Search results

1 – 7 of 7
Per page
102050
Citations:
Loading...
Access Restricted. View access options
Article
Publication date: 4 April 2016

Tsung-Han Yang, Cheng-Yuan Ku and Man-Nung Liu

In recent years, many development projects of the medical systems encounter difficulties and eventually fail. Failure is often due to very complicated and changeable medical…

1975

Abstract

Purpose

In recent years, many development projects of the medical systems encounter difficulties and eventually fail. Failure is often due to very complicated and changeable medical procedures and the inconsistent understanding between system stakeholders, especially the healthcare providers, and information technology staff. Many research results also indicate that poor communication easily results in negative consequences during the implementation of the medical information system. To effectively overcome this obstacle, the purpose of this paper is to propose an enhanced Delphi method to assist in reaching consensus during the software development with some additional steps.

Design/methodology/approach

As an alternative to the traditional way to elicit pertinent feedback from respondents, the enhanced Delphi method stresses the systematic, flexible, and cyclic stages to construct a questionnaire with viewpoints from different types of panelists and a self-assessment procedure as a validating step to measure the improvements in the system implementation.

Findings

The better communication between the members of project team does increase the comprehensive assessment of a project.

Originality/value

Based on a practical case, the enhanced Delphi method really demonstrates good performance and effectiveness.

Details

Kybernetes, vol. 45 no. 4
Type: Research Article
ISSN: 0368-492X

Keywords

Access Restricted. View access options
Article
Publication date: 8 April 2014

Po-Ling Sun and Cheng-Yuan Ku

As the number of available services increases on the web, it becomes greatly vital in service-oriented computing to discover a trustworthy service for a service composition so as…

958

Abstract

Purpose

As the number of available services increases on the web, it becomes greatly vital in service-oriented computing to discover a trustworthy service for a service composition so as to best-fit business requirements. However, some dishonest service providers may advertise more than what they can offer and cause a great loss to users. In the last few years, trust and reputation management over web service selection mechanism becomes an emerging way of dealing with security deficiencies which are inherent in web services environment. The purpose of this paper is to review the security threats carefully and expect that the results serve as a reference guide for designing the robust trust and reputation management mechanisms.

Design/methodology/approach

Based on the published literature, the paper reviews and categorizes the most critical and important security threats that apply to trust and reputation models.

Findings

A detailed review and a dedicated taxonomy table are derived. As emphasized earlier, they could serve as the most important guideline for design of trust and reputation mechanisms.

Originality/value

The papers work contributes to: first, understand in details what kind of security threats may cause damage to trust and reputation management mechanisms for web services selection; and second, categorize these complex security threats and then assist in planning the defense mechanisms.

Details

Industrial Management & Data Systems, vol. 114 no. 3
Type: Research Article
ISSN: 0263-5577

Keywords

Access Restricted. View access options
Article
Publication date: 28 January 2014

Pei-Chen Sung, Cheng-Yuan Ku and Chien-Yuan Su

Understanding the computer-virus propagation is quite essential for the construction and development of anti-virus policy. While researches about the anti-virus policy have been…

703

Abstract

Purpose

Understanding the computer-virus propagation is quite essential for the construction and development of anti-virus policy. While researches about the anti-virus policy have been extensively investigated, the viewpoint from sociological perspective is relatively ignored. Therefore, this paper aims to explore the dynamics of computer-virus propagation and evaluate the effectiveness of anti-virus policies through the sociological perspective.

Design/methodology/approach

This research constructs a virus-propagation model based on the susceptible-exposed-infective-recovered epidemic concept to simulate and explore the dynamic behavior of multipartite computer viruses through the tool of system dynamics. The effectiveness of various anti-virus policies is then evaluated via this model.

Findings

The frequency of media contact has a significant effect on the virus infection rate. The effectiveness of user self-prevention relies on the usefulness of the virus signatures. The reporting/alarm process can enhance the capability of anti-virus software company and the detected intensity of new threat. The quarantine policy can effectively reduce the spread of computer virus.

Practical implications

Individuals should strengthen the self-awareness of information security to reduce the negative impact. Managers should construct and implement the information security norm to regulate the behavior of staff. Anti-virus software companies should strengthen the capability of their automatic reporting/alarm mechanism to early detect the exceptional conditions and control new threats in time.

Originality/value

Information security management research is still in the growth phase, but it is critically important to establish the groundwork for understanding of computer viruses and the effectiveness of anti-virus policy from assorted perspectives. The major contribution of research is to explore the propagation of multipartite computer viruses and study how to prevent their destruction from the sociological and technical perspectives.

Details

Industrial Management & Data Systems, vol. 114 no. 1
Type: Research Article
ISSN: 0263-5577

Keywords

Access Restricted. View access options
Article
Publication date: 27 May 2014

Hsin-Pin Fu, Tien-Hsiang Chang, Cheng-Yuan Ku, Tsung-Sheng Chang and Cheng-Hsin Huang

The purposes of this study were to formulate a hierarchical table of factors that influence adoption of an inter-organization system (IOS) by enterprises and to apply…

1612

Abstract

Purpose

The purposes of this study were to formulate a hierarchical table of factors that influence adoption of an inter-organization system (IOS) by enterprises and to apply multi-criteria decision-making (MCDM) tools to find the weights of these factors and to objectively identify the critical success factors (CSFs) for the adoption of IOSs by small- and medium-sized enterprises (SMEs).

Design/methodology/approach

This study first used a literature review to collect the factors that affect an enterprise’s adoption of an IOS and then constructed a three-level hierarchical table of these factors, based on a technology – organization – environment framework. Fuzzy analytic hierarchy processing was used, based on the returned questionnaires, to determine the weights of the factors. The concept of VlseKriterijumska Optimizacija I Kompromisno Resenje (VIKOR) acceptable advantage was used to objectively identify the CSFs of SMEs that have adopted an IOS.

Findings

This study identifies six CSFs of SMEs that have adopted an IOS: industry knowledge and experience, the degree of application of information technology within the industry, system safety, the organizational infrastructure, customer relationships and ease of use. In addition, four findings are proposed.

Practical implications

The work has studied, in depth, the factors that influence the adoption of an IOS by SMEs and identified four practice implications that provide a useful guideline for SMEs when they plan to adopt an IOS.

Originality/value

The identification of CSFs is also an MCDM problem. However, very few previous articles have used MCDM tools to identify the CSFs. This study adopted MCDM tools to objectively identify these CSFs and determine their appropriate weights. The results can help the managers of SMEs allocate their resources, according to the weighting of these CSFs, when they are making plans to adopt an IOS.

Details

Journal of Business & Industrial Marketing, vol. 29 no. 5
Type: Research Article
ISSN: 0885-8624

Keywords

Access Restricted. View access options
Article
Publication date: 7 September 2015

Tsung-Sheng Chang, Hsin-Pin Fu and Cheng-Yuan Ku

The purpose of this paper is to propose an implementation model for enterprise resource planning (ERP) based on resource-based view, and using the dynamic capability theory as its…

1279

Abstract

Purpose

The purpose of this paper is to propose an implementation model for enterprise resource planning (ERP) based on resource-based view, and using the dynamic capability theory as its theoretical foundation. This model includes: the establishment of the objectives of the implementation, an assessment of the available resources and the scope of the implementation, the redesign/integration and organizational learning during the process, the implementation of the system, and the measurement and evaluation of its performance.

Design/methodology/approach

An integrated circuits design company in Taiwan was used in a case study to examine the validity of the proposed model.

Findings

When the proposed ERP implementation model was applied in this study, the results show that organizational coordination, system-process redesign and integration, and organizational learning are the critical strategies for enterprises, in order to reduce the risks during the implementation of ERP projects.

Practical implications

This model can help enterprises recognize the resources needed when implementing an ERP. In addition, they need to consider the reliability of these resources, as this will increase the efficiency of the implementation, and thus the probability of success.

Originality/value

Studies of past models in the implementation of ERP have been conducted in various industries. There is a need for further studies that evaluate the different concepts in terms of the effectiveness of specific methods, in order to enhance the probability of successfully implementing a dynamic system. This paper is one of the first to explain how an enterprise can implement an ERP that is based on the theory of dynamic capabilities. The case study illustrates the important, critical success factors.

Details

Journal of Manufacturing Technology Management, vol. 26 no. 7
Type: Research Article
ISSN: 1741-038X

Keywords

Access Restricted. View access options
Article
Publication date: 1 March 2006

Sean Lancaster, David C. Yen and Cheng‐Yuan Ku

To provide an overview of E‐supply chain management (E‐SCM) initiatives, focusing on the evolution and technological drivers of moving to the web. This paper also provides a…

5086

Abstract

Purpose

To provide an overview of E‐supply chain management (E‐SCM) initiatives, focusing on the evolution and technological drivers of moving to the web. This paper also provides a framework and analysis of current efforts in the automotive, financial services, retail, technology, and transportation sectors.

Design/methodology/approach

The paper uses a qualitative experimental design, case‐study approach. Companies are compared across a variety of factors affecting E‐SCM.

Findings

There is little evidence to support that the size of a firm's revenues correlate to the effectiveness of their E‐SCM efforts.

Research limitations/implications

The research uses a limited number of companies. Additionally, the web sites were evaluated only to the extent which they were made publicly available.

Practical implications

An overview and discussion of E‐SCM is presented. This paper also analyzes selected companies' current web initiatives in the automotive, financial services, retail, technology, and transportation sectors.

Originality/value

This paper uses an original framework to analyze E‐SCM initiatives. Its conclusions would be of interest to individuals with a practical and research interest in E‐SCM.

Details

Information Management & Computer Security, vol. 14 no. 2
Type: Research Article
ISSN: 0968-5227

Keywords

Access Restricted. View access options
Article
Publication date: 1 January 1996

Peter Zhou

This paper is a study of the current trends and conditions of electronic resources for Chinese studies, based on a recent survey on the Internet of 29 Chinese libraries in North…

117

Abstract

This paper is a study of the current trends and conditions of electronic resources for Chinese studies, based on a recent survey on the Internet of 29 Chinese libraries in North America and eight Chinese libraries in China, Taiwan and Hong Kong. The survey discussed current electronic resources for Chinese studies, with a union list of major Chinese language databases currently used in libraries in Asia and the US. Current views on the use and development of electronic resources for Chinese studies were summarised.

Details

The Electronic Library, vol. 14 no. 1
Type: Research Article
ISSN: 0264-0473

1 – 7 of 7
Per page
102050