English  |  正體中文  |  简体中文  |  Post-Print筆數 : 27 |  Items with full text/Total items : 113656/144643 (79%)
Visitors : 51731706      Online Users : 580
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version
    政大機構典藏 > 商學院 > 資訊管理學系 > 學位論文 >  Item 140.119/35264
    Please use this identifier to cite or link to this item: https://nccur.lib.nccu.edu.tw/handle/140.119/35264


    Title: 使用ActiveX元件來改善暨有視窗主從企業資訊系統的可部署性
    Improving the Deployability of Existing Windows-Based Client/Server Business Information Systems Using ActiveX Components
    Authors: 程裕繁
    Cheng,Bill Yu-Fan
    Contributors: 裘錦天
    Chyou,Jonathan Jiin-Tian
    程裕繁
    Cheng,Bill Yu-Fan
    Keywords: ActiveX元件
    遺產資訊系統
    資訊系統現代化
    資訊系統部署
    資訊系統架構轉換
    ActiveX Component
    Legacy Information System
    Information System Modernization
    Information System Deployment
    Information System Architecture Transformation
    Date: 2006
    Issue Date: 2009-09-18 14:35:11 (UTC+8)
    Abstract: 小型化革命已經造成了企業資訊系統的典範轉移,不久之前以大型主機為基礎的集中架構仍然是企業之重要資訊系統的唯一選擇,時至今日為數眾多的重要企業資訊系統採用了以個人運算裝置為基礎的主從架構。另外一方面,視窗主從企業資訊系統是目前最常見的主從架構企業資訊系統類型,此類企業資訊系統必需將每一支客戶端程式都安裝到每一位使用者的電腦上,這種客戶端程式的人工部署作業一直是資訊管理從業人員的沈重負擔,亦是資訊管理產學界持續戮力解決的重要研究課題。其實ActiveX元件技術的妥善應用將可以有效解決這個部署問題,並且這種解決方案將遠比其它解決方案更具成本效益。研究以此發現為基礎,目的在於克服ActiveX元件技術在企業資訊系統應用上一直無法解決的三項缺點:能力強大所衍生的不安全、技術龐雜所衍生的學習與使用困難,以及元件體積龐大所衍生的網路應用瓶頸,並提出一個以ActiveX元件為基礎的解決方案來自動化暨有之視窗主從企業資訊系統的客戶端程式部署作業。報告的重點內容有四:(一)ActiveX元件技術的缺點克服之道;(二) 所提解決方案的第一個部份,也就是下載架構,採用下載架構開發的企業資訊系統將具備自動化部署客戶端程式的特性;(三)所提解決方案的第二個部份,也就是架構轉換程序,藉由這個程序的指引,暨有的視窗主從企業資訊系統將可以輕鬆轉換成為下載架構,有效解決其客戶端程式的部署問題;(四)兩個研究個案,用來示範下載架構與架構轉換程序的使用,並提供證據來支持下載架構與架構轉換程序的可行性。
    The downsizing revolution has created a deep paradigmatic shift in business information systems (BISs). Not very long ago, large-scale mission-critical BISs were the exclusive province of massive mainframe computers. That is changing rapidly. Today, increasingly large and complex BISs are being built as client/server (C/S) applications. Unfortunately, for the most common C/S BISs, that is, the Windows-based C/S BISs (WinBISs), client programs must be manually deployed to each end-user machine bringing about a heavy BIS maintenance load. ActiveX component technology, if used properly, is more cost-effective than other alternatives in improving the deployment of existing WinBISs. Nevertheless, ActiveX component technology is no magic solution, and thus still has three shortcomings, namely insecurity, complexity, and bulkiness. The purpose of the study presented in this paper is to overcome the shortcomings of ActiveX component technology, and then develop an ActiveX component-based solution to automate the deployment of existing WinBISs. This paper has four main parts: (a) the answers to the shortcomings of ActiveX component technology; (b) the downloadable architecture, which supports the development of automatically-deployed BISs; (c) the architecture transformation process, which transforms existing WinBISs into the downloadable architecture; and (d) two examples of how to use the downloadable architecture and the architecture transformation process. The examples also provide evidence to support the feasibility of such architecture and process.
    Reference: 1.Babiker, E., Simmons, D., Shannon, R., & Ellis, N. (1997). A Model for Reengineering Legacy Expert Systems to Object-Oriented Architecture. Expert Systems With Applications, 12(3), 363-371.
    2.Bailey, K.D. (2005). Typologies and Taxonomies: An Introduction to Classification Techniques. Thousand Oaks, CA: Sage.
    3.Barron, T.M., Chiang, R.H.L., & Storey, V.C. (1999). A Semiotics Framework for Information Systems Classification and Development. Decision Support Systems, 25(1), 1-17.
    4.Bennett, K.H., & Rajlich, V.T. (2000). Software Maintenance and Evolution: A Roadmap. Proceedings of the Conference on the Future of Software Engineering, Limerick, Ireland, 73-87.
    5.Bodhuin, T., Guardaboscio, E., & Tortorella, M. (2002). Migrating COBOL Systems to the Web by Using the MVC Design Pattern. Proceedings of the 9th Working Conference on Reverse Engineering, Richmod, VA, 329-338.
    6.Borland (2005). Borland Developer Studio 2006 Online Help. Scotts Valley, CA: Borland.
    7.Carzaniga, A., Fuggetta, A., Hall, R.S., Heimbigner, D., van der Hoek, A., & Wolf, A.L. (1998). A Characterization Framework for Software Deployment Technologies (Tech. Rep. No. CU-CS-857-98). Boulder, CO: University of Colorado, Department of Computer Science.
    8.Chappell, D. (1996). Understanding ActiveX and OLE. Redmond, WA: Microsoft.
    9.Cheng, B.Y.F., Chyou, J.J.T., & Liu, J.J. (2007). Un-match: Object-Oriented Software Design Method and Visual Programming. International Journal of Soft Computing, 2(1), 199-207.
    10.Chyou, J.J.T., & Cheng, B.Y.F. (2006). Improving the Deployability of Existing Windows-Based Client/Server Business Information Systems Using ActiveX. Lecture Notes in Computer Science, 4317, 249-263.
    11.Coupaye, T., & Estublier, J. (2000). Foundations of Enterprise Software Deployment. Proceedings of the European Conference on Software Maintenance and Reengineering 2000, Zurich, Switzerland, 65-73.
    12.David, G., & Shaw, M. (1993). An Introduction to Software Architecture. Advances in Software Engineering and Knowledge Engineering, Vol. I. River Edge, NJ: World Scientific.
    13.Dershem, H.L., & Jipping, M.J. (1995). Programming Languages: Structures and Models. Boston: PWS.
    14.Dolstra, E., Visser, E., & de Jonge, M. (2004). Imposing a Memory Management Discipline on Software Deployment. Proceedings of the 26th International Conference on Software Engineering, Scotland, UK, 583-592.
    15.Edwards, A.D.N. (1988). Visual Programming Languages: The Next Generation. ACM SIGPLAN Notice, 23(4), 43-50.
    16.Gray, D.N., Hotchkiss, J., LaForge, S., Shalit, A., & Weinberg, T. (1998). Modern Languages and Microsoft`s Component Object Model. Communications of the ACM, 41(5), 55-65.
    17.Hall, R.S., Heimbigner, D., & Wolf, A.L. (1999). A Cooperative Approach to Support Software Deployment Using the Software Dock. Proceedings of the 21th International Conference on Software Engineering, Los Angeles, 174-183.
    18.Hanna, M. (1993). Maintenance Burden Begging for Remedy. Datamation, 53-63.
    19.Hassan, A.E., & Holt, R.C. (2005). A Lightweight Approach for Migrating Web Frameworks. Information and Software Technology, 47(8), 521-532.
    20.Hnetynka, P. (2005). A Model-Driven Environment for Component Deployment. Proceedings of the 3rd ACIS International Conference on Software Engineering Research, Management and Applications, Mount Pleasant, Michigan, 6-13.
    21.Hopwood, D. (1997). A Comparison Between Java and ActiveX Security. Network Security, 12, 15-20.
    22.Hoque, R., & Sharma, T. (1998). Programming Web Components. New York: McGraw-Hill.
    23.Inderscience (2007). International Journal of Business Information Systems Leaflet. https://www.inderscience.com/www/IJBIS_leaflet.pdf.
    24.Jansen, S., Ballintijn, G., & Brinkkemper, S. (2005). A Process Model and Typology for Software Product Updaters. Proceedings of the 9th European Conference on Software Maintenance and Reengineering, Manchester, UK, 265-274.
    25.Joiner, J.K., & Tsai, W.T. (1998). Re-Engineering Legacy COBOL Programs. Communications of the ACM, 41(5), 185-197.
    26.Kazman, R., & Carriere, S.J. (1999). Playing Detective: Reconstructing Software Architecture from Available Evidence. Journal of Automated Software Engineering, 6(2), 107-138.
    27.Klusener, A.S., Lammel, R., & Verhoef, C. (2005). Architectural Modifications to Deployed Software. Science of Computer Programming, 54(2-3), 143-211.
    28.Krikhaar, R., Postma, A., Sellink, A., Stroucken, M., & Verhoef, C. (1999). A Two-Phase Process for Software Architecture Improvement. Proceedings of the International Conference on Software Maintenance 1999, Oxford, UK, 371-380.
    29.Kristol, D.M. (2001). HTTP Cookies: Standards, Privacy, and Politics. ACM Transactions on Internet Technology, 1(2), 151-198.
    30.Larson, K.D., Wild, J.J., & Chiappetta, B. (2005). Principles of Financial Accounting. New York: McGraw-Hill.
    31.Laudon, K.C., & Laudon, J.P. (2005). Management Information Systems: Managing the Digital Firm. Upper Saddle River, NJ: Prentice-Hall.
    32.Lee, H., & Yoo, C. (2000). A Form Driven Object-Oriented Reverse Engineering Methodology. Information Systems, 25(3), 235-259.
