請用此 Handle URI 來引用此文件:
http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/24453完整後設資料紀錄
| DC 欄位 | 值 | 語言 |
|---|---|---|
| dc.contributor.advisor | 謝清佳(Ching-Cha Hsieh) | |
| dc.contributor.author | Hsiao-Chi Wu | en |
| dc.contributor.author | 吳筱琦 | zh_TW |
| dc.date.accessioned | 2021-06-08T05:26:35Z | - |
| dc.date.copyright | 2011-08-02 | |
| dc.date.issued | 2011 | |
| dc.date.submitted | 2011-07-28 | |
| dc.identifier.citation | 參考文獻
一、中文部分 王宏仁 (2007). ITIL要成功,派中階主管去上課, http://www.ithome.com.tw/itadm/article.php?c=45900, 2007-10-30, 台北. 李美華, 孔祥明, 李明寰, 林家娟, 王婷玉, & 李承宇 (1998). 社會科學研究方法(上下冊)譯自 Earl Babbie, The Practice of Research 8th Ed. 台北市: 時英出版社. 尚榮安譯 (2001). 個案研究. 初版, 台北市: 弘智文化, 民 90 年. 林千乃 (2009). 網路社群互動現象之詮釋性研究: 台灣大學資訊管理研究所博士論文. 徐宗國譯 (1997). 質性研究概論, 譯自:Strauss, A. & Corbin, J. Basic of Qualitative Research: Grounded Theory Procedures and Techniques, 台北: 巨流圖書公司. 陳宇芬 (2002). 資訊人員的系統開發與組織結構互動之探索性研究—以結構行動理論為基礎 台灣大學資訊管理研究所博士論文. 黃瑞祺譯 (1981). 現代社會學結構功能論選讀. 台北: 巨流圖書公司. 劉星劭,謝清佳 (2007). 回顧:資管領域批判研究發展現況,研究報告。. 蕭瑞麟 (2006). 不用數字的研究: 鍛鍊深度思考力的質性研究. 台北: 台灣培生教育. 謝定助 (2010). 資訊系統失敗情境下科技框架之重構-以資訊系統委外之縱貫性個案研究為例: 台灣大學資訊管理研究所博士論文. 謝定助, 謝清佳, & 洪銘建 (2007). 研究方法典範移轉?-國內資訊管理領域論文之調查. 資訊管理學報, 14(4), 1-29. 謝清佳, & 吳琮璠 (2009). 資訊管理:理論與實務. 第六版,台北巿: 智勝文化. 二、英文部分 Abdulrahman A. Mirza, & Alghathbar, K. (2009). Acceptance and Applications of Smart Cards Technology in University Settings. Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing, 746-748. Abrahamson, M. (2003). Functional, conflict, and neofunctional theories. A Handbook of Social Theory. G. Ritzer and B. Smart (Eds), 141-145. Achinstein, P. (1983). The Nature of Explanation. New York: Oxford University Press. Angrosino, M. (2007). Doing Ethnographic and Observational Research. London: Sage Publications Ltd. Babbie, E. R. (1997). The Practice of Social Research (8 ed.). Belmont, CA: Wadsworth Pub Co. Barley, S. (1986). Technology As An Occasion For Structuring: Evidence From Observations Of CT Scanners And The Social Order Of Radiology Departments. Administrative Science Quarterly, 31(1), 78-108. Barley, S., & Kunda, G. (2004). Gurus, Hired Guns, and Warm Bodies: Itinerant Experts in a Knowledge Economy: Princeton: Princeton University Press. Beath, C. & Ross, J. W. (2006). Selectively Outsourcing IT for Increased Business Value. Cambridge, Massachusetts: Center For Information Systems Research, Sloan School of Management, Massachusetts Institute of Technology, CISR WP No. 358 and Sloan WP No. 4613-036. Benbasat, I., Goldstein, D. K., & Mead, M. (1987). The case research strategy in studies of information systems. MIS quarterly, 369-386. Benbasat, I., & Zmud, R. W. (2003). The Identity Crisis Within the IS Discipline: Defining And Communicating the Discipline's Core Properties. MIS quarterly, 27(2), 183-194. Bertalanffy, L. (1968). General system theory: Foundations, development, applications: G. Braziller New York. Bjorn-Andersen, N., Eason, K., & Robey, D. (1986). Managing computer impact: an international study of management and organizations: Norwood, NJ, Ablex Publshing Corp. Boudreau, M. C., & Robey, D. (2005). Enacting Integrated Information Technology: A Human Agency Perspective. Organization science, 16(1), 3-18. Brynjolfsson, E., & Hitt, L. M. (2000). Beyond Computation: Information Technology, Organizational Transformation and Business Performance. Journal of Economic Perspectives, 14(4), 23-48. Carr, W., & Kemmis, S. (1986). Becoming critical: Education, knowledge, and action research. London: Falmer Press. Chan, Y. E., Huff, S. L., Barclay, D. W., & Copeland, D. G. (1997). Business Strategic Orientation, Information Systems Strategic Orientation, and Strategic Alignment. Information Systems Research, 8(2), 125-150. Chen, W. S., & Hirschheim, R. (2004). A Paradigmatic and Methodological Examination of Information Systems Research From 1991 To 2001. Information Systems Journal, 14(3), 197-235. Chervany, N., Dickson, G., & Kozar, K. (1972). An experimental gaming framework for investigating the influence of management information systems on decision effectiveness. Management Information Systems Research Center Working Paper, 71-12. Ching, S., Tai, A., Pong, J., & Cheng, M. (2009). Don't Let Micropayments Penalize You--Experience From The City University Of Hong Kong. The Journal of Academic Librarianship, 35(1), 86-97. Chreim, S., Williams, B., & Hinings, C. (2007). Interlevel Influences On The Reconstruction Of Professional Role Identity. Academy of Management Journal, 50(6), 1515-1539. Chua, W. F. (1986). Radical developments in accounting thought. The Accounting Review, 61(4), 601-632. Clark, C. (2005). Shopping Without Cash: The Emergence of the E-purse. Economic Perspectives, Federal Reserve Bank of Chicago, issue Q IV, 34-51. Clark, P. A. (1972). Action research and organizational change. Lodon: Harper & Row. Coyle-Shapiro, J., Morrow, P., & Kessler, I. (2006). Serving two organizations: Exploring the employment relationship of contracted employees. Human resource management, 45(4), 561-583. Davidson, E. (2002). Technology Frames and Framing: A Socio-Cognitive Investigation of Requirements Determination. MIS quarterly, 