English  |  正體中文  |  简体中文  |  Post-Print筆數 : 27 |  Items with full text/Total items : 113822/144841 (79%)
Visitors : 51831160      Online Users : 553
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version
    Please use this identifier to cite or link to this item: https://nccur.lib.nccu.edu.tw/handle/140.119/48938


    Title: 使用者導向研究:從工作脈絡與客戶痛點中 設計雲端安全的創新 -以趨勢科技使用者洞見計畫為例
    Protecting the cloud: Use the work practice and pain points to find customer insight
    Authors: 劉宛婷
    Liu, Wan Ting
    Contributors: 蕭瑞麟
    Hsiao, Rueylin
    劉宛婷
    Liu, Wan Ting
    Keywords: 使用者導向設計
    產品創新
    服務創新
    雲端運算
    資訊安全
    防毒軟體
    質性研究
    行動研究
    User-centric innovation
    Product innovation
    Service innovation
    Cloud computing
    information security
    Anti-virus software
    Qualitative research
    Action research
    Date: 2009
    Issue Date: 2010-12-08 01:53:33 (UTC+8)
    Abstract: 電腦病毒的演化瞬息萬變,特別是近年來,駭客在有利可圖的動機驅使下,逐漸形成了專業分工的產銷供應鏈,讓病毒的演化速度和變種數量以指數型成長。攻擊事件數量不斷竄升,資訊安全市場理應增加不少機會,但多數防毒廠商經常對這樣的市場機會望洋興嘆,每年花費數億金額,動員研發團隊提出新產品、新版本、新服務,使用者卻始終興趣缺缺。供需兩方認知差異讓防毒軟體廠商面臨龐大開發費用的損失,也讓企業持續存在於不定時資安風險的恐懼之中。

    資安軟體公司在產品研發前,做足使用者需求蒐集流程工作,依照使用者描述所進行開發的產品,為什麼卻不是客戶需要的?本研究以質性研究法觀察國內一家電腦防毒廠商的新產品開發過程,更以為期一年的行動研究方式參與該公司使用者洞見計畫(Customer insight program),結合跨部門團隊的智慧和力量,以雲端運算的資安機會為主題進行客戶觀察和新產品構思。

    經過一年的行動研究蒐證,本研究指出使用者導向設計的迷思,並強調瞭解工作脈絡對於系統性產品創新的重要性。由於系統性產品複雜程度較高,使用處於分工較細的系統運作流程之下,往往不自覺工作特殊之處,也難以確切表達總體需求。本研究的分析方式則透過使用者工作脈絡,即以客戶的商業模式和雲端運用的特殊情境,其次定義使用者於脈絡中獨特的痛點,進而找到創新機會。

    使用者雖然是創新的來源,但是本研究發現,使用者不一定能知道自己的需求,唯有瞭解他們的工作實務,瞭解使用者在特定工作情境的痛點,才能化痛點為創新的亮點。研究貢獻上,補強現行使用者研究的三大方向,分別是使用者假設的不同、產品面設計的不同與創新來源不同。實務貢獻上,本研究提供複雜度較高的系統產品廠商在使用者導向設計流程之建議,以及企業中各部門如何透過使用者創新設計思維發揮價值所在。
    The rate of rapid evolution in computer virus results in an increase of computer crime and business attack incidents. Opportunities in the information security market began to grow and expected to exceed $125 billion USD by 2015, according to a new report by Global Industry Analysts.

    In this situation, anti-virus company tried everything they can to launch high-technology, fancy, and more powerful product every year. But they found customer is always lack of interest in their new products. This not only makes the loss on large investment in software development for anti-virus company, and also makes enterprise customers continuously at the risk of data stolen and computer virus attacks.

    By asking users what they want and trying really hard to listen to them before the development, however the product still hasn』t meet the customer needs?

    This research is based on qualitative method and action research project to investigate an anti-virus company』s product development process and customer insight programs. The one year project was cooperated with company internal cross-functional team and focused on 『Protecting the cloud』 topic. There are three cases was selected in the final.

    In order to know the user』s working context in the high-complexity information security product system. The analysis structure in three cases used four steps to find out. First of all, identify the enterprise user』s business model. Secondly, observe their local knowledge in cloud computing usage. Thirdly, clarify the organization`s unique pain points. The last but not the least, find the potential security opportunities for innovation.