    33.Lientz, B.P., & Swanson, E.B. (1980). Software Maintenance Management. Boston: Addison-Wesley.
    34.Martin, E.W., Brown, C.V., DeHayes, D.W., Hoffer, J.A., & Perkins, W.C. (2004). Managing Information Technology. Upper Saddle River, NJ: Prentice-Hall.
    35.Martin, J. (1990). Information Engineering, Book III: Design and Construction. Upper Saddle River, NJ: Prentice-Hall.
    36.McNurlin, B.C., & Sprague, R.H. (2005). Information Systems Management in Practice. Upper Saddle River, NJ: Prentice-Hall.
    37.Microsoft (1998). Microsoft Visual Basic 6.0 Online Help. Redmond, WA: Microsoft.
    38.Microsoft (2007a). Activating ActiveX Controls. http://msdn.microsoft.com/library/default.asp?url=/workshop/author/dhtml/overview/activating_activex.asp.
    39.Microsoft (2007b). ActiveX Controls. http://msdn.microsoft.com/library/default.asp?url=/workshop/components/activex/activex_node_entry.asp.
    40.Microsoft (2007c). COM: Component Object Model Technologies. http://www.microsoft.com/com/default.mspx.
    41.Mosley, D.C., Pietri, P.H., & Megginson, L.C. (1997). Management: Leadership in Action. Upper Saddle River, NJ: Prentice-Hall.
    42.OMG (2001). CORBA/TC Interworking and SCCP Inter-ORB Protocol Specification. http://www.omg.org/docs/formal/01-01-01.pdf.
    43.Oreizy, P., & Kaiser, G. (1997). The Web as Enabling Technology for Software Development and Distribution. IEEE Internet Computing, 1(6), 84-87.
    44.Orfali, R., Harkey, D., & Edwards, J. (1999). Client/Server Survival Guide. Hoboken, NJ: Wiley.
    45.Seacord, R.C., Plakosh, D., & Lewis, G.A. (2003). Modernizing Legacy Systems: Software Technologies, Engineering Processes, and Business Practices. Boston: Addison-Wesley.
    46.Sebesta, R.W. (2007). Concepts of Programming Languages. Boston: Addison-Wesley.
    47.Serrano, M.A., Carver, D.L., & Montes de Oca, C. (2002). Reengineering Legacy Systems for Distributed Environments. Journal of Systems and Software, 64(1), 37-55.
    48.Shaw, M., DeLine, R., Klein, D.V., Ross, T.L., Young, D.M., & Zelesnik, G. (1995). Abstractions for Software Architecture and Tools to Support Them. IEEE Transactions on Software Engineering, 21(4), 314-335.
    49.Silberschatz, A., Galvin, P.B., & Gagne, G. (2004). Operating System Concepts. Hoboken, NJ: Wiley.
    50.SyBase (2004). SyBase PowerBuilder 9.0 Online Help. Dublin, CA: SyBase.
    51.Swanson, E.B., & Beath, C.M. (1989). Reconstructing the Systems Development Organization. MIS Quarterly, 13(3), 293-307.
    52.Taconet, C., Putrycz, E., & Bernard, G. (2003). Context Aware Deployment for Mobile Users. Proceedings of the 27th Annual International Computer Software and Applications Conference, Hong Kong, China, 74-81.
    53.Tahvildari, L., Kontogiannis, K., & Mylopoulos, J. (2003). Quality-Driven Software Reengineering. Journal of Systems and Software, 66(3), 225-239.
    54.Turban, E., Mclean, I., & Whtherbe, J. (1996). Information Technology for Management: Improving Quality and Productivity. Hoboken, NJ: Wiley.
    55.Ulrich, W.M. (2002). Legacy Systems: Transformation Strategies. Upper Saddle River, NJ: Prentice-Hall.
    56.van der Hoek, A., & Wolf, A.L. (2003). Software Release Management for Component-Based Software. Software: Practice and Experience, 33(1), 77-98.
    57.Vessey, I., Ramesh, V., & Glass, R.L. (2005). A Unified Classification System for Research in the Computing Disciplines. Information and Software Technology, 47(4), 245-255.
    58.Wang, P.S., & Katila, S. (2003). An Introduction to Web Design and Programming. Boston: Course Technology.
    59.Wheaton, G.R. (1968). Development of a Taxonomy of Human Performance: A Review of Classificatory Systems Relating to Tasks and Performance (Tech. Rep. No. 726-12/68-TR-1). Washington, DC: American Institute for Research.
    60.Woods, S., Carriere, S.J., & Kazman, R. (1999). A Semantic Foundation for Architectural Reengineering and Interchange. Proceedings of the International Conference on Software Maintenance 1999, Oxford, UK, 391-398.
    Description: 博士
    國立政治大學
    資訊管理研究所
    91356506
    95
    Source URI: http://thesis.lib.nccu.edu.tw/record/#G0913565061
    Data Type: thesis
    Appears in Collections:[資訊管理學系] 學位論文

    Files in This Item:

    File Description SizeFormat
    56506101.pdf40KbAdobe PDF2702View/Open
    56506102.pdf60KbAdobe PDF2989View/Open
    56506103.pdf72KbAdobe PDF2763View/Open
    56506104.pdf17KbAdobe PDF2702View/Open
    56506105.pdf18KbAdobe PDF2694View/Open
    56506106.pdf66KbAdobe PDF22345View/Open
    56506107.pdf57KbAdobe PDF2719View/Open
    56506108.pdf18KbAdobe PDF2859View/Open
    56506109.pdf12KbAdobe PDF2675View/Open
    56506110.pdf242KbAdobe PDF2873View/Open
    56506111.pdf238KbAdobe PDF2956View/Open
    56506112.pdf853KbAdobe PDF2953View/Open
    56506113.pdf630KbAdobe PDF21194View/Open
    56506114.pdf14KbAdobe PDF2744View/Open
    56506115.pdf27KbAdobe PDF21011View/Open


    All items in 政大典藏 are protected by copyright, with all rights reserved.


    社群 sharing

    著作權政策宣告 Copyright Announcement
    1.本網站之數位內容為國立政治大學所收錄之機構典藏,無償提供學術研究與公眾教育等公益性使用,惟仍請適度,合理使用本網站之內容,以尊重著作權人之權益。商業上之利用,則請先取得著作權人之授權。
    The digital content of this website is part of National Chengchi University Institutional Repository. It provides free access to academic research and public education for non-commercial use. Please utilize it in a proper and reasonable manner and respect the rights of copyright owners. For commercial use, please obtain authorization from the copyright owner in advance.

    2.本網站之製作,已盡力防止侵害著作權人之權益,如仍發現本網站之數位內容有侵害著作權人權益情事者,請權利人通知本網站維護人員(nccur@nccu.edu.tw),維護人員將立即採取移除該數位著作等補救措施。
    NCCU Institutional Repository is made to protect the interests of copyright owners. If you believe that any material on the website infringes copyright, please contact our staff(nccur@nccu.edu.tw). We will remove the work from the repository and investigate your claim.
    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback