software project risk: a cluster analysis. Information and Management, 42(1), 115-125.
電子全文 Fulltext
本電子全文僅授權使用者為學術研究之目的,進行個人非營利性質之檢索、閱讀、列印。請遵守中華民國著作權法之相關規定,切勿任意重製、散佈、改作、轉貼、播送,以免觸法。
論文使用權限 Thesis access permission:自定論文開放時間 user define
開放時間 Available:
校內 Campus: 已公開 available
校外 Off-campus: 已公開 available


紙本論文 Printed copies
紙本論文的公開資訊在102學年度以後相對較為完整。如果需要查詢101學年度以前的紙本論文公開資訊,請聯繫圖資處紙本論文服務櫃台。如有不便之處敬請見諒。
開放時間 available 已公開 available

QR Code