26(4), 329-358. Davidson, E. (2006). A Technological Frames Perspective on Information Technology and Organizational Change. The Journal of Applied Behavioral Science, 42(1), 23-39. Debes, M., Lewandowska, A., & Seitz, J. (2005). Definition and Implementation of Context Information. Paper presented at the Proceedings of the 2nd workshop on positioning, Navigation and Communication (WPMC '05) & 1st Ultra-Widenband Expert Talk (UET '05). Delamont, S. (2004). Ethnography and Participant Observation. In C. Seale, G. Gobo, J. Gubrium & D. Silverman (Eds.), Qualitative Research Practice (pp. 217-229). London: Sage. Denzin, N. K. (1978). The Research Act: a Theoretical Introduction to Sociological Methods. New York: McGraw-Hill Companies. Denzin, N. K. (1989). Interpretive Interactionism (Vol. 16): Sage Publications, Inc. Dey, A., Abowd, G., & Salber, D. (2001). A Conceptual Framework and a Toolkit for Supporting the Rapid Prototyping of Context-Aware Applications. Human–Computer Interaction, 16(2), 97-166. Doolin, B. (2004). Power and resistance in the implementation of a medical management information system. Information Systems Journal, 14(4), 343-362. Dore, R. (1994). Function and cause. In M. a. M. Martin, L. C. (Ed.), Readings in the philosophy of social science (pp. 377-389). Cambridge, Massachusetts: The MIT Press. Douglas, M. (1986). How institutions think. Syracuse: NY: Syracuse Iniversity Press. Dube, L., & Pare, G. (2003). Rigor in information systems positivist case research: Current practices, trends, and recommendations. MIS quarterly, 27(4), 597-636. Eisenhardt, K. M. (1989). Building theories from case study research. The Academy of Management Review, 14(4), 532-550. Elden, M., & Chisholm, R. F. (1993). Emerging varieties of action research: Introduction to the special issue. Human relations, 46(2), 121-142. Elster, J. (1983). Explaining technical change: A case study in the philosophy of science: Cambridge Univ. Press. Evans, J., Kunda, G., & Barley, S. (2004). Beach Time, Bridge Time, And Billable Hours: The Temporal Structure Of Technical Contracting. Administrative Science Quarterly, 49(1), 1-38. Felfe, J., Schmook, R., Schyns, B., & Six, B. (2008). Does The Form of Employment Make A Difference?--Commitment of Traditional, Temporary, and Self-Employed Workers. Journal of Vocational Behavior, 72(1), 81-94. Flood, R. (1999). Knowing of the Unknowable. Systemic Practice and Action Research, 12(3), 247-256. Forrester, J. (1961). Industrial dynamics: MIT press Cambridge, MA. Fowler, D. C., Swatman, P. M. C., & Welikala, J. (2000). Issues Affecting the Implementation of Multiple Application Smart Card Systems. 'CollECTeR USA' -- 4th CollECTeR Conference on Electronic Commerce, Breckenridge, Colorado, USA, http://www.collecter.org/collUSA/Fowler.pdf. Galliers, R., & Land, F. (1987). Viewpoint: choosing appropriate information systems research methodologies. Communications of the ACM, 30(11), 901-902. Gibson, C. (2007). Direct Energy: Evolving a New Role for IT: Center For Information Systems Research, Sloan School of Management, Massachusetts Institute of Technology, CISR WP No. 370 and Sloan WP No. 4665-07 Giddens, A. (1984). The constitution of society: Outline of the theory of structuration: University of California press. Glaser, B. G. (1978). Theoretical Sensitivity: Advances in the Methodology of Grounded Theory (Vol. 2). Mill Valley, CA: The Sociology Press Glaser, B. G., & Strauss, A. L. (1967). The Discovery of Grounded Theory: Strategies for Qualitative Research. Chicago: Aldine. Golden-Biddle, K., & Locke, K. (1993). Appealing work: An investigation of how ethnographic texts convince. Organization science, 4(4), 595-616. Gorry, G., & Morton, M. (1971). A framework for management information systems. Sloan Management Review, 13(1), 55-70. Gregor, S. (2006). The Nature of Theory in Information Systems. Management Information Systems Quarterly, 30(3), 611-642. Grimaldi, R., Mattarelli, E., & Tagliaventi, M. (2009). The Influence of Professional Identity on New Opportunity Recognition in Offshoring Processes. Paper presented at the Annual Meeting of the Academy of Management Proceedings, Chicago, Illinois, U.S.A. Guba, E. G., & Lincoln, Y. S. (1981). Effective Evaluation: Improving the Usefulness of Evaluation Results Through Responsive and Naturalistic Approaches. San Francisco, CA: Jossey-Bass. Handy, C. (1990). The Age of Unreason. Boston: MA: Harvard Bus. Sch. Handy, C. (2002). The Elephant And The Flea: Looking Backwards To The Future. Hutchinson: The Random House Group Ltd. Hannan, M. T., & Freeman, J. (1989). Organizational Ecology. Cambridge: Harvard Univ Press. Hardin, R. (1980). Rationality, irrationality and functionalist explanation. Social Science Information, 19(4-5), 755-772. Haynes, S. R. (2000). Explanations of Information Systems: Can Philosophy Help? Paper presented at the Proceedings of the 8th European Conference on Information Systems, Vienna, Austria, July 3-5. Hempel, C. (1994). The logic of functional analysis. In M. a. M. Martin, L. C. (Ed.), Readings in the philosophy of social science (pp. 349-375). Cambridge, Massachusetts: The