Skip navigation

DSpace

機構典藏 DSpace 系統致力於保存各式數位資料(如:文字、圖片、PDF)並使其易於取用。

點此認識 DSpace
DSpace logo
English
中文
  • 瀏覽論文
    • 校院系所
    • 出版年
    • 作者
    • 標題
    • 關鍵字
  • 搜尋 TDR
  • 授權 Q&A
    • 我的頁面
    • 接受 E-mail 通知
    • 編輯個人資料
  1. NTU Theses and Dissertations Repository
  2. 管理學院
  3. 資訊管理學系
請用此 Handle URI 來引用此文件: http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/55504
完整後設資料紀錄
DC 欄位值語言
dc.contributor.advisor莊裕澤(Yuh-Jzer Joung)
dc.contributor.author"Yen Win, Lai"en
dc.contributor.author賴彥彣zh_TW
dc.date.accessioned2021-06-16T04:06:12Z-
dc.date.available2015-09-12
dc.date.copyright2014-09-12
dc.date.issued2014
dc.date.submitted2014-09-08
dc.identifier.citationAbrahamson, E., & Fairchild, G. (1999). Management fashion: Lifecycles, triggers, and collective learning processes. Administrative Science Quarterly, 44, 708-740.
Aldrich, H. E., & Fiol, M. C. (1994). Fools Rush in: The Institutional Context of Industry Creation. The Academy of Management Review, 19 (4), 645-670.
Armbrust, M., Fox, A., Griffith, R., Joseph, A. D., Katz, R., Konwinski, A., Lee, G., Patterson, D., Rabkin, A., Stoica, I., & Zaharia, M. (2010). A view of cloud computing. Commun. ACM, 53(4), 50-58. doi: 10.1145/1721654.1721672
Birman, K., Chockler, G., & Van-Renesse, R. (2009). Toward a Cloud Computing Research Agenda. ACM SIGACT News, 40(2), 68-80.
Carr, N. (2009). The Big Switch: Rewiring the World, from Edison to Google.: W. W. Norton & Company.
Chang, C. H., Yang, C. T., Lu, C. W., Chen, J. N., Hsiung, P. A., Chu, C. C., & Lee, H. M. (2012). Cloud computing in Taiwan. Computer, 45(6), 48-56. doi: 10.1109/MC.2012.188
Chen, W. C., Hu, C. H., Hsu, Y. Y., Chu, C. C., Wu, C. S., Huang, C. C., Huang, Y. T., Young, H. C., & Liang, K. H. (2011). Design and Implementation of CHT Cloud-Centric BSS/OSS. Telecom Research, 41(3), 487-502.
Cusumano, M. (2010). Cloud Computing and SaaS as New Computing Platforms. Communications of the ACM, 53(4), 27-29.
David, R. J., Sine, W. D., & Haveman, H. A. (2013). Seizing Opportunity in Emerging Fields: How Institutional Entrepreneurs Legitimated the Professional Form of Management Consulting. Organization Science, 24(2), 356-377.
DiMaggio, P. J., & Powell, W. W. (1983). The Iron Cage Revisited Institutional Isomorphism and Collective Rationality in Organization Fields. American Sociological Review, 48(2), 147-160.
Egwutuoha, I. P., Schragl, D., & Calvo, R. (2013). A Brief Review of Cloud Computing, Challenges and Potential Solutions. Parallel and Cloud Computing, 2(1), 7-14.
Ericsson. (2012). The Telecom Cloud Opportunity (pp. 1-13): Ericsson.
Fernando, N., Loke, S. W., & Rahayu, W. (2013). Mobile cloud computing: A survey. Future Generation Computer Systems,, 29(1), 84–106.
Geczy, P., Izumi, N., & Hasida, K. (2012). Cloudsourcing: Managing Cloud Adoption. Global Journal of Business Research, 6(2), 57-70.
