Please use this identifier to cite or link to this item:
http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/22057
Full metadata record
???org.dspace.app.webui.jsptag.ItemTag.dcfield??? | Value | Language |
---|---|---|
dc.contributor.advisor | 黃奎隆 | |
dc.contributor.author | Meng-Chuan Tsai | en |
dc.contributor.author | 蔡孟娟 | zh_TW |
dc.date.accessioned | 2021-06-08T04:00:12Z | - |
dc.date.copyright | 2018-08-13 | |
dc.date.issued | 2018 | |
dc.date.submitted | 2018-08-09 | |
dc.identifier.citation | 外文文獻
Ambler, S. (2009). The Agile system development life cycle (SDLC). Retrieved from http://www. ambysoft.com/essays/agileLifecycle.html Balaji, S., Murugaiyan, M., (2012). Waterfall vs. V-Model vs. Agile: A comparative study on SDLC. International Journal of Information Technology and Business Management 2(1), 26–30. Barry W. Boehm, TRW, (1991) Software Risk Management: Principles and Practices, IEEE Software, Jan. 1991, Vol.8(1), pp.32-41 Belassi, Walid ; Tukel, Oya Iemeli (1996) A new framework for determining critical success/failure factors in projects, International Journal of Project Management, 1996, Vol.14(3), pp.141-151 Bock, G.W., Zmud, R.W., Kim, Y. G., & Lee, J. N. (2005). Behavioral intention formation in knowledge sharing: Examining the roles of extrinsic motivators, social-psychological forces & organizational climate. MIS Quarterly, 29, 87-112. Brinsfield, Chad Lewicki, Roy J. (advisor) (2009) Employee silence: Investigation of dimensionality, development of measures, and examination of related factors, ProQuest Dissertations and Theses, ProQuest Dissertations Publishing Catherine E. Connelly and David Zweig (2015) How perpetrators and targets construe knowledge hiding in organizations, European Journal of Work and Organizational Psychology, 24:3, 479-489, DOI: 10.1080/1359432X.2014.931325 Connelly, C. E., Zweig, D., Webster, J., and; Troughakos, J. P. (2012). Knowledge hiding in organizations. Journal of Organizational Behavior, 33(1): 64-88. Connelly, Catherine E. ; Zweig, David (2014) How perpetrators and targets construe knowledge hiding in organizations, European Journal of Work and Organizational Psychology, 29 June 2014, p.1-11 Cress U., Barquero B., Buder J., Hesse F.W. (2005) Social Dilemma in Knowledge Communication via Shared Databases. In: Bromme R., Hesse F.W., Spada H. (eds) Barriers and Biases in Computer-Mediated Knowledge Communication. Computer-Supported Collaborative Learning Series, vol 5. Springer, Boston, MA Daniel Ward, (2003) Managing Risk and Protecting the Organization: A Military Team Approach. Access Control and Security Systems, p.44-48. Davenport, Thomas H. and Prusak, Laurence., (2000) Working knowledge : how organizations manage what they know, Boston, Mass. : Harvard Business School Press Earl, M. J., and Scott, I. A. (1999) Opinion: what is a chief knowledge officer? Sloan Management Review, 40(2), 29-38. Elizabeth Wolfe Morrison and Frances J. Milliken (2000) Organizational Silence: A Barrier to Change and Development in a Pluralistic World, The Academy of Management Review, Vol. 25, No. 4 (Oct., 2000), pp. 706-725 Gibney, R., Zagenczyk, T. J., &; Masters