MIT Press. Henderson, J. C., & Venkatraman, N. (1992). Strategic alignment: a model for organizational transformation through information technology: Oxford University Press, New York. Hirschheim, R., & Klein, H. (1994). Realizing emancipatory principles in information systems development: the case for ETHICS. MIS quarterly, 18(1), 83-109. Hirschheim, R., & Klein, H. (2003). Crisis in the IS Field? A Critical Reflection on the State of the Discipline. Journal of the Association for Information Systems, 4(5), 237-293. Hirschheim, R., & Newman, M. (1991). Symbolism And Information Systems Development: Myth, Metaphor and Magic. Information Systems Research, 2(1), 29-61. Hogg, M. A. (2003). Social Identity. In M. Leary & J. Tangney (Eds.), Handbook of self and identity (pp. 462-479). New York: The Guilford Press. Hogg, M. A., Terry, D., & White, K. (1995). A Tale Of Two Theories: A Critical Comparison Of Identity Theory With Social Identity Theory. Social Psychology Quarterly, 58(4), 255-269. Holmstrom, J., & Stalder, F. (2001). Drifting technologies and multi-purpose networks: the case of the Swedish cashcard. Information and organization, 11(3), 187-206. Hovorka, D., Germonprez, M., & Larsen, K. (2008). Explanation in information systems. Information Systems Journal, 18(1), 23-43. Hsiao-Chi Wu, Jen Wel Chen, & Ching-Cha Hsieh (2011a). Creating Added Value for Smart Card Applications: The University as a Case Study. Paper presented at the The Fourth International Conference on Advances in Computer-Human Interactions (ACHI), Gosier, Guadeloupe, France. Hsiao-Chi Wu, Jen Wel Chen, & Ching-Cha Hsieh (2011b). Understanding Mobile Payment Service in University Campus: A Context-awareness View. Paper presented at the The Fifth International Conference on Digital Society (ICDS), Gosier, Guadeloupe, France. Ibarra, H. (2003). Working Identity: Unconventional Strategies For Reinventing Your Career: Harvard Business School Pr. Ives, B., Hamilton, S., & Davis, G. (1980). A framework for research in computer-based management information systems. Management Science, 26(9), 910-934. Jen Wel Chen, Hsiao-Chi Wu, & Ching-Cha Hsieh (2011). Developing the Mobile Service Applications of a Micropayment Platform(MPP): the Perspective of Actor-Network Theory. Paper presented at the The Sixth International Conference on Internet and Web Applications and Services (ICIW), St. Maarten, The Netherlands Antilles. Jones, M., & Karsten, H. (2008). Giddens’s structuration theory and information systems research. MIS quarterly, 32(1), 127-157. Kaarst-Brown, M. L. (2005). Understanding an Organization's View of the CIO: the Role of Assumptions about IT. MIS Quarterly Executive, 4(2), 287-301. Kaarst-Brown, M. L. & Robey, D. (1999). More On Myth, Magic And Metaphor: Cultural Insights Into The Management Of Information Technology In Organizations. Information Technology & People, 12(2), 192-217. Kalleberg, A. (2000). Nonstandard employment relations: Part-time, temporary and contract work. Annual review of sociology, 26(1), 341-365. Kanungo, S. (2004). On the emancipatory role of rural information systems. Information Technology & People, 17(4), 407-422. Kerlinger, F. N., & Lee, H. B. (2000). Foundations of Behavioral Research (4 ed.). Fort Worth, TX: Harcourt College Publishers. Khapova, S., Arthur, M., Wilderom, C., & Svensson, J. (2007). Professional Identity As The Key To Career Change Intention. Career Development International, 12(7), 584-595. Kincaid, H. (1994). Assessing Functional Explanation in the Social Sciences. In M. Martin & L. C. McIntyre (Eds.), Readings in the Philosophy of Social Science (pp. 415-428). Cambridge, Massachusetts: The MIT Press. Kirk, J., & Miller, M. L. (1986). Reliability and Validity in Qualitative Research. CA: Sage Publications. Kleiber, P. B. (2004). Focus groups: More than a method of qualitative inquiry. In K. de Marrais & S. D. Lapan (Eds.), Foundations for Research: Methods of Inquiry in Education and the social Sciences (pp. 87-102). Mahwah, NJ: Lawrence Erlbaum. Klein, H. K., & Myers, M. D. (1999). A set of principles for conducting and evaluating interpretive field studies in information systems. MIS quarterly, 67-93. Knoll, K., & Jarvenpaa, S. L. (1994). Information Technology Alignment Or “Fit” In Highly Turbulent Environments: The Concept Of Flexibility. Paper presented at the SIGCPR '94 Proceedings of the 1994 Computer Personnel Research Conference On Reinventing IS : Managing Information Technology In Changing Organizations. Kroes, P. (1998). Technological Explanations: The Relation Between Structure and Function of Technological Objects. Society for Philosophy & Technology, 3(3), 18-34, http://scholar.lib.vt.edu/ejournals/SPT/v13n13/pdf/KROES.PDF. Kuhn, T. (1962). The Structure of Scientific Revolution. Chicage: Chicage University Press. Kunda, G., Barley, S., & Evans, J. (2002). Why Do Contractors Contract? The Experience Of Highly Skilled Technical Professionals In A Contingent Labor Market. Industrial and Labor Relations Review, 234-261. Kvasny, L., & Keil, M. (2006). The Challenges of Redressing the Digital Divide: A Tale of Two US Cities. Information Systems