Gardner, H. K., Anand, N., & Morris, T. (2008). Chartering new territory : diversification, legitimacy, and practice area creation in professional service firms. Journal of Organizational Behavior, 29, 1101-1121.
Garud, R., Jain, S., & Kumaraswamy, A. (2002). Institutional entrepreneurship in the sponsorship of common technical standards: The case of Sun Microsystems and Java. Academic Management Journal, 45, 196–214.
Greenwood, R., Suddaby, R., & Hinings, C. (2002a). Theorizing Change: The Role of Professional Associations in the Transformation of Institutionalized Fields. Academic Management Journal, 45, 58–80.
Greenwood, R., Suddaby, R., & Hinings, C. R. (2002b). Theorizing change: The role of professional associations in the transformation of institutionalized fields. Academic Management Journal, 45, 58–80.
Haag, S., & Eckhardt, A. (2014). Organizational cloud service adoption: a scientometric and content-based literature analysis. Journal of Business Economics, 84(2), 1-34.
Hannan, M. T., & Carroll, G. R. (1992). Dynamics of organizational populations: Density, legitimation, and competition. New York: Oxford University Press.
Hannan, M. T., & Freeman, J. H. (1986). Where do organizational forms come? Sociological Forum, 1, 50-72.
Hargadon, B., & Douglas, Y. (2001). When Innovations Meet Institutions: Edison and the Design of the Electric Light. Administrative Science Quarterly, 46, 476-501.
Hargreaves, S. (2003). Conceptualising Legitimacy for New Venture Research. Paper presented at the Small Enterprise Association of Australia and New Zealand 16th Annual Conference, Ballarat.
Hoberg, P., Wollersheim, J., & Krcmar, H. (2012). The business perspective on cloud computing: a literature review of research on cloud computing. Paper presented at the 18th Americas conference on information systems, Seattle.
IBM. (2012). Exploring the role of ecosystems in evolving cloud markets (pp. pp.1-12): IBM.
Kunsemoller, J., & Karl, H. (2011). A game-theoretical approach to the benefits of cloud computing. Paper presented at the 8th international conference on Economics of Grids, Clouds, Systems, and Services.
Koehler, P., Anandasivam, A., Dan, M., & Weinhardt, C. (2010). Customer heterogeneity and tariff biases in cloud computing. Paper presented at the 31st international conference on information systems, St.Louis.
Kumar, K., & Lu, Y. H. (2010). Cloud Computing for Mobile Users: Can Offloading Computation Save Energy. Computer, 43(4), 51–56.
Leavitt, N. (2009). Is Cloud Computing Really Ready for Prime Time. Computer, 42(1), 15-20.
Leimeister, S., Riedl, C., Bohm, M., & Krcmar, H. (2010). The Business Perspective of Cloud Computing: Actors, Roles and Value Networks. Paper presented at the 18th European Conference on Information Systems (ECIS 2010), Pretoria, South Africa.
Link, B. G. (1987). Understanding labeling effects in the area of mental disorders: An assessment of the effects of expectations of rejection. American Sociological Review, 52, 96-112.
Lounsbury, M., & Crumley, E. T. (2007). New practice creation: An institutional perspective on innovation. Organational Study, 28, 993-1012.
Low, C., Chen, Y., & Wu, M. (2011). Understanding the determinants of cloud computing adoption. Industrial Management & Data Systems, 111(7), 1006-1023.
Maguire, S., Hardy, C., & Lawrence, T. B. (2004). Institutional entrepreneurship in emerging fields: HIV/AIDS treatment advocacy in Canada. . Academic Management Journal, 47, 657–679.
Martens, B., Poeppelbuss, J., & Teuteberg, F. (2011). Understanding the Cloud Computing Ecosystem: Results from a Quantitative Content Analysis. Paper presented at the 10th International Conference on Wirtschaftsinformatik, Wirtschaftinformatiks.