    While user becomes a significant source of innovation, the study shows that users don』t necessarily know their own needs. Only to understand customer』s work practices, pain points under specific working situations, and use design thinking to make the pain points to transform into fit customer needs. The research emphasized the importance of local context in innovation theory and reinforced the inadequacy part of the lead user theory.

    Key words: User-centric innovation, Product innovation, Service innovation, Cloud computing, Anti-virus software, Qualitative research, Action research
    第壹章、緒論 6
    1.1 研究背景及動機 7
    1.2 研究目的 8
    1.3 研究架構 9
    第貳章、文獻探討 10
    2.1 使用者於創新功能來源的角色 12
    2.2 領先使用者 13
    2.2.1 領先用戶的開發動機 13
    2.2.2 創新散佈的以退為進 17
    2.2.3 製造商借力使力 20
    2.3 使用者脈絡 23
    2.4 以核心使用者工作脈絡角度詮釋使用者創新 26
    第參章、方法論 28
    3.1 研究方法 28
    3.2 個案選擇 31
    3.3 實驗個案資料分析 32
    3.4 採訪資料分析 41
    第肆章、個案研究 42
    4.1 個案背景介紹 43
    4.1.1 趨勢科技的歷史 43
    4.1.2 規模、組織與趨勢味 44
    4.1.3 研發體制:JM與PM制度 47
    4.1.4 經銷模式:代理商與經銷商 49
    4.2 趨勢科技與電腦病毒 50
    4.2.1 病毒演進:企業面臨的風險 50
    4.2.2 趨勢與病毒:產品與病毒關係時間表 52
    4.3 趨勢科技與雲端運算 58
    4.3.1 趨勢與雲端:台灣研發中心與T-CLOUD 58
    4.3.2 趨勢與雲端:雲端運算產品與技術 60
    4.4 趨勢科技與使用者創新 65
    4.4.1 使用者經驗團隊 65
    4.4.2 使用者洞見計畫(Customer Insight) 67
    第伍章、研究發現 71
    5.1 聯合報個案介紹 71
    5.1.1 公司背景與商業模式:媒體企業 71
    5.1.2 雲端應用:數位匯流 71
    5.1.3 不停線的資安議題 77
    5.1.4 結論 82
    5.2 半導體製造A公司個案介紹 82
    5.2.1 A公司背景與營運模式:半導體代工的領先者 83
    5.2.2 A公司的雲端應用:關聯規則(Association Rules) 87
    5.2.3 雲端運算下的資安議題:配方保密 90
    5.2.4 研究結論 99
    5.3 中華電信個案介紹 100
    5.3.1 中華電信背景與營運模式:中介營運新通路 100
    5.3.2 中華電信的雲端應用:CaaS 107
    5.3.3 雲端運算下的資安議題 116
    5.3.4 研究結論 120
    5.4 跨案分析 121
    5.4.1 分析客戶商業模式和雲端應用形成的工作脈絡 121
    5.4.2 內嵌於情境的使用者痛點 122
    5.4.3 解決方案 123
    第陸章、討論 125
    6.1 理論意涵 125
    6.2 實務意涵 128
    第柒章、結論 133
    Reference: 中文參考資料
    1.趨勢科技網站及歷年財報:http://tw.trendmicro.com/tw/home/ http://jp.trendmicro.com/jp/home/
    2.中華電信網站:http://www.cht.com.tw/
    3.VMWare網站:http://www.vmware.com/tw/
    4.維基百科 電腦病毒:http://zh.wikipedia.org
    5.王義智(2009),資訊安全發展趨勢與我國可能商機研究,資策會
    6.趙彰傑(2004),五十年來頭一遭!《中時》、《聯合》財務報表曝光,Taiwan News 財經文化週刊,第147期
    7.楊士仁(2005),有線有錢、無線無錢、平面不如電子:媒體財務兩樣情,盈虧涇渭分明,Taiwan News財經文化週刊,第一九五期,頁五十八
    8.習賢德(2006),《聯合報》企業文化的形成與傳承(1963-2005)下冊,秀威資訊
    9.林全洲(2004),聯合報企業再造關鍵成功因素之研究
    10.李慶芳(2009),我對質性研究的反思. 組織與管理,2(2): 21-27.
    英文參考資料
    1.Amazon.com :http://aws.amazon.com/ec2/
    2.Allen, R. C. (1983). Collective Invention. Journal of Economic Behavior and
    Organization 4, no. 1: 1–24.
    3.Ancona, D.G., D. Caldwell. 2007. Improving the Performance of New Product Teams. Research Technology Management 50(5) 37-43.
    4.Berto, F. J (1999). The birth of dirt:Origins of Mountain Biking. San Francisco, CA: Van de Plas Publications.
    5.Buenstorf,G.(2002). Deisgning clunkers: Demand-side innovation and the early history of mountain bike. In J. S. Metcalfe & U. Cantner(Eds.), Change, transformation and development: 8th International Schumpeter Society Conference, Physica.
    6.Enos, J. L. (1962). Petroleum Progress and Profits, The MIT Press.
    7.Ellen van Oost (2005), Material Gender: How Shavers Configure the Users Femininity and Masculinity. How Users Matter-The Co-Construction of Users and Technology , edited by Nelly Oudshoorn and Trevor Pinch, The MIT Press.