M. F. (2009). The negative aspects of social exchange: An introduction to perceived organizational obstruction. Group &; Organization Management, 34(6): 665-697. Gilb, Tom. (1988) Principles of software engineering management. Reading, Mass.: Addison-Wesley. Husted, Kenneth ; Michailova, Snejina (2002) Diagnosing and Fighting Knowledge-Sharing Hostility, Organizational Dynamics, 2002, Vol.31(1), pp.60-73 Kontio, Jyrki (1999) Risk management in software development: a technology overview and the Riskit method, Proceedings of the 21st international conference on software engineering, 16 May 1999, pp.679-680 Massey, V., & Satao, K. (2012). Comparing various SDLC models and the new proposed model on the basis of available methodology. International Journal of Advanced Research in Computer Science and Software Engineering, 2(4), 170–177. Munassar, N., & Govardhan, A. (2010a). Comparison between five models of software engineering. International Journal of Computer Science Issues, 7(5), 94–101. Munassar, N., & Govardhan, A. (2010b). Hybrid model for software development Life Cycle. Journal of Science & Technology, Vol. (15) No.(1) Osterloh, Margit ; Frey, Bruno, (2000) Motivation, Knowledge Transfer, and Organizational Forms. Organization Science, Vol.11(5), p.538-550 Peter M Senge, (1997) The Fifth Discipline, Measuring Business Excellence, Vol. 1 Issue: 3, pp.46-51 P. Isaias and T. Issa, (2015), Information System Development Life Cycle Models, High Level Models and Methodologies for Information Systems, XVI, 145 p. 48 illus,, Hardcover ISBN: 978-1-4614-9253-5 Rhoades, L., &; Eisenberger, R. (2002). Perceived organizational support: A review of the literature. Journal of Applied Psychology, 87(4): 698-714. Ringelmann, M. (1913) Recherches sur les moteurs anims: Travail de l’homme. Annales de l’Institut National Argonomique, 2e srie, tom 12, 1-40 Robinson, Robert J. ; Keltner, Dacher ; Ward, Andrew ; Ross, Lee (1995) Actual versus assumed differences in construal: 'Naive realism' in intergroup perception and conflict. Journal of Personality and Social Psychology, Vol.68(3), pp.404-417 Robinson, S. L., and Bennett, R. J. (1995) A typology of deviant workplace behaviors: A multidimensional scaling study. Academy of Management Journal, 38 (2): 555- 572. doi: 10.2307/256693 Saquib Yusaf, Arooj Khan, (2018) Perceptions of organizational politics, knowledge hiding, and employee creativity: The moderating role of professional commitment, Malik, O.F., Personality and Individual Differences (2018), https://doi.org/10.1016/j.paid.2018.05.005 S. Bhalerao , D. Puntambekar (2009) Generalizing Agile Software Development Life Cycle. International Journal on Computer Science and Engineering, Vol.1(3), 2009, 222-226 Somayeh Labafl , (2017), Knowledge hiding as an obstacle of innovation in organizations a qualitative study of software industry, AD-minister Nº. 30 january-june 2017 pp. 131 - 148 · ISSN 1692-0279 · eISSN 2256-4322 Swap, W., Leonard, D., Shields, M., & Abrams, L. (2001). Using mentoring and storytelling to transfer knowledge in the workplace. Journal of Management Information Systems, 18, 95-114. Van