Mell, P., & Grance, T. (2011). The NIST Definition of Cloud Computing. . National Institute of Standards and Technology, Information Technology Laboratory, 15.
Meyer, J., & Rowan, B. (1977). Institutionalized organizations: Formal structure as myth and ceremony. American Journal of Sociology, 83, 340-363.
Microsoft. (2011). Microsoft Survey Highlights Cloud Movement Across the US: Microsoft.
Motta, G., Sfondrini, N., & Sacco, D. (2012). Cloud Computing: a Business and Economical Perspective. Paper presented at the 2012 International Joint Conference on Service Sciences.
Ou-Yang, S., & Hsu, C. (2011). The organizing Vision for Cloud Computing in Taiwan. Journal of electronic Commerce Research, 12(4), 257-271.
Powell, W. W., White, D. R., Koput, K. W., & Smith, J. O. (2005). Network dynamics and field evolution. American Journal Sociol, 110, 1132–1205.
Reay, T., Golden-Biddle, K., & GermAnn, K. (2006). Legitimizing a new role: Small wins and microprocesses of change. Academic Management Journal, 49, 977–998.
Romanelli, E. (1989). Organization birth and population variety: A community perspective on origins. (Vol. 11). Greenwich, CT JAI Press.
Saya, S., Pee, L., & Kankanhalli, A. (2010). The Impact on Instituional Influences on Perceived Technological Characteristics and Real Option in Cloud Computing Adoption. Paper presented at the International Conference of Information System.
Scott, W. R. (1995). Instituions and organizations. Thousand Oaks, CA: Sage.
Stinchcombe, A. L. (1965). Social Structure and Organizations. In J. G. March (Ed.), Handbook of Organization (pp. 142-193). Chicago: Rand McNally.
Su, N. (2011). Emergence Of Cloud Computing: an Institutional Innovation Perspective. Paper presented at the Thirty Second International Conference on Information Systems, Shanghai.
Subashini, S., & Kavitha, V. (2011). A Survey on Security Issues in Service Delivery Models of Cloud Computing. Journal of Network and Computer Applications, 34(1), 1-11.
Suchman, M. C. (1995). Managing Legitimacy: Strategic and Institutional Approaches. Academy of Management Review, 20(3), 571-610.
Sultan, N. A. (2011). Reaching for the cloud: How SMEs can manage. International Journal of Information Management, 31, 272–278.
Tai, W. C., Chu, Y. H., Chen, Y. J., Huang, J., Hsu, H. J., Hsieh, C. T., Chang, Y. C., Chang, L. M., & Ko, C. H. (2011). The Design and Implementation of Chunghwa Cloud Computing Testing Center. Telecom Research, 41(3), 477-486.
Teng, C. C., Yang, C. W., Cheng, W. L., Lin, Y. H., Liu, M., & Hsu, K. S. (2012). Chunghwa Telecom Cloud Services and Network Operation Support System. Telecom Research, 42(4), 959-972.
Turcan, R. V., & Fraser, N. M. (2012). The Emergence of an International New Software Venture from an Emerging Economy. Paper presented at the The 3rd International Conference on Software Business, Cambridge, United States.
Vaquero, L., Rodero-Merino, L., & Moran, D. (2011). Locking the Sky: A Survey on IaaS Cloud Security. Computing. Archives for Informatics and Numerical Computation, 91(1), 93.
Vieira, K., Schulter, A., & Westphall, C. (2010). Intrusion Detection for Grid and Cloud Computing. IT Professional, 12(4), 38.
Vouk, M. A. (2008). Cloud Computing – Issues, Research and Implementations. Journal of Computing and Information Technology, 16(4), 235-246.
Walker, E. T., & McCarthy, J. D. (2010). Legitimacy, Strategy, and Resources in the Survival of Community-Based Organizations. Social Problems, 57(3), 315-340.
