首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
张育玮  邢雯  徐茜  关记兴 《科研管理》2019,40(11):175-184
随着云计算的不断发展,云企业信息系统(EIS)显示出其优势,愈来愈多企业愿意考虑从传统EIS转换到云EIS系统。然而,却很少研究探讨企业在EIS的转换议题,本研究整合信息系统成功模型和技术接受模型,发展一个多理论框架去探索企业向云ERP转换的意愿。我们从企业管理者收集了199份调查问卷,通过结构方程模型验证本研究模型与假设,结果发现有用性和易用性是影响转换意愿重要因素,易用性、信息质量和系统质量则正向影响认知有用性,这些结论,给未来转换意愿研究提供了参考,我们建议云服务供应商应重视系统本身的易用性和有用性,提高系统质量并关注信息质量,以帮助他们提供企业需求的产品,吸引更多企业从传统EIS转换到云EIS。  相似文献   

2.
张育玮  邢雯  徐茜  关记兴 《科研管理》2006,40(11):175-184
随着云计算的不断发展,云企业信息系统(EIS)显示出其优势,愈来愈多企业愿意考虑从传统EIS转换到云EIS系统。然而,却很少研究探讨企业在EIS的转换议题,本研究整合信息系统成功模型和技术接受模型,发展一个多理论框架去探索企业向云ERP转换的意愿。我们从企业管理者收集了199份调查问卷,通过结构方程模型验证本研究模型与假设,结果发现有用性和易用性是影响转换意愿重要因素,易用性、信息质量和系统质量则正向影响认知有用性,这些结论,给未来转换意愿研究提供了参考,我们建议云服务供应商应重视系统本身的易用性和有用性,提高系统质量并关注信息质量,以帮助他们提供企业需求的产品,吸引更多企业从传统EIS转换到云EIS。  相似文献   

3.
The purpose of this research article is to identify the critical success criteria/factors that affect the cloud computing adoption and examine structure, reliability and validity of the criteria in the SMEs industry. This study considers nine types of criteria/factors with fifty-one sub-criteria, which have somewhat previously been used, and creates a ranking model that offers decision makers to measure the prior implementation of cloud computing adoption. A questionnaire-based survey research was used to collect data from 110 firms belonging to the SMEs industry in India. In this paper, the data collected was analysed by an integrated approach. Firstly, an Analytic Hierarchy Process approach was applied to find the significant fact of each criterion as the assessable indices of the cloud computing adoption. Secondly, an Exploratory Factor Analysis and Confirmatory Factor Analysis were used to examine structure, reliability and validity of the criteria. The data was tabulated in a Microsoft Excel sheet and then imported in SPSS (Statistical Package for the Social Sciences version 20) for analysis. The findings discovered that ‘Security and Privacy’, ‘Organizational Risk’, ‘Sharing and Collaboration’, ‘Confidentiality’, and ‘Integrity’ have a major effect on the adoption of cloud computing. The research was conducted in the SMEs industry in India, which may limit the generalizability of the findings. The findings and recommendations offer cloud computing service providers as well as users with a better understanding of what affects the cloud computing adoption feature, with a relevant understanding of the current scenario. The research aided in the application of the new technology of cloud computing adoption in the SMEs industry in India through the use of a wide range of criteria. The findings also help organizations study their information technology investments when applying cloud computing.  相似文献   

4.
The mechanism of business analytics affordances enhancing the management of cloud computing data security is a key antecedent in improving cloud computing security. Based on information value chain theory and IT affordances theory, a research model is built to investigate the underlying mechanism of business analytics affordances enhancing the management of cloud computing data security. The model includes business analytics affordances, decision-making affordances of cloud computing data security, decision-making rationality of cloud computing data security, and the management of cloud computing data security. Simultaneously, the model considers the role of data-driven culture and IT business process integration. It is empirically tested using data collected from 316 enterprises by Partial Least Squares-based structural equation model. Without data-driven culture and IT business process integration, the results suggest that there is a process from business analytics affordances to decision-making affordances of cloud computing data security, decision-making rationality of cloud computing data security, and to the management of cloud computing data security. Moreover, Data-driven culture and IT business process integration have a positive mediation effect on the relationship between business analytics affordances and decision-making affordances of cloud computing data security. The conclusions in this study provide useful references for the enterprise to strengthen the management of cloud computing data security using business analytics.  相似文献   

5.
Cloud computing is an IT service paradigm that can, if used meaningfully, enhance traditional health IT approaches and offer major benefits to the healthcare industry. However, its adoption by healthcare organizations has been accompanied by diverse challenges that could impede its meaningful use. Decisions about its adoption should be made after serious consideration of relevant industry-specific factors. Whereas the literature has focused on cloud computing adoption in general, the industrial specificities that influence the decision to adopt cloud computing in the healthcare context have yet to be systematically addressed. We reviewed empirical studies on both information systems and medical informatics to investigate the determinant factors of the cloud computing adoption decision in healthcare organizations and the industrial specificities of those factors. Based on the results of our review, we proposed a conceptual framework of cloud computing adoption studies in healthcare and made seven recommendations for related future research. Our research contributes to the theory by providing a comprehensive list of industry-specific factors that influence cloud computing adoption decisions in healthcare and explains their specificities for the healthcare industry. For practitioners, the identified factors serve as a checklist that informs healthcare organizations’ decision making regarding cloud computing adoption.  相似文献   

6.
云计算作为一种全新的服务模式,其特点决定了它面临着比传统网络和信息安全更多的安全风险问题,且该问题已成为制约云计算发展的重要因素.介绍了云计算体系结构及特征,分析了云计算安全风险研究现状,重点剖析了云计算技术和管理的安全风险因素,并给出应对策略,可供云服务商、云用户和云监管机构参考或借鉴,对云计算的进一步发展具有一定的指导意义.  相似文献   

7.
This paper examines empirically the factors that affect the adoption of Internet banking by Tunisian bank customers. As base model, we use the technology acceptance model (TAM) and theory of planned behavior (TPB). The model employs security and privacy, self efficacy, government support, and technology support, in addition to perceived usefulness, perceived ease of use, attitude, social norm, perceived behavior control and intention to use Internet banking. Structural equation modeling is employed to examine the inter-correlations among the proposed constructs. A survey involving a total of 284 respondents is conducted and confirmatory factor analysis was used to determine the measurement efficacies. Theoretically, this study confirms the applicability of the TAM model and TPB in predicting Internet banking adoption by Tunisian bank customers. The results allow banks' decision makers to develop strategies that can encourage the adoption of Internet banking. Banks should improve the security and privacy to protect consumers' personal and financial information, which will increase the trust of users. Government should also play a role to support bank industry by having a clear and solid law on this will ensure that customers are more confident for using Internet banking, ensuring a better Internet infrastructure and helps them to encourage users to use Internet banking. Lastly, Tunisian Banks should focus on those clients who already have a home PC, access Internet and more educated and younger since they are the most likely to adopt Internet banking.  相似文献   

8.
For cutting down cost and improving the efficiency of enterprises, adoption of innovations in ICT especially in cloud computing applications is the need of the time in the highly competitive global environment. It has been noted that generally, the Indian MSMEs are not utilizing the CC applications for the promotion of their business activities and are not availing their benefits. Hence, in the present investigation, the critical success factors (CSFs) for cloud computing adoption (CCA) in the Indian micro, small and medium enterprises (MSMEs) are identified through an exhaustive literature review and expert opinions. The association between the identified factors is established by employing an interpretive structural modeling methodology that is a multi-criteria decision making (MCDM) approach. Later, the MICMAC analysis is carried out for identifying the factors having high influential power. The results of the study revealed that a CSF namely ‘previous technological experience’ is the most significant factor having the highest driving power. The findings of this research are intended to guide cloud service providers, enterprise managers, and governmental bodies in formulating the strategies and policies for effective implementation of cloud computing facilities and harness the benefits of the same. This study makes a significant contribution to the knowledge base of CC adoption for future research in the subject field.  相似文献   

9.
云计算作为一个全新的概念,目前对烟草行业大部分职工来说还是一个比较陌生的概念,但在行业全力提倡"构建一体化‘数字烟草’全面支撑‘卷烟上水平’的大背景下,"云计算"的出现,将给"数字"烟草带来全新的机会,烟草信息化在烟草行业的可持续性发展中将发挥重要作用,而云计算技术将为烟草信息化建设提供有力的支撑。该文通过对云计算在烟草企业中的应用探索,探讨性的提出一种适合烟草企业在信息化建设的一种可持续性发展的建设模式。  相似文献   

10.
陈臣 《现代情报》2012,32(4):45-48
本文首先探讨了目前云计算技术与虚拟化技术发展趋势,先后对云计算环境下数字图书馆虚拟化技术进行了研究,提出了一种云计算环境下基于虚拟化技术构建数字图书馆数据中心的策略。该策略具有合理性和可行性,能够提高资源利用率,增强云计算系统安全性与易用性。  相似文献   

11.
Cloud computing is a pervasive computing paradigm that has revolutionized how computer infrastructure and services are delivered. Current research trends on cloud computing have been focused on the technology, applications, costs, benefits, and security of cloud computing at the organizational level within small and medium sized enterprises. Little research attention has been paid on adoption and usage of cloud computing at educational establishments and how contextual factors can influence diffusion and adoption of cloud computing. Universities in developing countries are faced with challenging socio-economic and political constraints that limit their ability to invest in expensive information systems to compete on the global stage. Using constructs from the diffusion of innovation theory and the technology acceptance model, this paper proposes a model that takes account of contextual, economic, and technological influences in the perception and adoption of cloud computing at universities in sub-Saharan Africa. Results from a pilot study, based on the model, through a survey of university lecturers and IS experts shows reliability and validity of the instrument and supports its usage for a more extensive study. Implications, potential contributions to research, and suggestions for future study are discussed.  相似文献   

12.
云计算是国家“新基建”战略的重要支点。云计算产业空间组织机理存在自上而下政府引导和自下而上企业自组织的双重特性,政府提升产业集聚的地区政策和云计算虚拟化、网络化技术属性之间看似矛盾的关系,是引发本文探索的起点。利用2010-2016年上海市1637家云计算企业数据,描绘城市内部云计算产业空间特性,并分析不同集聚模式对企业创新的影响效应。研究发现:(1)上海云计算产业呈现中心集聚、多点联动的空间格局,随着产业链向后端延伸,企业的空间分布越向中心城区集聚。(2)云计算产业仍然具有地理性,产业链内部专业化集聚和多样化集聚对不同技术类型企业创新的影响呈现梯度变化特征。政府应审视产业链内部不同集聚模式的创新效应差异性,进一步优化产业空间布局,促进创新资源在空间上的有效配置。  相似文献   

13.
针对目前科技服务数据管理中普遍存在的数据标准多样化、壁垒多,数据交互及时性与安全性难以得到保障等问题,综合考虑安全性、易用性和可扩展性等,在科技服务数据管理中融入区块链即服务(BaaS)架构和思想方法构建数据共享系统结构,基于系统结构和数据分类结构构建数据共享实现机制。基于此机制,根据数据交互流程设计出科技服务数据分类结构,实现对数据整合及其所有权确定;利用智能合约和加密密钥实现对数据的有效检索和共享,并保证数据共享过程中的安全性和隐私性。研究以期为科技服务业的创新发展及其数据管理标准化提供参考。  相似文献   

14.
Cloud computing has become the buzzword in the industry today. Though, it is not an entirely new concept but in today's digital age, it has become ubiquitous due to the proliferation of Internet, broadband, mobile devices, better bandwidth and mobility requirements for end-users (be it consumers, SMEs or enterprises). In this paper, the focus is on the perceived inclination of micro and small businesses (SMEs or SMBs) toward cloud computing and the benefits reaped by them. This paper presents five factors influencing the cloud usage by this business community, whose needs and business requirements are very different from large enterprises. Firstly, ease of use and convenience is the biggest favorable factor followed by security and privacy and then comes the cost reduction. The fourth factor reliability is ignored as SMEs do not consider cloud as reliable. Lastly but not the least, SMEs do not want to use cloud for sharing and collaboration and prefer their old conventional methods for sharing and collaborating with their stakeholders.  相似文献   

15.
陈臣 《现代情报》2013,33(1):40
本文首先对云计算环境下数字图书馆虚拟化技术和安全问题进行了描述。然后,根据云计算环境下图书馆虚拟化安全需求和安全威胁,系统地提出了一种虚拟化安全对策。该策略能够有效提高云计算系统中资源和应用程序的安全性。  相似文献   

16.
In light of continuing use and media attention placed on cloud computing, the study of ethical behaviour in technology innovations remains an important area of research, which helps to understand the antecedents of a person's intention to adopt cloud computing based on their ethical orientation. The present study examines how ethics influences a person's decision to adopt cloud computing, and how in turn ethical behaviours affect technology innovations. Based on social cognitive theory, this paper proposes that a higher ethical and entrepreneurial orientation will lead to a person adopting cloud computing. Moreover, the marketing, learning and outcome expectancy a person has about cloud computing will positively affect their intention to adopt this technology. The predictions are tested through a survey, which indicates that ethics and marketing are important determinants of a person's behavioural intention towards technology innovations.  相似文献   

17.
以Scopus数据库中"大数据"相关研究作为分析对象,采用关键词共现网络聚类的方法,确定相关的10个研究方向,分别是Hadoop研究、MapReduce优化、大数据下的数据挖掘研究、大数据下的网络安全与隐私、分布式计算机系统、数据密集型计算、可视化技术、物联网、移动云计算和云制造等研究方向。结合论文数、H指数等指标,识别不同研究方向下的代表性专家,并对其主要研究成果进行分析。结果发现网络安全与隐私中顶尖专家较多,同时在云制造方向下,我国大陆地区的研究人员较多。  相似文献   

18.
武兰芬  姜军 《科研管理》2006,41(2):142-151
本文以2002-2016年间的学术文献和专利两种数据源为基础,利用社会网络分析法从论文作者所属机构与专利权人、作者与发明人、学科与技术领域等多维视角,对全球云计算基础研究与应用研究的创新合作网络进行数据挖掘和对比分析。研究发现:云计算论文作者及所属机构间的合作更普遍;专利权人合作网络呈现分散的小网络特点,专利发明人合作关系更密切且群体性更强;云计算的基础学科是计算机理论与方法、电气与电子工程和计算机信息系统,而核心技术是数字计算机和电话与数据传输系统。基于研究结果,提出建立基础创新与应用创新的对接和融合,利用合作网络分析发掘重要的创新竞合对象,精准定位领军人才和创新群体,构建学科知识体系等促进中国云计算协同创新与产教融合的启示和建议。  相似文献   

19.
文化产业是推动我国经济结构调整、转变经济发展方式的重要着力点。云计算技术的应用极大地促进文化产业的发展,同时也带来更复杂的知识产权问题。首先厘清文化产业与云计算技术之间的联系,并通过对文化产业在云计算环境下面临知识产权问题的分析,总结其存在的弊端,最后从政策、企业、市场、技术角度探讨云时代文化产业知识产权问题的解决对策,对促进我国文化产业的发展具有积极的意义。  相似文献   

20.
云计算的特点是具有强大的计算能力和存储能力。入侵检测技术在网络安全技术中占有重要地位,但目前的入侵检测技术仍存在许多尚未解决的问题,如无法应对分布式大规模数据流攻击等。移动代理技术可给入侵检测系统带来更好的灵活性和可扩展性,结合移动代理的优势,构造了云环境下基于移动代理的入侵检测系统框架。采用NS2软件分别模拟一般网络条件与云环境下基于移动代理框架的DDoS节点攻击的两种场景,实验结果表明,云环境下基于移动代理框架的检测效果更佳。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号