    8.Freeman, C.(1968). Chemical Procee Plant: Innovaion and the World Market. National Institute Economic Reivew 45:2957
    9.Franke, N., and E. von Hippel. (2003). Satisfying Heterogeneous User Needs via Innovation Toolkits: The Case of Apache Security Software. Research Policy 32, no. 7:1199–1215.
    10.Franke, N., & Shah, S. (2003). How communities support innovative activities: an exploration of assistance and sharing among end-users. Research Policy, 32, 157–178.
    11.Harhoff, D., J. Henkel, and E. von Hippel. (2003). Profiting from VoluntaryInformation Spillovers: How Users Benefit by Freely Revealing Their Innovations. Research Policy 32, no. 10: 1753–1769.
    12.Hollander, S. (1965). The Sources of Increased Efficiency. MIT Press.
    13.Howe, S. (1998) A Cultural History of Snowboarding. New York: St. Martin`s Griffin.
    14.Jensen, M. C., and W. H. Meckling. (1976). Theory of the Firm: Managerial Behavior, Agency Costs, and Ownership Structure.Journal of Financial Economics 3, no. 4:305–360.
    15.Jenkins, R. V. (1975). Technology and the market: George Eastman and the origins of mass amateur photography. Technology and Culture 16:1-19.
    16.Jeppesen, L. B., & Frederiksen, L. (2006). Why do users contribute to firm-hosted user communities? The case of computer-controlled music instruments. Organization Science, 17(1), 45-63.
    17.Knight, K. E. (1963). A Study of Technological Innovation: The Evolution of Digital Computers. PhD dissertation, Carnegie Institute of Technology.
    18.Levy, S. (1984). Hackers. Doubleday.
    19.Lilien, G. L., P. D. Morrison, K. Searls, M. Sonnack, and E. von Hippel. (2002). Performance Assessment of the Lead User Idea-Generation Process for New Product Development. Management Science 48, no. 8: 1042–1059.
    20.Lionetta, William G., Jr. (1977). Sources of Innovation Within the Pultrusion Industry.Unpublished S.M. thesis, Sloan School of Management, Massachusetts Institute of Technology, Cambridge, Mass.
    21.Lim, K. (2000). The Many Faces of Absorptive Capacity. Working paper, MIT Sloan School of Management.
    22.Lüthje, C., C. Herstatt, and E. von Hippel. (2002). The Dominant Role of Local Information in User Innovation: The Case of Mountain Biking. Working Paper, MIT Sloan School of Management.
    23.Luthje, C., C. Herstatt, E. von Hippel. (2005). User-innovators and `local` information: The case of mountain bike. Research Policy 34 ,951-965.
    24.Morrison, P. D., J. H. Roberts, and E. von Hippel. (2000). Determinants of User Innovation and Innovation Sharing in a Local Market. Management Science 46, no.12: 1513–1527.
    25.Nelly Oudshoorn and Trevor Pinch (2005), How Users Matter-The Co-Construction of Users and Technology. The MIT Press.
    26.Nick Mediati, Top 10 Internet Security Suites of 2010,PC World Magazine
    27.Nuvolari, A. (2004). 「Collective Invention during the British Industrial Revolution: The Case of the Cornish Pumping Engine.」 Cambridge Journal of Economics 28, no. 3: 347–363.
    28.Penning, C.(1998). Bike history. Bielefeld: Delius&Klasing.
    29.Punj, G., and D. W. Stewart. (1983). 「Cluster Analysis in Marketing Research: Review and Suggestions for Application.」 Journal of Marketing Research 20, May: 134–148.
    30.Rosenberg, N. (1976). Perspectives on Technology. Cambridge University Press.