Journal, 16(1), 23-53. Lacity, M. C., & Willcocks, L. P. (1998). An Empirical Investigation of Information Technology Sourcing Practices: Lessons From Experience. MIS quarterly, 22(3), 363-408. Lee, A. S. (1991). Integrating Positivist and Interpretive Approaches to Organizational Research. Organization science, 2(4), 342-365. Lee, A. S. (2004). Thinking about Social Theory and Philosophy for Information Systems. In J. Mingers & L. Willcocks (Eds.), Social Theory and Philosophy for Information Systems (pp. 1-26): Wiley. Lee, A. S. , & Hubona, G. (2009). A Scientific Basis for Rigor in Information Systems Research. MIS Quarterly 33(2), 237-262. Lee, C. H. M., Cheng, Y. W., & Depickere, A. (2003). Comparing smart card adoption in Singapore and Australian universities. International Journal of Human-Computer Studies, 58(3), 307-325. Liang, T. (1986). Critical success factors of decision support systems: An experimental study. ACM SIGMIS Database, 17(2), 3-16. Lieblich, A., Tuval-Mashiach, R., & Zilber, T. (1998). Narrative research: Reading, analysis and interpretation (Vol. 47): Sage Publications, Inc. Lin, A., & Silva, L. (2005). The Social and Political Construction of Technological Frames. European Journal of Information Systems, 14(1), 49-59. Lincoln, Y. S., & Guba, E. G. (1985). Naturalistic Inquiry. Newbury, CA: Sage Publications, Inc. Lucas Jr, H. (1973). A descriptive model of information systems in the context of the organization. Data Base, 5(2), 27-36. Lyytinen, K. (1987). Different perspectives on information systems: problems and solutions. ACM Computing Surveys (CSUR), 19(1), 5-46. Magal, S., Carr, H., & Watson, H. (1988). Critical success factors for information center managers. MIS quarterly, 12(3), 413-425. Mann, M. (1984). Functionalism The International Encyclopedia of Sociology (pp. 138-140). New York: NY: Continuum. Marks, A., & Scholarios, D. (2007). Revisiting Technical Workers: Professional And Organisational Identities In The Software Industry. New Technology, Work and Employment, 22(2), 98-117. Markus, M. L. (1983). Power, Politics, and MIS Implementation. Communications of the ACM, 26(6), 430-444. Markus, M. L. (1994). Finding a Happy Medium: Explaining the Negative Effects of Electronic Communication on Social Life at Work. ACM Transactions on Information Systems, 12(2), 119-149. Markus, M. L. (1997). The Qalitative Difference in IS Research and Practice. In A. S. Lee, Liebenau, J., DeGross, J.I. (Ed.), IFIP International Federation for Information Processing. (Ibid.) Processings of the IFIP TC 8 8.2 International Conference on Information Systems and Qualitative Research (pp. 11-27). Chapman and Hall, London: Philadelphia, PA. Markus, M. L. (2004). Fit For Function: Functionalism, Neofunctionalism, and Information Systems. In J. Mingers & L. Willcocks (Eds.), Social Theory and Philosophy for Information Systems (pp. 27-55). Chichester: John Wiley & Sons. Markus, M. L., & Benjamin, R. (1997). The Magic Bullet Theory In IT-Enabled Transformation. Sloan Management Review, 38(2), 55-68. Markus, M. L., & Robey, D. (2004). Why stuff happens: Explaining the unintended consequences of using IT. In K. V. A. a. M. T. Vendelo (Ed.), The Past and Future of Information Systems (pp. 61-93): Oxford: Elsevier Butterworth-Heinemann. Martin, E. (1982). Critical Success Factors Of Chief MIS/DP Executives. MIS quarterly, 6(2), 1-9. Mason, R., & Mitroff, I. (1973). A program for research on management information systems. Management Science, 19(5), 475-487. McLaughlin, P. (2001). What Functions Explain: Functional Explanation and Self-Reproducing Systems. New York: Cambridge University Press. McLoughlin, I., Badham, R., & Couchman, P. (2000). Rethinking Political Process in Technological Change: Socio-Technical Configurations and Frames. Technology Analysis & Strategic Management, 12(1), 17-37. McNabb, D. E. (2002). Research Methods in Public Administration and Nonprofit Management: Quantitative and Qualitative Approaches. Armonk, NY: M. E. Sharpe. Merton, R. K. (1968). Manifest and Latent Functions. In R. Merton (Ed.), Social Theory and Social Structure (pp. 73-138). New York: Free Press. Merton, R. K. (1968). Social Theory and Social Structure New York: Free Press. Miller, D. C., & Salkind, N. J. (2002). Handbook of Research Design and Social Measurement (6 ed.). Thousand Oaks. London. New Delhi: Sage Publications. Mingers, J. (2001). Combining IS Research Methods: Towards a Pluralist Methodology. Information Systems Research, 12(3), 240-259. Mingers, J. (2003). The paucity of multimethod research: a review of the information systems literature. Information Systems Journal, 13(3), 233-249. Mingers, J., & Brocklesby, J. (1997). Multimethodology: Towards a Framework for Mixing Methodologies. Omega, 25(5), 489-509. Mock, T. (1973). A longitudinal study of some information structure alternatives. Data Base, 5(2-3-4), 40-49. Munro, M., & Wheeler, B. (1980). Planning, critical success factors, and management's information requirements. MIS quarterly, 4(4), 27-38. Murray, F. (1991). Technical rationality and the IS specialist: Power, discourse and identity. Critical Perspectives on Accounting, 2(1), 59-81. Myers, M. (1994). A Disaster for Everyone to See: an Interpretive Analysis of a Failed IS Project. Accounting, Management and Information Technologies, 4(4), 185-201. Myers, M. D. (1997). Qualitative Research in Information Systems. MIS Quarterly, 21(2), 241-242. MISQ Discovery, archival version, June 1997, http://www.misq.org/discovery/MISQD_isworld/. MISQ Discovery, updated version, last modified: February 1917, 2011 www.qual.auckland.ac.nz. Myers, M. D. (2004). Hermeneutics in Information Systems Research. In J. Mingers & L. Willcocks (Eds.), Social Theory and Philosophy for Information Systems (pp. 103-128). Chichester: John Wiley & Sons. Myers, M. D. (2009). Qualitative Research in Business & Management. London: Sage Publications Ltd. Nachmias, D., & Frankfort-Nachmias, C. (1996). Research Methods in the Social Sciences (5 ed.). New York: St. Martin's Press. Nandhakumar, J., & Jones, M. (2003). Too close for comfort? Distance and engagement in interpretive information systems research. Information Systems Journal, 7(2), 109-131. Oliver, D., & Romm, C. (2002). Justifying enterprise resource planning adoption. Journal of Information Technology, 17(4), 199-213. Orlikowski, W. J. (1992). The Duality of Technology: Rethinking the Concept of Technology in Organizations. Organization science, 3(3), 398-427. Orlikowski, W. J. (2002). Knowing in Practice: Enacting a Collective Capability in Distributed Organizing. Organization Science, 13(3), 249-273. Orlikowski, W. J, & Baroudi, J. J. (1991). Studying Information Technology in Organizations: Research Approaches and Assumptions. Information Systems Research, 2(1), 1-28. Orlikowski, W. J., & Gash, D. C. (1994). Technological Frames: Making Sense of Information Technology in Organizations. ACM Transactions on Information Systems (TOIS), 12(2), 174-207. Orlikowski, W. J. , & lacono, C. S. (2001). Research Commentary: Desperately Seeking the 'IT' in IT Research -- A Call to Theorizing The IT Artifeact. Information Systems Research, 12(2), 121-134. Orlikowski, W. J. (1996). Improvising Organizational Transformation Over Time: A Situated Change Perspective. Information Systems Research, 7(1), 63-92. Orlikowski, W. J. (2000). Using Technology and Constituting Structures: A Practice Lens for Studying Technology in Organizations. Organization science, 11(4), 404. Orlikowski, W. J., & Baroudi, J. J. (1991). Studying information technology in organizations: Research approaches and assumptions. Information Systems Research, 2(1), 1-28. Ovaska, P., Rossi, M., & Smolander, K. (2005). Filtering, Negotiation and Shifting in the Understanding of Information System Requirements. Scandinavian Journal of Information Systems, 17(1), 31-66. Papazafeiropoulou, A., & McGrath, K. (2007). Persistent problems with IT-user collaboration: a functionalist explanation of relationship management. Paper presented at the ICIS 2007 Preceedings. Pare, G. (2004). Investigating information systems with positivist case study research. Communications of the Association for Information Systems, 13(1), 233-264. Patton, M. Q. (1987). How to Use Qualitative Methods in Evaluation. Newbury Park, CA: Sage Publications. Patton, M. Q. (1990). Qualitative Evaluatin and Research Methods (2 ed.). Newbury Park, CA: Sage Publications. Payne, G., & Payne, J. (2004). Key Concepts in Social Research. London. Thousand Oaks. New Delhi: Sage publications. Prasad, B. D. (2008). Content Analysis. In D. K. Lal Das & V. Bhaskaran (Eds.), Research methods for Social Work (pp. 173-193). New Delhi: Rawat. Pratt, M., Rockmann, K., & Kaufmann, J. (2006). Constructing Professional Identity: The Role Of Work And Identity Learning Cycles In The Customization Of Identity Among Medical Residents. Academy of Management Journal, 49(2), 235-262. Puri, S., & Sahay, S. (2003). Participation through communicative action: A case study of GIS for addressing land/water development in India. Information Technology for Development, 10(3), 179-199. Ritzer, G. (2007). Contemporary sociological theory and its classical roots. Boston :: McGraw-Hill Higher Education. Ross, J. (2003). Creating a strategic IT architecture competency: Learning in stages: Center For Information Systems Research, Sloan School of Management, Massachusetts Institute of Technology, CISR WP No. 335 and Sloan WP No. 4314-03 Sabherwal, R., Hirschheim, R., & Goles, T. (2001). The Dynamics of Alignment: Insights from a Punctuated Equilibrium Model. Organization science, 12(2), 179-197. Sambamurthy, V., & Zmud, R. W. (1999). Arrangements For Information Technology Governance: A theory of Multiple Contingencies. MIS quarterly, 23(2), 261-290. Scherer, A. (2003). Modes of explanation in organization theory. In H. T. C. Knudsen (Ed.), The Oxford Handbook of Organization Theory (pp. 310-344). Oxford: Oxford University Press. Schultze, U. (2000). Knowledge management technology and the reproduction of knowledge work practices. The Journal of Strategic Information Systems, 9(2-3), 193-212. Senge, P. (1990). The fifth discipline: Doubleday New York. Shanks, G. (1997). The challenges of strategic data planning in practice: an