Dyne, L., Ang, S., & Botero, I. G. (2003). Conceptualizing employee silence and employee voice as multidimensional constructs. Journal of Management Studies, 40 (6), 1359-1392. Webster, J., Brown, G., Zweig, D., Connelly, C. E., Brodt, S., & Sitkin, S. (2008). Beyond knowledge sharing: Withholding knowledge at work. Research in Personnel and Human Resources Management, 27, 1–37. doi:10.1016/s0742-7301(08)27001-5 Y. Cui, H.H. Park, Y. Paik (2016) Individual and organizational antecedents of knowledge hiding behavior, Korean Journal of Business Administration, 29 (2016), pp. 1215-1239 中文文獻 Brooks, Frederick P. (2004) 人月神話 : 軟體專案管理之道 (錢一一譯) 台北市 : 經濟新潮社出版 : 城邦文化發行 胡龍騰 (2008)。組織成員知識分享行為之影響因素:文獻、概念與命題。 論文發表於「2008 TASPAA年會暨夥伴關係與永續發展國際學術研討會」,東海大學。 張孆方 (2015)。企業社會責任對職場知識隱藏行為的影響:組織信任為中介作用。國立交通大學管理學院管理科學學程碩士論文,未出版,新竹。 陳雅音 (2012)。知識分享在大型專案所面臨之困難與挑戰 以賦稅再造資訊系統為例。國立台灣大學管理學院商學研究所碩士論文,未出版,台北。 曾暄芹 (2015)。團隊學習對員工創新行為之影響─以知識分享為中介變項。國立臺灣師範大學科技應用與人力資源發展學系碩士論文,未出版,台北。 湯姆・狄馬克、提摩西・李斯特 (2004) 與熊共舞:軟體專案的風險管理 (錢一一譯), 台北市:經濟新潮社出版: 家庭傳媒發行 劉富綺 (2015)。影響研發人員知識隱藏及沉默的因素。國立交通大學管理學院管理科學學程碩士論文,未出版,新竹。 簡容眉 (2006)。組織信任、知識分享、吸收能力與工作績效之關聯性研究。國立台灣科技大學企業管理系碩士班學位論文,未出版,台北。 顏亦涵 (2004)。知識管理活動中的風險評估-以軟體專案開發為例。國立臺灣大學資訊管理學研究所碩士論文,未出版,台北。 蘇明癸 (2015)。領導風格與部屬目標導向之探討¬¬¬¬ 對主管信任的調節作用。國立交通大學管理學院管理科學學程碩士論文,未出版,新竹。 | |
dc.identifier.uri | http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/22057 | - |
dc.description.abstract | 自二十世紀以來,資訊產業的發展日新月異,不管是在電腦硬體或是軟體上都有著長足的進步。隨著新科技的導入,使用者應用情境的漸趨複雜,伴隨著硬體運算能力的強大,軟體開發相關的技術創新以及架構複雜度也勢必面臨全新的挑戰。
對於企業來說,為了要能夠在競爭激烈的產業中奪得先機,如何透過知識管理與有效的知識分享來增進團體智識,實是重要課題。然而在實務上,我們仍然不難察覺員工對於知識分享的意願與參與度依舊會依其內在動機而有所影響。一直以來關於組織應如何進行知識分享的討論與探究始終相當熱絡,本研究試圖從另一視角切入,試圖從知識隱藏與沉默在軟體開發專案中所可能造成的風險,從動機探究,進行相關文獻整理,並配合專家訪談,試圖針對該風險對應提出建言。 | zh_TW |
dc.description.provenance | Made available in DSpace on 2021-06-08T04:00:12Z (GMT). No. of bitstreams: 1 ntu-107-P05546014-1.pdf: 2609976 bytes, checksum: df4f2633a6b630566870fcebf21ae530 (MD5) Previous issue date: 2018 | en |
dc.description.tableofcontents | 誌謝 1
中文摘要 2 第一章 緒論 5 第一節 研究背景與動機 5 第二節 研究目的 7 第三節 研究架構 8 第二章 文獻探討 9 第一節 談風險 9 第二節 知識分享、知識隱藏/沉默 14 第三章 軟體專案、風險、知識隱藏 20 第一節 軟體專案開發模型 20 第二節 軟體專案的風險視角 28 第三節 「人」對於軟體開發專案的重要 32 第四節 軟體開發專案與知識隱藏的關聯 35 小結 37 第四章 專家訪談內容與訪談分析 38 第一節 訪談內容摘要 38 第二節 訪談內容小結 48 第五章 結論與建議 51 第一節 研究結論 51 第二節 研究限制 54 參考文獻 56 | |
dc.language.iso | zh-TW | |
dc.title | 軟體專案開發的風險管理: 以知識隱藏與沉默做為風險因子 | zh_TW |
dc.title | Risk management for software project development:
Use knowledge hiding and silence as risk factors | en |
dc.type | Thesis | |
dc.date.schoolyear | 106-2 | |
dc.description.degree | 碩士 | |
dc.contributor.oralexamcommittee | 孔令傑,楊朝龍 | |
dc.subject.keyword | 軟體專案風險,沉默,知識隱藏, | zh_TW |
dc.subject.keyword | knowledge hiding,software project,risk management, | en |
dc.relation.page | 60 | |
dc.identifier.doi | 10.6342/NTU201802831 | |
dc.rights.note | 未授權 | |
dc.date.accepted | 2018-08-09 | |
dc.contributor.author-college | 工學院 | zh_TW |
dc.contributor.author-dept | 工業工程學研究所 | zh_TW |
Appears in Collections: | 工業工程學研究所 |
Files in This Item:
File | Size | Format | |
---|---|---|---|
ntu-107-1.pdf Restricted Access | 2.55 MB | Adobe PDF |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.