Wang, C., Ren, K., Lou, W., & Li, J. (2010). Toward Publicly Auditable Secure Cloud Data Storage Services. IEEE Network, 24(4), 5.
Wang, Q., Wang, C., Ren, K., Lou, W., & Li, J. (2011). Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing. . Parallel and Distributed Systems, IEEE Transactions., 22(5), 847–859.
Warneke, D., & Kao, O. (2011). Exploiting Dynamic Resource Allocation for Efficient Parallel Data Processing in the Cloud. Parallel and Distributed Systems, IEEE Transactions., 22(6), 985–997.
Weinhardt, C., Anandasivam, A., Blau, B., & Stosser, J. (2009). Business Models in the Service World. IT Professional, 11(2), 28.
Wong, W. C. (2011). The trend and perspective of cloud computing in Taiwan. (Vol. 12, pp. 14-18). Taipei: MIC.
Wu, M. Y., Hsu, C. C., Hung, C. F., & Ho, Y. C. (2011). Plan and Design of CHT Cloud Computing Service Development Platform. Telecom Research, 41(3), 503-514.
Xin, M., & Levina, N. (2008). Software-as-a-service model: Elaborating client-side adoption factors. Paper presented at the The International Conference on Information Systems, ICIS., Paris, France.
Xu, B., Zhao, C., Hu, E., & Hu, B. (2011). Job Scheduling Algorithm Based on Berger Model in Cloud Environment. Advances in Engineering Software, 42(7), 419-425.
Yang, H., & Tate, M. (2012). A Descriptive Literature Review and Classification of Cloud Computing Research. Communications of the Association for Information Systems, 31, 35-60.
Yunis, M. (2010). A ‘Cloud-free’ Security Model for Cloud Computing. International Journal of Services and Standards, 5, 354.
Zhang, Q., Cheng, L., & Boutaba, R. (2010). Cloud Computing: State-of-the-art and Research Challenges. Journal of Internet Services and Applications, 1(1), 7–18.
Zimmerman, M. A., & Zeitz, G. J. (2002). Beyond Survival : Achieving New Venture Growth By Building Legitimacy. The Academy of Management Review, 27(3), 414-431.
Zissis, D., & Lekkas, D. (2010). Addressing Cloud Computing Security Issues. Future Generation Computer Systems, 28(3), 583-592.
dc.identifier.urihttp://tdr.lib.ntu.edu.tw/jspui/handle/123456789/55504-
dc.description.abstract雲端運算為資訊科技資源之創新服務提供模式,雲端運算的興起,重塑全新資訊產業價值鏈,被視為將資訊科技視作公用資源之典範轉移,影響下一波資訊產業發展方向。在台灣,雲端運算尚為新興產業,正式雲端產業採用與推廣仍未成熟,新興雲端產業有待建立市場,產業中廠商如何拓展雲端產業成為本研究擬探討之方向。另一方面,雲端運算大量需要資源池供應的特性,使電信廠商成為雲端產業拓展上的關鍵角色。
因此本研究採用新創產業合法性創造之觀點,結合合法性取得策略模型,探討中華電信在雲端產業上之開展策略。研究方法上,結合訪談資料與二手資料進行內容分析。研究結果指出欲創造新興產業,電信廠商必須取得企業內部、相同產業間、不同產業間以及最終整體政府、教育與媒體制度環境之綜合策略。本研究有助於釐清新興產業創造所需策略,可供後續研究開展新創事業之參考。
zh_TW
dc.description.abstractCloud computing, an emerging industry in Taiwan, relies heavily on information communication technology (ICT) infrastructure; thus, a telecom operator can play an important role in establishing this industry. This thesis takes an organizational legitimacy approach to understand how a Taiwanese telecom company can develop a legitimacy strategy for cloud computing services. Our preliminary data analysis indicates that an organization can adopt multiple strategies to achieve legitimacy at the organizational, intra-industrial, inter-industrial, and institutional levels. This study enhances our practical understanding of organizational strategies for forming nascent businesses.en
dc.description.provenanceMade available in DSpace on 2021-06-16T04:06:12Z (GMT). No. of bitstreams: 1
ntu-103-R01725043-1.pdf: 1259890 bytes, checksum: fc203d085c71dc58169fd92ed6772759 (MD5)
Previous issue date: 2014
en
dc.description.tableofcontents摘要 i
Abstract ii
List of Tables v
List of Figures v
Chapter 1. Introduction 1
1.1 Research Motivation and Scope 1
1.2 Research Objective 3
1.3 Structure of the Thesis 4
Chapter 2. Literature Review 5
2.1 Definition of Cloud Computing 5
2.2 Current Status of Cloud Computing Research 9
2.2.1 Major Research Topics in the Cloud Computing Domain 9
2.2.2 Major Perspectives Used in Cloud Adoption Research 12
Chapter 3. Theoretical Model 18
3.1 Institutional Theory 18
3.2 Concept of Legitimacy 22
3.3 Industry Creation 23
3.4 Legitimacy-acquiring Strategy 25
Chapter 4. Methodology 28
4.1 Data Collection 28
4.2 Data Analysis 29
4.3 Case Background 29
Chapter 5. Research Finding 33
5.1 Organizational Level 33
5.2 Intraindustrial Level 37
5.3 Interindustrial Level 43
5.4 Institutional Level 48
Chapter 6. Discussion and Implications 57
6.1 Main Strategy Taken at Different Levels 57
6.2 Industry Creation Analysis 58
6.2.1 Cognitive Organizational Legitimacy 59
6.2.2 Socialpolitical Organizational Legitimacy 60
6.2.3 Cognitive Intraindustry Legitimacy 62
6.2.4 Socialpolitical Intraindustry Legitimacy 63
6.2.5 Cognitive Interindustry Legitimacy 65
6.2.6 Socialpolitical Interindustry Legitimacy 65
6.2.7 Cognitive Institutional Legitimacy 66
6.2.8 Socialpolitical Institutional Legitimacy 67
6.3 Further Implications for Industry Creation Strategy 75
Chapter 7. Conclusion and Contribution 76
7.1 Conclusion 76
7.2 Contribution 78
7.3 Limitations and Future Research 79
References 80
dc.language.isoen
dc.title以制度理論觀點探討某電信公司雲端產業策略zh_TW
dc.titleA case study on cloud computing strategy of a telecom company in Taiwan: an organizational legitimacy perspective.en
dc.typeThesis
dc.date.schoolyear102-2
dc.description.degree碩士
dc.contributor.coadvisor許瑋元(Wei-Yuan Hsu)
dc.contributor.oralexamcommittee孔令傑(Ling-Chieh Kung)
dc.subject.keyword雲端運算,產業創造,電信廠商,制度理論,合法性,內容分析,zh_TW
dc.subject.keywordcloud computing,industry creation,telecom operator,institutional theory,legitimacy,content analysis,en
dc.relation.page84
dc.rights.note有償授權
dc.date.accepted2014-09-09
dc.contributor.author-college管理學院zh_TW
dc.contributor.author-dept資訊管理學研究所zh_TW
顯示於系所單位:資訊管理學系

文件中的檔案:
檔案 大小格式 
ntu-103-1.pdf
  目前未授權公開取用
1.23 MBAdobe PDF
顯示文件簡單紀錄


系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。

社群連結
聯絡資訊
10617臺北市大安區羅斯福路四段1號
No.1 Sec.4, Roosevelt Rd., Taipei, Taiwan, R.O.C. 106
Tel: (02)33662353
Email: ntuetds@ntu.edu.tw
意見箱
相關連結
館藏目錄
國內圖書館整合查詢 MetaCat
臺大學術典藏 NTU Scholars
臺大圖書館數位典藏館
本站聲明
© NTU Library All Rights Reserved