interpretive case study. Journal of Strategic Information Systems, 6(1), 69-90. Silverman, D. (2006). Interpreting Qualitative Data: Methods for Analyzing Talk, Text and Interaction (3 ed.). London, Thousand Oask, New Delhi: Sage Publications Ltd. Soh, C., & Sia, S. K. (2004). An Institutional Perspective on Sources of ERP Package-Organisation Misalignments. The Journal of Strategic Information Systems, 13(4), 375-397. Stets, J., & Burke, P. (2000). Identity Theory and Social Identity Theory. Social Psychology Quarterly, 63(3), 224-237. Stinchcombe, A. (1968). Constructing social theories. New York: NY: Harcourt Brace and World. Strauss, A., & Corbin, J. (1990). Basics of Qualitative Research: Grounded Theory Procedures and Techniques. Newbury Part, CA: Sage Publications. Strauss, A., & Corbin, J. (1998). Basics of Qualitative Research: Techniques and Procedures for Developing Grounded Theory (2 ed.). Thousand Oaks, CA: Sage Publications. Street, C. T., & Meister, D. B. (2004). Small business growth and internal transparency: The role of information systems. MIS quarterly, 28(3), 473-506. Sus, S., & Kleiner, M. (2009). Commitment And Work-Related Expectations In Flexible Employment forms: An Empirical Study of German IT Freelancers. European Management Journal. doi:10.1016/j.emj.2009.02.002 Sutton, R. I., & Staw, B. M. (1995). What Theory is Not. Administrative science quarterly, 40(3), 371-384. Tajfel, H. (1974). Social Identity and Intergroup Behaviour. Social Science Information, 13(2), 65-93. Tenner, E., & Rall, J. (1997). Why things bite back: Technology and the revenge of unintended consequences: New York, NY, Alfred A. Knopf. Thong, J. Y. L. (2001). Resource Constraints And Information Systems Implementation In Singaporean Small Businesses. Omega, 29(2), 143-156. Thong, J. Y. L., & Yap, C. S. (1995). CEO Characteristics, Organizational Characteristics And Information Technology Adoption In Small Businesses. Omega, 23(4), 429-442. Trauth, E. M., & Jessup, L. M. (2000). Understanding computer-mediated discussions: positivist and interpretive analyses of group support system use. MIS Quarterly, 24(1), 43-79. Urquhart, C., Lehmann, H., & Myers, M. D. (2010). Putting the ‘Theory’ Back into Grounded Theory: Guidelines for Grounded Theory Studies in Information Systems. Information Systems Journal, 20(4), 357-381. Veblen, T. (1965). The theory of the leisure class. 1899: AM Kelley, bookseller. Venkatraman, N. (1994). IT-Enabled Business Transformation: From Automation to Business Scope Redefinition. Sloan Management Review, 35(2), 73-87. Walsh, J. P. (1995). Managerial and Organizational Cognition: Notes From a Trip Down Memory Lane. Organization Science, 6(3), 280-321. Walsham, G. (1993). Interpreting information systems in organizations: John Wiley & Sons, Inc. New York, NY, USA. Walsham, G. (1995). The emergence of interpretivism in IS research. Information Systems Research, 6(4), 376-394. Walsham, G. (1995). Interpretive case studies in IS research: nature and method. European Journal of Information Systems, 4(2), 74-81. Walsham, G. (1998). IT and changing professional identity: Micro-studies and macro-theory. Journal of the American Society for Information Science, 49(12), 1081-1089. Waring, T. (2004). Communicating the complexity of integrating information systems: a case study of the procurement of a payroll-personnel system. International Journal of Human Resources Development and Management, 4(4), 431-448. Waring, T., & Wainwright, D. (2002). Enhancing clinical and management discourse in ICT implementation. Journal of management in Medicine, 16(2/3), 133-149. Watkins, J. W. N. (1994). Historical Explanation in the Social Science. In M. Martin & L. C. McIntyre (Eds.), Readings in the Philosophy of Social Science (pp. 441-450). Cambridge, Massachusetts: The MIT Press. Winter, S., & Taylor, S. (1996). The role of IT in the transformation of work: a comparison of post-industrial, industrial, and proto-industrial organization. Information Systems Research, 7, 5-21. Wong, P. L. K., & Ellis, P. (2002). Social ties and partner identification in Sino-Hong Kong international joint ventures. Journal of International Business Studies, 267-289. Yakura, E. (2002). Charting time: Timelines As Temporal Boundary Objects. Academy of Management Journal, 45(5), 956-970. Yin, R. K. (1989). Case study research: Sage Publ. Yin, R. K. (1994). Case Study Research (2 ed.): Sage publications Newbury Park. | |
| dc.identifier.uri | http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/24453 | - |
| dc.description.abstract | 實證科學之目的在於理解與解釋「現象為何發生」,最常使用因果解釋模式,來解釋變項之間的關係。但是有一些現象,是基於人們目的下的行為所產生的現象,不同於因果解釋,並非具有前因後果的時間順序關係,「功能解釋(functionalist explanation)」則提供另一個推理邏輯的架構。然而,迄今在資訊管理學域裡,做功能解釋研究卻仍是寥寥無幾。因此,本研究旨在探討功能解釋在資訊管理研究的應用。
在資訊管理學域裡,功能解釋是相對較新的方法。對照於因果解釋模式來看,並不是以有其「因」必得其「果」的解釋,對現象作預測與控制。功能解釋的特色在於,著重於人們目的下的行為結果,提供個殊情境下的整體理解,以行為的「實際結果」來解釋事件為什麼「持續發生的原因」,聚焦於一些獨特的負面現象,找出「功能」,解釋表象行為背後潛藏的深層想法。然而,功能解釋有分析步驟,卻無法獲知該如何找出「功能」來解釋現象。因此,本研究企圖找出功能解釋應用於資訊管理研究,三項待解決的問題:(1)就操作面來說,可否建立確切的研究步驟與工具? (2)就現象解釋面來說,其解釋力有何特色? (3) 就理論面來說,功能解釋能夠用來形成理論嗎? 基於此,本研究利用功能解釋既有的分析步驟,引領三個個案實作功能解釋研究,深入瞭解功能解釋在操作面、現象解釋面,以及理論面等問題。 本研究藉由三個個案實作的經驗與文獻分析,主要研究貢獻:(1) 建立功能解釋確切的研究步驟與分析工具;(2) 瞭解功能解釋解釋力的特色、解釋層面,以及所能解釋的現象;(3) 確認功能解釋之研究具備測試理論與修正理論之能力;(4) 為功能解釋在資訊管理研究學域中作一定位;(5) 理解功能解釋未能廣泛採用的原因;期待功能解釋能豐富資訊管理學域之研究。 | zh_TW |
| dc.description.abstract | Empirical science is to understand and further explain the occurrence of the phenomena interested. It adopts most frequently the causal explanation which explains the relationship among variables. Nevertheless, some phenomena which are originally raised from some specific purposes of human behavior cannot be properly interpreted by the causal explanation. Functionalist explanation then provides a logical-reasoning alternative for such cases. However, there are, so far, still very few researches on functionalist explanation in information management research. Therefore, this study explores functionalist explanation applied in information management research.
In information management research, the functionalist explanation is a relatively new approach. It focuses on the causes of the persistency of incidents, but not the causes of the occurrence of incidents. Its characteristics include focusing on the outcomes of human behavior under specific purposes, providing the whole understanding of specific situation, explaining why the incidents persist by some negative effects, and finding 'the function' to dig out the deep belief behind the appearance behavior. The main contributions of this research on functionalist explanation are (1) to establish its operational steps and analytical tools; (2) to understand its characteristics for the interpretation power; (3) to confirm its ability on testing and amending theories; (4) to position it in information management research; (5) to explain why it has not been widely used. Through these contributions, it is expected that the research of information management could be enriched by the functionalist explanation. | en |
| dc.description.provenance | Made available in DSpace on 2021-06-08T05:26:35Z (GMT). No. of bitstreams: 1 ntu-100-D91725009-1.pdf: 1977864 bytes, checksum: 71c6330abf1786605d2a2b5cbc957855 (MD5) Previous issue date: 2011 | en |
| dc.description.tableofcontents | 誌 謝 iii
摘 要 v Abstract vii 第壹章 緒論 1 第一節 研究背景與動機 1 第二節 研究問題與研究目的 7 (一) 研究問題 7 (二) 研究目的 7 第三節 內容概要 8 第貳章 文獻探討 9 第一節 科學典範下的解釋模式 9 第二節 社會學領域裡功能解釋的背景與發展 11 (一) Merton功能論 11 (二) 功能解釋的邏輯 13 (三) 功能解釋的分析步驟 16 (四) 小結 18 第三節 功能解釋在資訊管理領域的研究 18 (一) 快樂的電子郵件 19 (二) 關係管理經理真的改善IT人員與業務人員的關係嗎 22 (三) 相關的研究議題 25 (四) 小結 26 第三節 功能解釋可採用的研究方法 28 (一) 研究的邏輯結構 29 (二) 資料收集方式 30 (三) 資料分析方法 35 (四) 研究判準 43 (五) 小結 44 第三章 研究方法與設計..........................................................................................46 第一節 研究方法..............................................................................................46 (一) 文獻分析法..................................................................................46 (二) 個案研究法..................................................................................46 第二節 研究設計..............................................................................................48 (一) 研究步驟......................................................................................49 (二) 資料收集......................................................................................50 (三) 資料分析......................................................................................54 第四章 個案一:C機構資訊系統開發與實行個案...............................................55 第一節 個案背景..............................................................................................55 第二節 個案故事..............................................................................................56 (一) 建置「完整的招生系統」..........................................................56 (二) 涵蓋所有需求的系統設計理念..................................................57 (三) 教務系統不斷地產生新需求......................................................58 (四) 資訊系統不會出錯,人才會出錯..............................................59 (五) C機構擁抱先進的資訊科技與開發技術...................................60 第三節 個案分析..............................................................................................61 (一) 界定問題活動..............................................................................61 (二) 功能與威脅..................................................................................62 (三) 因果反饋......................................................................................66 (四) 小結..............................................................................................70 第四節 個案討論..............................................................................................71 第五節 個案在操作方法上的討論..................................................................74 第六節 如何呈現個案、分析過程與結果......................................................79 第五章 個案二:N大學小額付費個案..................................................................81 第一節 個案背景..............................................................................................81 第二節 統計調查的結果..................................................................................83 第三節 個案的故事..........................................................................................87 (一) 使用校園悠遊卡其實是不便利的..............................................87 (二) 