政大機構典藏-National Chengchi University Institutional Repository(NCCUR):Item 140.119/152410
English  |  正體中文  |  简体中文  |  Post-Print筆數 : 27 |  全文筆數/總筆數 : 113160/144130 (79%)
造訪人次 : 50754796      線上人數 : 503
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
搜尋範圍 查詢小技巧:
  • 您可在西文檢索詞彙前後加上"雙引號",以獲取較精準的檢索結果
  • 若欲以作者姓名搜尋,建議至進階搜尋限定作者欄位,可獲得較完整資料
  • 進階搜尋
    政大機構典藏 > 商學院 > 資訊管理學系 > 學位論文 >  Item 140.119/152410
    請使用永久網址來引用或連結此文件: https://nccur.lib.nccu.edu.tw/handle/140.119/152410


    題名: 以互補性觀點探討冷鏈無人機應用倫理
    An Investigation of Addressing Cold Chain Drone Delivery Ethical Concerns: A Complementary View
    作者: 李如芹
    Lee, Ju-Chin
    貢獻者: 杜雨儒
    Tu, Yu-Ju
    李如芹
    Lee, Ju-Chin
    關鍵詞: 無人機
    無人駕駛飛行器
    UAV
    倫理
    道德問題
    冷鏈
    疫苗
    互補性資產
    最後一哩路配送
    drone
    unmanned aerial vehicles
    UAV
    ethics
    ethical concerns
    cold chain
    vaccine
    complementary assets
    last-mile delivery
    日期: 2024
    上傳時間: 2024-08-05 12:06:47 (UTC+8)
    摘要: 利用無人機進行配送成為近年來最後一哩路配送系統的一個方案,鑑於 COVID-19 大流行導致疫苗需求大增,且最後一哩路配送被廣泛地認為是整個配送過程中最昂貴的一段,因此冷鏈最後一哩路配送系統的效率更顯重要。
    了解這一領域的倫理是必須且重要的,因為新技術的引入往往在初期容易忽略倫理考量,包括隱私、準確性、財產和可及性、安全性和正確性等概念。透過分析這些倫理問題,加上技術和非技術的互補資產,闡明進入這一行業所需的考量。
    本研究採用系統性的文獻回顧法,檢索多個商業及科技資料庫後篩選出與本文研究相關之論文進行探討。以道德六大框架為基礎進行整理,旨在降低產業的道德風險並推廣產業發展。
    In light of the heightened demand for vaccines due to the COVID-19 pandemic in 2020, the necessity for an efficient cold chain last-mile delivery system has become increasingly apparent. This is especially crucial since last-mile delivery is widely recognized as the most expensive segment of the overall delivery process. Consequently, the use of drones for this purpose has emerged as a popular solution in recent years.
    However, it’s crucial to recognize the significance of ethics in this field, as the introduction of new technology often leads to oversight or neglect of ethical considerations, including Privacy, Accuracy, Property, and Accessibility (PAPA), Safety, and Justice. Addressing these ethical concerns forms the primary motivation for implementing this study. We utilize these ethical concerns, along with technical and non-technical complementary assets, to clarify the considerations necessary for entering this industry.
    參考文獻: Abbasi, M. A., Memon, Z. A., Syed, T. Q., Memon, J., & Alshboul, R. (2017).
    Addressing the future data management challenges in iot: A proposed framework.
    International Journal of Advanced Computer Science and Applications, 8(5).
    Ahn, T., Seok, J., Lee, I., & Han, J. (2018). Reliable flying iot networks for uav disaster rescue operations. Mobile Information Systems, 2018.
    Akram, R. N., Markantonakis, K., Mayes, K., Habachi, O., Sauveron, D., Steyven, A., & Chaumette, S. (2017). Security, privacy and safety evaluation of dynamic and
    static fleets of drones. 2017 IEEE/AIAA 36th Digital Avionics Systems Conference (DASC), 1–12.
    Ashok, A., Brison, M., & LeTallec, Y. (2017). Improving cold chain systems: Challenges and solutions. Vaccine, 35(1ㄗㄠ7), 2217–2223.
    Atlam, H., Alenezi, A., Walters, R., Wills, G., et al. (2017). An overview of risk estimation techniques in risk-based access control for the internet of things.
    Atlam, H. F., Alassafi, M. O., Alenezi, A., Walters, R. J., & Wills, G. B. (2018). Xacml for building access control policies in internet of things. IoTBDS, 253–260.
    Atlam, H. F., Alenezi, A., Alassafi, M. O., & Wills, G. (2018). Blockchain with internet of things: Benefits, challenges, and future directions. International Journal of
    Intelligent Systems and Applications, 10(6), 40–48.
    Atlam, H. F., Walters, R. J., & Wills, G. B. (2018). Internet of nano things: Security issues and applications. Proceedings of the 2018 2nd international conference on cloud and big data computing, 71–77.

    Atlam, H. F., & Wills, G. B. (2020). Iot security, privacy, safety and ethics. Digital twin technologies and smart cities, 123–149.
    Ayamga, M., Akaba, S., & Nyaaba, A. A. (2021). Multifaceted applicability of drones: A review. Technological Forecasting and Social Change, 167, 120677.
    Balaji, S., Nathani, K., & Santhakumar, R. (2019). Iot technology, applications and challenges: A contemporary survey. Wireless personal communications, 108, 363–388.
    Baldini, G., Botterman, M., Neisse, R., & Tallacchini, M. (2018). Ethical design in the internet of things. Science and engineering ethics, 24, 905–925.
    Bhatt, K., Pourmand, A., & Sikka, N. (2018). Targeted applications of unmanned aerial vehicles (drones) in telemedicine. Telemedicine and e-Health, 24(11), 833–838.
    Boss, S. R., Galletta, D. F., Lowry, P. B., Moody, G. D., & Polak, P. (2015). What do systems users have to fear? using fear appeals to engender threats and fear that motivate protective security behaviors. MIS quarterly, 39(4), 837–864.
    Chatterjee, S., & Sarker, S. (2013). Infusing ethical considerations in knowledge
    management scholarship: Toward a research agenda. Journal of the Association for Information Systems, 14(8), 1.
    Chatterjee, S., Sarker, S., & Valacich, J. S. (2015). The behavioral roots of information systems security: Exploring key factors related to unethical it use. Journal of Management Information Systems, 31(4), 49–87.
    Chen, P.-z. (2023). An investigation of iot ethical concerns, 5–12.
    Christmann, P. (2000). Effects of “best practices”of environmental management on cost advantage: The role of complementary assets. Academy of Management
    journal, 43(4), 663–680.

    Chung, S. H., Sah, B., & Lee, J. (2020). Optimization for drone and drone-truck combined operations: A review of the state of the art and future directions. Computers & Operations Research, 123, 105004.
    Colombo, M. G., Grilli, L., & Piva, E. (2006). In search of complementary assets: The determinants of alliance formation of high-tech start-ups. Research policy, 35(8), 1166–1199.
    Comes, T., Bergtora Sandvik, K., & Van de Walle, B. (2018). Cold chains, interrupted: The use of technology and information for decisions that keep humanitarian vaccines cool. Journal of Humanitarian Logistics and Supply Chain
    Management, 8(1), 49–69.
    De Boeck, K., Decouttere, C., & Vandaele, N. (2020). Vaccine distribution chains in low-and middle-income countries: A literature review. Omega, 97, 102097.
    Elkhodr, M., Shahrestani, S., & Cheung, H. (2016). The internet of things: New interoperability, management and security challenges. arXiv preprint arXiv:1604.04824.
    Esper, T. L., Jensen, T. D., Turnipseed, F. L., & Burton, S. (2003). The last mile: An examination of effects of online retail delivery strategies on consumers. Journal of Business logistics, 24(2), 177–203.
    European Sting. (2023). How drones are transforming access to healthcare in india [Accessed on October 15, 2023]. https://europeansting.com/2023/09/04/how- drones-are-transforming-access-to-healthcare-in-india/
    Federal Aviation Administration. (2021). Integration pilot program - faa unmanned aircraft systems.
    Fortune Business Insights. (2022). Commercial drone market [Report ID: FBI102171].

    Gal, U., Hansen, S., & Lee, A. S. (2022). Research perspectives: Toward theoretical rigor in ethical analysis: The case of algorithmic decision-making systems. Journal of the Association for Information Systems, 23(6), 1634–1661.
    Golubovic, N., Wolski, R., Krintz, C., & Mock, M. (2019). Improving the accuracy of outdoor temperature prediction by iot devices. 2019 IEEE International Congress on Internet of Things (ICIOT), 117–124.
    Gürkaynak, G., Yılmaz, I., Yeşilaltay, B., & Bengi, B. (2018). Intellectual property law and practice in the blockchain realm. Computer law & security review, 34(4), 847–862.
    Haidari, L. A., Brown, S. T., Ferguson, M., Bancroft, E., Spiker, M., Wilcox, A.,
    Ambikapathi, R., Sampath, V., Connor, D. L., & Lee, B. Y. (2016). The
    economic and operational value of using drones to transport vaccines. Vaccine, 34(34), 4062–4067.
    Hughes, A., & Morton, M. S. S. (2006). The transforming power of complementary assets. MIT Sloan Management Review.
    Hui, K.-L., Kim, S. H., & Wang, Q.-H. (2017). Cybercrime deterrence and international legislation. Mis Quarterly, 41(2), 497–524.
    InsightAce Analytic. (2023). Global vaccine cold chain logistics market [Accessed: 2023-12-03].
    Knopf, J. W. (2006). Doing a literature review. PS: Political Science & Politics, 39(1), 127–132.
    Lagkas, T., Argyriou, V., Bibi, S., & Sarigiannidis, P. (2018). Uav iot framework views and challenges: Towards protecting drones as “things”. Sensors, 18(11), 4015.
    Lai, X., Yang, T., Wang, Z., & Chen, P. (2019). Iot implementation of kalman filter to
    improve accuracy of air quality monitoring and prediction. Applied Sciences, 9(9), 1831.

    Lin, H., & Bergmann, N. W. (2016). Iot privacy and security challenges for smart home environments. Information, 7(3), 44.
    Lin, J., Long, W., Zhang, A., & Chai, Y. (2020). Blockchain and iot-based architecture design for intellectual property protection. International Journal of Crowd
    Science, 4(3), 283–293.
    Mason, R. O. (1986). Four ethical issues of the information age. MIS quarterly, 5–12.
    Mingers, J., & Walsham, G. (2010). Toward ethical information systems: The contribution of discourse ethics. MIS quarterly, 833–854.
    Moher, D., Liberati, A., Tetzlaff, J., & Altman, D. (2009). Group p (2009) preferred reporting items for systematic reviews and meta-analyses: The prisma statement. bmj 339: B2535.
    Mohsan, S. A. H., Zahra, Q. u. A., Khan, M. A., Alsharif, M. H., Elhaty, I. A., & Jahid, A. (2022). Role of drone technology helping in alleviating the covid-19 pandemic. Micromachines, 13(10), 1593.
    Popescul, D., & Georgescu, M. (2014). Internet of things–some ethical issues. The USV Annals of Economics and Public Administration, 13(2 (18)), 208–214.
    Ranieri, L., Digiesi, S., Silvestri, B., & Roccotelli, M. (2018). A review of last mile logistics innovations in an externalities cost reduction vision. Sustainability, 10(3), 782.
    Rother, E. T. (2007). Systematic literature review x narrative review. Acta paulista de enfermagem, 20, v–vi.
    Sarkis-Onofre, R., Catalá-López, F., Aromataris, E., & Lockwood, C. (2021). How to properly use the prisma statement. Systematic Reviews, 10(1), 1–3.
    Shafique, K., Khawaja, B. A., Sabir, F., Qazi, S., & Mustaqim, M. (2020). Internet of things (iot) for next-generation smart systems: A review of current challenges,

    future trends and prospects for emerging 5g-iot scenarios. Ieee Access, 8, 23022–23040.
    Sham, R., Siau, C. S., Tan, S., Kiu, D. C., Sabhi, H., Thew, H. Z., Selvachandran, G., Quek, S. G., Ahmad, N., & Ramli, M. H. M. (2022). Drone usage for medicine and vaccine delivery during the covid-19 pandemic: Attitude of health care workers in rural medical centres. Drones, 6(5), 109.
    Slabinac, M. (2015). Innovative solutions for a “last-mile”delivery–a european
    experience. Business Logistics in Modern Management.
    Snyder, H. (2019). Literature review as a research methodology: An overview and guidelines. Journal of business research, 104, 333–339.
    Tawalbeh, L., Muheidat, F., Tawalbeh, M., & Quwaider, M. (2020). Iot privacy and security: Challenges and solutions. Applied Sciences, 10(12), 4102.
    Teece, D. J. (1986). Profiting from technological innovation: Implications for integration, collaboration, licensing and public policy. Research policy, 15(6), 285–305.
    Teece, D. J. (1988). Capturing value from technological innovation: Integration, strategic partnering, and licensing decisions. Interfaces, 18(3), 46–61.
    The Verge. (2021, March 9). Drone delivery helps maintain vaccine cold chain in ghana [Accessed on October 15, 2023]. https://www.theverge.com/2021/3/9/22320965/drone-delivery-vaccine-ghana- zipline-cold-chain-storage
    Ukil, A., Bandyopadhyay, S., & Pal, A. (2014). Iot-privacy: To be private or not to be private. 2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), 123–124.
    Wang, N. (2021). “as it is africa, it is ok”? ethical considerations of development use
    of drones for delivery in malawi. IEEE Transactions on Technology and Society, 2(1), 20–30.

    Williams, B. A., Jones, C. H., Welch, V., & True, J. M. (2023). Outlook of pandemic preparedness in a post-covid-19 world. npj Vaccines, 8(1), 178.
    Xiao, Y., & Watson, M. (2019). Guidance on conducting a systematic literature review.
    Journal of planning education and research, 39(1), 93–112.
    Ziegeldorf, J. H., Morchon, O. G., & Wehrle, K. (2014). Privacy in the internet of things: Threats and challenges. Security and Communication Networks, 7(12), 2728–2742.
    描述: 碩士
    國立政治大學
    資訊管理學系
    111356019
    資料來源: http://thesis.lib.nccu.edu.tw/record/#G0111356019
    資料類型: thesis
    顯示於類別:[資訊管理學系] 學位論文

    文件中的檔案:

    檔案 描述 大小格式瀏覽次數
    601901.pdf1149KbAdobe PDF0檢視/開啟


    在政大典藏中所有的資料項目都受到原著作權保護.


    社群 sharing

    著作權政策宣告 Copyright Announcement
    1.本網站之數位內容為國立政治大學所收錄之機構典藏,無償提供學術研究與公眾教育等公益性使用,惟仍請適度,合理使用本網站之內容,以尊重著作權人之權益。商業上之利用,則請先取得著作權人之授權。
    The digital content of this website is part of National Chengchi University Institutional Repository. It provides free access to academic research and public education for non-commercial use. Please utilize it in a proper and reasonable manner and respect the rights of copyright owners. For commercial use, please obtain authorization from the copyright owner in advance.

    2.本網站之製作,已盡力防止侵害著作權人之權益,如仍發現本網站之數位內容有侵害著作權人權益情事者,請權利人通知本網站維護人員(nccur@nccu.edu.tw),維護人員將立即採取移除該數位著作等補救措施。
    NCCU Institutional Repository is made to protect the interests of copyright owners. If you believe that any material on the website infringes copyright, please contact our staff(nccur@nccu.edu.tw). We will remove the work from the repository and investigate your claim.
    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - 回饋