Responsive image
博碩士論文 etd-0110122-085318 詳細資訊
Title page for etd-0110122-085318
論文名稱
Title
資訊系統運用與企業決策管理之影響探討—以軟式印刷電路板業H科技公司為例
The influence of the adoption of Information systems on business deicision managment: the case of H technology Company in the industry of flexible printed circuit board
系所名稱
Department
畢業學年期
Year, semester
語文別
Language
學位類別
Degree
頁數
Number of pages
57
研究生
Author
指導教授
Advisor
召集委員
Convenor
口試委員
Advisory Committee
口試日期
Date of Exam
2022-01-14
繳交日期
Date of Submission
2022-02-10
關鍵字
Keywords
資訊系統滿意程度、成功運用、決策管理、競爭力、營運數據
information system satisfaction, successful application, decision management, competitiveness, operational data
統計
Statistics
本論文已被瀏覽 387 次,被下載 0
The thesis/dissertation has been browsed 387 times, has been downloaded 0 times.
中文摘要
摘 要
來到2021年資訊系統應用大幅進步,科技商品的創新越來越朝向速度與細微化發展,軟式印刷電路板無論是在電子、汽車產業已扮演不可缺少的重要零組件,台灣已成為生產軟式印刷電路板的要角之一,然而在面對全球經營環境壓力,尋找企業經營能力中的獲利方程式顯的相對重要,本研究將以台資的H科技公司探索資訊系統的建置與創新,對於企業的經營決策是否有相關性,進而研究出企業的決策能力關鍵。
本研究以『資訊安全』、『科技接受模型』(Technology Acceptance Model, TAM)為主基礎,『資訊系統成功模型』與『決策理論』為輔助,探討以資訊系統對決策管理之研究,經由文獻的探討資料收集和資料整理,採用問卷調查對研究個案管理階層透過研究資料的蒐集,總計回收有效樣本且透過SPSS彙整資料及PLS進行資料分析,用以驗證研究假說。
對H軟板科技公司的研究中,發現H軟板科技公司非常重視資訊系統應用的成功。因此投入大量資源用於強化資訊安全、資訊系統功能優化、資訊內容的可用性,規劃完整的教育訓練及宣導落實到每位員工,讓全廠員工均為資訊安全風險管控的其中一員,並建立主機與網路監控的後端平台,嚴密且不間斷的關注公司內部主機群與網路環境,且每年訂定資訊穩定率作為資訊部門重要的考核指標之一,總而言之廠內上下員工都將各種資料輸入後端資訊系統,建立各種分析及應用平台例如SAP、BI、EIP等等,落實提供相關營運數據,並且在每年的經營管理會議上,所提供的資訊讓企業經營階層可明確並有效率的制定出公司的營運方針與各項營運指標,這也是H軟板科技公司可以確保穩定的獲利及競爭力的方程式。
Abstract
Abstract
By 2021, the application of information systems has made great progress, and the innovation of scientific and technological commodities is increasingly moving towards speed and refinement. Flexible printed circuit boards have played an indispensable and important part in the electronics and automobile industries. Taiwan has become one of the key players in the production of flexible printed circuit boards. However, in the face of the pressure of the global business environment, Looking for the profit equation in the enterprise's operating ability is obviously relatively important. This study will take Taiwan funded H technology company to explore the construction and innovation of information system, whether it is relevant to the enterprise's operating decision-making, and then study the key to the enterprise's decision-making ability.
Based on "information security" and "technology acceptance model" (TAM), supplemented by "Information System Success Model" and "decision theory", this study discusses the research of information system on decision management. Through literature discussion, data collection and data sorting, a questionnaire survey is used to collect research data from the case management, Effective samples were collected and analyzed by SPSS and PLS to verify the research hypothesis.
In the research of H softboard technology company, it is found that h softboard technology company attaches great importance to the success of information system application. Therefore, a lot of resources are invested to strengthen information security, optimize the function of information system and the availability of information content, plan complete education, training and publicity, and implement them to each employee, so that all employees in the plant can be one of the members of information security risk control, establish a back-end platform for host and network monitoring, and pay close and continuous attention to the internal host group and network environment of the company, In addition, the information stability rate is set as one of the important assessment indicators of the information department every year. In a word, all employees in the plant input various data into the back-end information system, establish various analysis and application platforms, such as SAP, Bi, EIP, etc., implement the provision of relevant operation data, and at the annual operation and management meeting, The information provided allows the enterprise management to clearly and efficiently formulate the company's operating policies and various operating indicators, which is also the equation for H softboard technology company to ensure stable profitability and competitiveness.
目次 Table of Contents
目錄
論文審定書……………………………………………………………………i
感謝聲明………………………………………………………………………ii
中文摘要 ……………………………………………………………………iii
英文摘要. .……………………………………………………………………iv
目錄……………………………………………………………………………vi
圖次 …………………………………………………………………………viii
表次……………………………………………………………………………ix
第一章 緒論 .…………………………………………………………………1
1.1 研究背景 …………………………………………………………………1
1.2 研究動機及目的…………………………………………………………2
1.3 研究流程與論文架構 …………………………………………………3
第二章 文獻探討 ……………………………………………………………6
2.1 資訊安全…………………………………………………………………6
2.2 科技接受模型……………………………………………………………9
2.3 資訊系統成功模型 ……………………………………………………11
2.4 期望確認理論 …………………………………………………………12
2.5 管理決策制定層級……………………………………………………15
第三章 研究方法 …………………………………………………………17
3.1 研究架構與假說 ………………………………………………………17
3.2 研究構面的操作性定義………………………………………………21
3.3 研究設計 ………………………………………………………………22
第四章 資料分析與討論 …………………………………………………26
4.1 樣本統計分析…………………………………………………………26
4.2 問卷量表的信、效度檢驗分析. ……………………………………27
4.3 假說驗證及檢定………………………………………………………33
4.4 小結說明 ………………………………………………………………36
4.5 研究結果說明…………………………………………………………37
第五章 結論與建議 ………………………………………………………39
5.1 研究總結………………………………………………………………39
5.2 研究發現與管理意涵 ………………………………………………40
5.3 研究限制與建議. ……………………………………………………41
參考文獻 …………………………………………………………………42
一、中文文獻 ……………………………………………………42
二、英文文獻 ……………………………………………………42
附錄一:本研究問卷問題 ………………………………………………44
參考文獻 References
一、中文部分
1. 李東峰、林子銘(2002),「資訊主管企業資訊安全之風險管控決策」,資訊管理研究,第四卷,第二期,頁1-42。
2. 洪國興、趙榮耀(2003)「資訊安全管理理論之探討」,資管評論,第十二期頁17-47。
3. 鄧家駒(1998)「風險管理」,華泰文化:台北。
二、英文文獻
1. BS 7799-1(2000), “Information Security Management- Part 1:Code of Practice for Information Security Management,”British Standards Institution, London.
2. BS 7799-2(2002), “Information Security Management- Part 2:Specification for Information Security Management,”British Standards Institution, London.
3. Carter, D. L. and A. J. Katz(1996),”Computer Crime and Security: the Perceptions and Experiences of Corporate Security Directors,”Security Journal, 7,100-108
4. Fung, A. R. W., K. J. Farn, A. C. Lin(2003)”Paper: a study on the certification of the information security management system,”Computer Standards and Interfaces,25,445-465
5. ISO/IEC 17799(2000),”Information technology-Code of practice for information security management,”First edition 2000/12/1
6. Lewis, B. R. C. A. Snyder, and R. K. Rainer(1995),”An Empirical Assessment of the Information Resource Management Construct,”Journal of Management Information Systems, 12(1), 190-230.
7. Martin, B. L., G. Batchelder, J. Newcomb, J. E. Rockart, W. P. Yetter, and J. H. Grossman(1995),”The End of Delegation? Information Technology and the CEO,”Harvard Business Review, Sept-Oct.,155-175
8. Mata, J. G., W. L. Fuerst, and J. B. Barney(1995),”Information Technology and Sustained Competitive Advantage: A Resource-Based Analysis,”MIS Quarterly,19(4),480-510
9. Trilling, S. (2003),”Understanding clean pipe solutions,”Symantec Inc, Accessed form http://www.symantec.com/procomm/reviews.html.
10. von Solms, R., H. van Haar, S. H. Solms, and W. J. Caelli(1994),”A Framework for Information Security Evaluation,”Information and Management,26, 140-155
11.Oliver, R. L. (1980),”A cogenitive model for the antecedent and consequences of satisfaction,”Journal of Marketing Research,17(4), 455-475
電子全文 Fulltext
本電子全文僅授權使用者為學術研究之目的,進行個人非營利性質之檢索、閱讀、列印。請遵守中華民國著作權法之相關規定,切勿任意重製、散佈、改作、轉貼、播送,以免觸法。
論文使用權限 Thesis access permission:自定論文開放時間 user define
開放時間 Available:
校內 Campus: 已公開 available
校外 Off-campus: 已公開 available


紙本論文 Printed copies
紙本論文的公開資訊在102學年度以後相對較為完整。如果需要查詢101學年度以前的紙本論文公開資訊,請聯繫圖資處紙本論文服務櫃台。如有不便之處敬請見諒。
開放時間 available 已公開 available

QR Code