使用校園悠遊卡的隱憂與風險..................................................88 (三) N大學師生實際想要的校園悠遊卡服務..................................89 第四節 個案分析..............................................................................................92 (一) 界定問題活動..............................................................................92 (二) 找出威脅......................................................................................93 (三) 中止功能解釋分析步驟..............................................................97 (四) 小結..............................................................................................99 第五節 個案在操作方法上的討論................................................................100 第六章 個案三:貴的IT Freelancer──專家Alfred ...........................................103 第一節 個案緣起............................................................................................103 第二節 個案背景............................................................................................104 第三節 專家Alfred的五個故事.....................................................................113 (一) Freelancer不是一人公司...........................................................113 (二) 演講與證照課程是用來認識顧客,持續承接顧問案才是關鍵! ...................................................................................................................114 (三) Freelancer is NOT So Free! .......................................................117 (四) 自由自在的生活是有代價的....................................................119 (五) 我好無聊喔!該何去何從?......................................................121 第四節 個案分析............................................................................................124 (一) 界定問題活動............................................................................124 (二) 功能與威脅................................................................................126 (三) 第二輪:界定問題活動............................................................130 (四) 第二輪:功能與威脅................................................................131 (五) 因果反饋....................................................................................137 (六) 小結............................................................................................142 第五節 個案討論............................................................................................143 第六節 個案在操作方法上的討論................................................................144 第七章 研究結果....................................................................................................150 第一節 建立功能解釋的研究步驟與工具....................................................150 (一) 現有功能解釋分析步驟實作上的困難....................................150 (二) 資料收集方法............................................................................152 (三) 資料分析方法............................................................................154 (四) 功能解釋的研究信度與效度....................................................157 (五) 功能解釋的研究步驟、工具與特性........................................159 第二節 功能解釋的解釋力............................................................................166 (一) 功能解釋的特色與解釋層面....................................................166 (二) 功能解釋適合用來解釋何種現象............................................168 第三節 功能解釋能夠建立理論嗎?..............................................................171 第八章 結論............................................................................................................176 第一節 綜合整理............................................................................................176 第二節 在研究方法上的意涵........................................................................178 第三節 在實務上的意涵................................................................................179 第四節 研究限制與未來研究方向................................................................180 參考文獻....................................................................................................................182 附錄一 陳宇芬(2002)博士論文的研究概要.........................................................198 附錄二 N大學校園卡證應用問卷調查................................................................201 | |
| dc.language.iso | zh-TW | |
| dc.subject | 資訊管理研究 | zh_TW |
| dc.subject | 功能解釋 | zh_TW |
| dc.subject | 研究途徑 | zh_TW |
| dc.subject | 研究方法 | zh_TW |
| dc.subject | Functionalist Explanation | en |
| dc.subject | Information Management Research | en |
| dc.subject | Research Method | en |
| dc.subject | Research Approach | en |
| dc.title | 功能解釋在資訊管理研究的應用 | zh_TW |
| dc.title | Functionalist Explanation applied in Information Management Research | en |
| dc.type | Thesis | |
| dc.date.schoolyear | 99-2 | |
| dc.description.degree | 博士 | |
| dc.contributor.oralexamcommittee | 許士軍,陳海鳴,沈佩蒂,陳鴻基,許瑋元 | |
| dc.subject.keyword | 功能解釋,研究途徑,研究方法,資訊管理研究, | zh_TW |
| dc.subject.keyword | Functionalist Explanation,Research Approach,Research Method,Information Management Research, | en |
| dc.relation.page | 209 | |
| dc.rights.note | 未授權 | |
| dc.date.accepted | 2011-07-28 | |
| dc.contributor.author-college | 管理學院 | zh_TW |
| dc.contributor.author-dept | 資訊管理學研究所 | zh_TW |
| 顯示於系所單位: | 資訊管理學系 | |
文件中的檔案:
| 檔案 | 大小 | 格式 | |
|---|---|---|---|
| ntu-100-1.pdf 未授權公開取用 | 1.93 MB | Adobe PDF |
系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。