    31.Shah, S. (2006) From innovation to firm formation in the windsurfing, skateboarding and snowboarding industries, Sloan School Working Paper
    32.Slaughter, S. (1993). Innovation and Learning during Implementation: A Comparison of User and Manufacturer Innovations. Research Policy 22, no. 1: 81–95.
    33.Smith, A. (1776). An Inquiry into the Nature and Causes of the Wealth of Nations. Modern Library edition. Random House, 1937.
    34.Stevens, Bethany (1998) Ultimate Snowboarding. New York: Contemporary Books.
    35.The Ecnomics (2010).April Special Report:Innovation in Emerging Markets
    36.Thomke, S. H., and E. von Hippel. (2002). Customers as Innovators: A New Way to
    Create Value. Harvard Business Review 80, no. 4: 74–81.
    37.VanderWerf, Pieter A. (1990) .Product tying and innovation in U.S. wire preparation equipment, Research Policy 19: 83-96.
    38.von Hippel, E., (1976). The Dominant Role of Users in the Scientific Instrument Innovation Process, Research Policy 5, no. 3 (July):212-39.
    39.von Hippel, E., (1977). The Dominant Role of the User in Semiconductor and Electronic Subassembly Process Innovation, IEEE Transactions on Engineering Management EM-24, no. 2 (May):60-71.
    40.von Hippel, E., and S. N. Finkelstein. (1979). Analysis of Innovation in Automated Clinical Chemistry Analyzers. Science and Public Policy 6, no. 1: 24–37.
    41.von Hippel, E.(1994)Sticky information and the locus of problem solving : Implications for innovation. Management Science, 40, 429-439.
    42.von Hippel, E. (1986). Lead users: a Source of novel product concepts. Management Science, 32(7), 791-805.
    43.von Hippel, E. (1988). The Sources of Innovation. New York, Oxford University Press.
    44.von Hippel, E. (2002) Horizontal innovation networks - by and for users.
    45.von Hippel, E., and R. Katz. (2002). Shifting Innovation to Users via Toolkits.Management Science 48, no. 7: 821–833.
    46.von Hippel, E. (2005). Democratizing Innovation: The Evolving Phenomenon of User Innovation.
    47.von Hippel, E. (2006) How user innovations become commercial products
    Description: 博士
    國立政治大學
    科技管理研究所
    97359005
    98
    Source URI: http://thesis.lib.nccu.edu.tw/record/#G0097359005
    Data Type: thesis
    Appears in Collections:[科技管理研究所] 學位論文

    Files in This Item:

    File SizeFormat
    index.html0KbHTML2583View/Open


    All items in 政大典藏 are protected by copyright, with all rights reserved.


    社群 sharing

    著作權政策宣告 Copyright Announcement
    1.本網站之數位內容為國立政治大學所收錄之機構典藏,無償提供學術研究與公眾教育等公益性使用,惟仍請適度,合理使用本網站之內容,以尊重著作權人之權益。商業上之利用,則請先取得著作權人之授權。
    The digital content of this website is part of National Chengchi University Institutional Repository. It provides free access to academic research and public education for non-commercial use. Please utilize it in a proper and reasonable manner and respect the rights of copyright owners. For commercial use, please obtain authorization from the copyright owner in advance.

    2.本網站之製作,已盡力防止侵害著作權人之權益,如仍發現本網站之數位內容有侵害著作權人權益情事者,請權利人通知本網站維護人員(nccur@nccu.edu.tw),維護人員將立即採取移除該數位著作等補救措施。
    NCCU Institutional Repository is made to protect the interests of copyright owners. If you believe that any material on the website infringes copyright, please contact our staff(nccur@nccu.edu.tw). We will remove the work from the repository and investigate your claim.
    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback