:::

詳目顯示

回上一頁
題名:採用BYOD對組織變革的影響:以臺灣保險公司為例
作者:林國松
作者(外文):Kuo-Sung Lin
校院名稱:元智大學
系所名稱:資訊管理學系
指導教授:林耀欽
學位類別:博士
出版日期:2017
主題關鍵詞:BYOD組織變革個案研究BYODOrganization transformationCase study
原始連結:連回原系統網址new window
相關次數:
  • 被引用次數被引用次數:期刊(0) 博士論文(0) 專書(0) 專書論文(0)
  • 排除自我引用排除自我引用:0
  • 共同引用共同引用:0
  • 點閱點閱:2
過去許多IT促進組織變革的研究中,大多數討論組織設備的驅動對於組織變革所造成的影響,並未探討到個人設備的驅動。本研究以個人設備驅動力的視野探討自帶設備(Bring Your Own Device;BYOD)現象對於組織變革的影響過程。並以個案的方式進行,藉由臺灣某知名壽險公司使用BYOD進行組織變革的真實案例為研究場域。
研究顯示,組織從IT導入到BYOD發展的策略形成可分為限制、基本、增強與進階等四個階段,並且發展出禁止、限制、信任、接受等相對應策略。組織成員因為受到個人認知行為、利益與知識的關係,進而影響組織對於新科技的採用。在組織背景、科技背景與環境背景影響之下,以及採行策略的形成,普遍認為BYOD能夠促進工作效率、獲得高階主管的支持與增進溝通等優勢。再者,組織成員透過個人裝置(Device)結合網際網路、雲端技術與大數據分析,使得資料(Data)被大量且有效使用,而這樣的轉變,將資訊由「拉」的作業模式,轉變成「推與拉」的傳遞模式。
Previous studies of information technology (IT) - enabled organizational transformation focused mainly on the effects of an organization’s devices on organizational change instead of the effects of personal devices. This study examined how the Bring Your Own Device (BYOD) phenomenon influences the process of organizational transformation by using a case study of a well-known life insurance company in Taiwan.
The research shows that the development of BYOD adoption can be divided into four phases: limited, basic, enhanced and advanced, and corresponding strategies such as prohibit, limited, trust and accepted. The employee acceptance behavior of new technologies is affected by their personal cognitive behavior, interests, and knowledge. Under the influence of the factors related to Technology, Organization, and Environment, adopting BYOD can promote work efficiency, gain the support of senior executives and enhance communication. Furthermore, employees have made extensive and effective use of data through personal devices in combination with the Internet, cloud technologies and big data analysis. The information is transformed from a "pull" mode of operation into a "push and pull" mode Delivery mode.
1.Ackerman, L. (1986). Development, transition or transformation: The question of change in organizations. OD Practitioner, 18(4), 1-9.new window
2.Adams, J. D. (1984). Transforming Work: A Collection of Organizational Transformation Readings: Miles River Press.
3.Adizes, I. (2004). Managing corporate lifecycles: The Adizes Institute Publishing.
4.Agarwal, R., & Prasad, J. (1998). A conceptual and operational definition of personal innovativeness in the domain of information technology. Information systems research, 9(2), 204-215.
5.Al-Okaily, R. (2013). Device neutral assignments for mobile learning in an English language classroom. QScience Proceedings(12th World Conference on Mobile and Contextual Learning mLearn 2013), 29.
6.Ashforth, B. E., & Lee, R. T. (1990). Defensive behavior in organizations: A preliminary model. Human relations, 43(7), 621-648.
7.Baldridge, J. V., & Burnham, R. A. (1975). Organizational innovation: Individual, organizational, and environmental impacts. Administrative science quarterly, 165-176.
8.Bassellier, G., & Benbasat, I. (2004). Business competence of information technology professionals: Conceptual development and influence on IT-business partnerships. MIS quarterly, 673-694.
9.Beatty, R. C., Shim, J. P., & Jones, M. C. (2001). Factors influencing corporate web site adoption: a time-based assessment. Information & management, 38(6), 337-354.
10.Bell, M. (2013). Considerations When Implementing a BYOD Strategy. IS Practices for SME Success Series, 19-22.
11.Blizzard, S. (2015). Coming full circle: are there benefits to BYOD? Computer Fraud & Security, 2015(2), 18-20.
12.Blumenthal, B., & Haspeslagh, P. (1994). Toward a definition of corporate transformation. MIT Sloan Management Review, 35(3), 101.
13.Bradford, M., & Florin, J. (2003). Examining the role of innovation diffusion factors on the implementation success of enterprise resource planning systems. International journal of accounting information systems, 4(3), 205-225.
14.Brynjolfsson, E. (1993). The productivity paradox of information technology. Communications of the ACM, 36(12), 66-77.
15.Brynjolfsson, E., & Hitt, L. M. (2000). Beyond computation: Information technology, organizational transformation and business performance. The Journal of Economic Perspectives, 14(4), 23-48.
16.Caldwell, C., Zeltmann, S., & Griffin, K. (2012). BYOD (bring your own device). Paper presented at the Competition Forum.
17.Carr, N. G. (2003). IT doesn't matter. Educause Review, 38, 24-38.
18.Cha, K. J., & Cha, J. S. (2014). Information Technology Enabled Organizational Transformation: Toward an Integrative Theoretical Framework International Journal of Multimedia and Ubiquitous Engineering, 9 (2), 115-126.
19.Chau, P. Y., & Hui, K. L. (2001). Determinants of small business EDI adoption: an empirical investigation. Journal of Organizational Computing and Electronic Commerce, 11(4), 229-252.
20.Chau, P. Y., & Tam, K. Y. (1997). Factors affecting the adoption of open systems: an exploratory study. MIS quarterly, 1-24.
21.Chwelos, P., Benbasat, I., & Dexter, A. S. (2001). Empirical test of an EDI adoption model. Information systems research, 12(3), 304-321.
22.Clegg, C., Axtell, C., Damodaran, L., Farbey, B., Hull, R., Lloyd-Jones, R., . . . Tomlinson, C. (1997). Information technology: a study of performance and the role of human and organizational factors. Ergonomics, 40(9), 851-871.
23.Collins, P. D., Hage, J., & Hull, F. M. (1988). Organizational and technological predictors of change in automaticity. Academy of Management Journal, 31(3), 512-543.
24.Cummings, T. G., & Worley, C. G. (2014). Organization development and change: Cengage learning.
25.Daft, R. (2012). Organization theory and design: Cengage learning.
26.Davenport, T. H. (2013). Process innovation: reengineering work through information technology: Harvard Business Press.
27.Davenport, T. H., & Stoddard, D. B. (1994). Reengineering: business change of mythic proportions? MIS quarterly, 121-127.
28.Dernbecher, S., Beck, R., & Weber, S. (2013). Switch to Your Own to Work with the Known: An Empirical Study on Consumerization of IT.
29.Dery, K., & MacCormick, J. (2012). Managing Mobile Technology: The Shift from Mobility to Connectivity. MIS Quarterly Executive, 11(4).
30.Devaraj, S., & Kohli, R. (2003). Performance impacts of information technology: Is actual usage the missing link? Management science, 49(3), 273-289.
31.Dewan, S., & Min, C.-k. (1997). The substitution of information technology for other factors of production: A firm level analysis. Management Science, 43(12), 1660-1675.
32.Eloff, M. M., & von Solms, S. H. (2000). Information security management: a hierarchical framework for various approaches. Computers & Security, 19(3), 243-256.
33.Enterprise, M. (2011). Best practices for mobile device support: The enterprise guide to smart support for smart devices. Online at: http://mobileenterprise. edgl. com/white-papers.
34.Eslahi, M., Naseri, M. V., Hashim, H., Tahir, N. M., & Saad, E. H. M. (2014). BYOD: Current state and security challenges. Paper presented at the Computer Applications and Industrial Electronics (ISCAIE), 2014 IEEE Symposium on.
35.Feeny, D. F., Edwards, B. R., & Simpson, K. M. (1992). Understanding the CEO/CIO relationship. MIS quarterly, 435-448.
36.Forrester Research, I. (2012). Key Strategies to capture and measure the value of Consumerization of IT. Retrieved from
37.French, W. L., Bell, C., & Zawacki, R. A. (2005). Organization development and transformation: Managing effective change: Macmillan/McGraw-Hill School.
38.Friedlander, F., & Brown, L. (1974). Organization Development. Annual Review of Psychology, 25(1), 313-341.new window
39.Gayeski, D. (2002). Learning Unplugged: Using Mobile Technologies for Organizational Training and Performance Improvement: ERIC.
40.Gebauer, J., & Shaw, M. J. (2004). Success factors and impacts of mobile business applications: results from a mobile e-procurement study. International Journal of Electronic Commerce, 8(3), 19-41.
41.Gersick, C. J. (1991). Revolutionary change theories: A multilevel exploration of the punctuated equilibrium paradigm. Academy of management review, 16(1), 10-36.new window
42.Grover, V., Goslar, M., & Segars, A. (1995). Adopters of telecommunications initiatives: a profile of progressive US corporations. International Journal of Information Management, 15(1), 33-46.new window
43.Grover, V., & Goslar, M. D. (1993). The initiation, adoption, and implementation of telecommunications technologies in US organizations. Journal of Management Information Systems, 141-163.
44.Grover, V., & Kettinger, W. J. (2000). Process think: winning perspectives for business change in the information age: IGI Global.
45.Hammer, M. (1993). Champy J. 1993,“. Reengineering the Corporation, A Manifesto For.
46.Hammer, M., & Champy, J. (2009). Reengineering the Corporation: Manifesto for Business Revolution, A: Zondervan.
47.Handal, B., Ritter, R., & Marcovitz, D. (2014). Implementing Large Scale Mobile Learning School Programs: To BYOD or not to BYOD. Paper presented at the EdMedia: World Conference on Educational Media and Technology.
48.Hanson, E. M. (1996). Educational administration and organizational behavior: ERIC.
49.Hanson, W., & Kalyanam, K. (2007). Principles of Internet marketing: South-Western College Publishing.
50.Harris, J., Ives, B., & Junglas, I. (2012). IT Consumerization: When Gadgets Turn Into Enterprise IT Tools. MIS Quarterly Executive, 11(3).
51.Hayes, B., & Kotwica, K. (2013). Bring your own device (BYOD) to work: Trend report: Newnes.
52.Hedberg, B. L., Bystrom, P. C., & Starbuck, W. H. (1976). Camping on seesaws: Prescriptions for a self-designing organization. Administrative Science Quarterly, 41-65.
53.Hensema, M. (2013). Acceptance of BYOD among Employees at Small to Medium-sized Organizations. Paper presented at the 19th Twente Student Conference on IT.
54.Hill, F. M., & Collins, L. K. (2000). A descriptive and analytical model of organisational transformation. International Journal of Quality & Reliability Management, 17(9), 966-983.
55.Holmstr#westeur055#m, J., & Robey, D. (2002). Inscribing organizational change with information technology: An actor network theory approach. Information systems research.
56.Iacovou, C. L., Benbasat, I., & Dexter, A. S. (1995). Electronic data interchange and small organizations: Adoption and impact of technology. MIS quarterly, 465-485.
57.Ifinedo, P. (2011). An empirical analysis of factors influencing Internet/e-business technologies adoption by SMEs in Canada. International Journal of Information Technology & Decision Making, 10(04), 731-766.
58.Ismail, W., & Ali, A. (2013). Conceptual Model for Examining the Factors that Influence the Likelihood of Computerised Accounting Information System (CAIS) Adoption Among Malaysian SME. International Journal of Information Technology and Business Management, 15(1), 122-151.new window
59.Jeyaraj, A., Rottman, J. W., & Lacity, M. C. (2006). A review of the predictors, linkages, and biases in IT innovation adoption research. Journal of information technology, 21(1), 1-23.new window
60.Jones, P., Beynon-Davies, P., Awa, H. O., Eze, S. C., Urieto, J. E., & Inyang, B. J. (2011). Upper echelon theory (UET) a major determinant of information technology (IT) adoption by SMEs in Nigeria. Journal of Systems and Information Technology, 13(2), 144-162.
61.Kaiser, H. F. (1974). An index of factorial simplicity. Psychometrika, 39(1), 31-36.new window
62.Kanter, R. M. (2003). Challenge of organizational change: How companies experience it and leaders guide it: Simon and Schuster.
63.Keyes, J. (2013). Bring your own devices (BYOD) survival guide: CRC press.
64.Kimberly, J. R., & Evanisko, M. J. (1981). Organizational innovation: The influence of individual, organizational, and contextual factors on hospital adoption of technological and administrative innovations. Academy of Management Journal, 24(4), 689-713.
65.King, W. R. (1997). Organizational transformation. Information Systems Management, 14(2), 63-65.
66.Kuan, K. K., & Chau, P. Y. (2001). A perception-based model for EDI adoption in small businesses using a technology–organization–environment framework. Information & management, 38(8), 507-521.
67.Kwon, T. H., & Zmud, R. W. (1987). Unifying the fragmented models of information systems implementation. Paper presented at the Critical issues in information systems research.
68.Latour, B. (2009). A collective of humans and nonhumans: Following Daedalus's labyrinth. Readings in the Philosophy of Technology, 11.
69.Law, J., & Hassard, J. (1999). Actor network theory and after.
70.Leavitt, N. (2013). Today's mobile security requires a new approach. Computer(11), 16-19.
71.Lebek, B., Degirmenci, K., & Breitner, M. H. (2013). Investigating the influence of security, privacy, and legal concerns on employees' intention to use BYOD mobile devices.
72.LeCompte, M. D., Millroy, W. L., & Goetz, J. P. (1992). The handbook of qualitative research in education: Academic Press.
73.Lee, C.-P., & Shim, J. P. (2007). An exploratory study of radio frequency identification (RFID) adoption in the healthcare industry. European Journal of Information Systems, 16(6), 712-724.
74.Levy, A., & Merry, U. (1986). Organizational transformation: Approaches, strategies, theories: Greenwood Publishing Group.
75.Looney, C. A., Jessup, L. M., & Valacich, J. S. (2004). Emerging business models for mobile brokerage services. Communications of the ACM, 47(6), 71-77.
76.Loose, M., Weeger, A., & Gewald, H. (2013). BYOD–The Next Big Thing in Recruiting? Examining the Determinants of BYOD Service Adoption Behavior from the Perspective of Future Employees.
77.Loveman, G. W. (1994). An assessment of the productivity impact of information technologies. ALLEN, Ts J. y SCOTT MORTON, M. S, 84-110.
78.MacIntosh, R., & MacLean, D. (1999). Conditioned emergence: A dissipative structures approach to transformation. Strategic management journal, 20(4), 297-316.
79.Malladi, R., & Agrawal, D. P. (2002). Current and future applications of mobile and wireless networks. Communications of the ACM, 45(10), 144-146.
80.Mallat, N., Rossi, M., & Tuunainen, V. K. (2004). Mobile banking services. Communications of the ACM, 47(5), 42-46.
81.Marshak, R. J. (1993). Managing the metaphors of change. Organizational Dynamics, 22(1), 44-56.new window
82.Martyn, M. (2003). Mobile and Wireless Design Essentials: Wiley.
83.McCall, G. J., & Simmons, J. L. (1969). Issues in participant observation: A text and reader (Vol. 7027): Addison-Wesley Pub. Co.
84.McKenney, J. L., Copeland, D. C., Copeland, D. G., & Mason, R. O. (1995). Waves of change: Business evolution through information technology: Harvard Business Press.
85.McKinney, P. (2001). THE WEB AIDS INSURERS IN THE PUSH FOR GREATER EFFICIENCY. National Underwriter/Life & Health Financial Services, 105(34), 34-35.
86.Melville, N., Kraemer, K., & Gurbaxani, V. (2004). Review: Information technology and organizational performance: An integrative model of IT business value. MIS quarterly, 28(2), 283-322.
87.Miller, K. W., Voas, J. M., & Hurlburt, G. F. (2012). BYOD: Security and Privacy Considerations. It Professional, 14(5), 53-55.
88.Mishra, A. N., Konana, P., & Barua, A. (2007). Antecedents and consequences of internet use in procurement: an empirical investigation of US manufacturing firms. Information systems research, 18(1), 103-120.new window
89.Mitrovic, Z., Veljkovic, I., Whyte, G., & Thompson, K. (2014). Introducing BYOD in an organisation: the risk and customer services view points. Paper presented at the The 1st Namibia Customer Service Awards & Conference.
90.Morrow, B. (2012). BYOD security challenges: control and protect your most sensitive data. Network Security, 2012(12), 5-8.
91.Morton, M. S. S. (1991). The corporation of the 1990s: Information technology and organizational transformation: Oxford University Press.
92.Nah, F. F.-H., Siau, K., & Sheng, H. (2005). The value of mobile applications: a utility company study. Communications of the ACM, 48(2), 85-90.
93.Namisiko, P., Sakataka, W., & Sugut, B. (2015). A Review of Impacts of Bring Your Own Device (BYOD) and Nomadic Computing on Enterprise Security Policies’ Compliance: The Case of Higher Learning Institutions in Kenya. Computer Engineering and Intelligent Systems, 6 (4), 19-26.
94.Ng, V. (2013). Embrace BYOD or be left behind. Retrieved from
95.Niehaves, B., K#westeur055#ffer, S., & Ortbach, K. (2013). The Effect of Private IT Use on Work Performance-Towards an IT Consumerization Theory. Paper presented at the Wirtschaftsinformatik.
96.Oliveira, T., & Martins, M. F. (2011). Literature review of information technology adoption models at firm level. The electronic journal information systems evaluation, 14(1), 110-121.new window
97.Orlikowski, W., & Hoffman, D. (1997). An Imporvisational Model for Change Managment: The Case of Groupware Technologies. Inventing the Organizations of the 21st Century, MIT, Boston, MA, 265-282.
98.Orlikowski, W. J. (1993). CASE tools as organizational change: Investigating incremental and radical changes in systems development. MIS quarterly, 309-340.
99.Orlikowski, W. J. (1996). Improvising organizational transformation over time: A situated change perspective. Information systems research, 7(1), 63-92.new window
100.Orlikowski, W. J. (2009). The sociomateriality of organisational life: considering technology in management research. Cambridge Journal of Economics, bep058.
101.Orlikowski, W. J., & Iacono, C. S. (2006). Desperately seeking the ‘IT’in IT research: a call to theorizing the IT artifact (pp. 19-42): Chichester, UK: John Wiley & Sons Ltd.
102.Ortbach, K., Bode, M., & Niehaves, B. (2013). What influences technological individualization?–An analysis of antecedents to IT consumerization behavior.
103.Palmer, I., & Hardy, C. (2000). Thinking about management: implications of organisational debates for practice: London, England: Sage.
104.Pogarcic, I., Gligora Markovic, M., & Davidovic, V. (2013). BYOD: a challenge for the future digital generation. Paper presented at the Information & Communication Technology Electronics & Microelectronics (MIPRO), 2013 36th International Convention on.
105.Premkumar, G., & Roberts, M. (1999). Adoption of new information technologies in rural small businesses. Omega, 27(4), 467-484.
106.Reger, R. K., Mullane, J. V., Gustafson, L. T., & DeMarie, S. M. (1994). Creating earthquakes to change organizational mindsets. The Academy of Management Executive, 8(4), 31-43.
107.Robbins, S. P., Judge, T., & Education, P. (2003). Essentials of organizational behavior.
108.Robey, D., & Sahay, S. (1996). Transforming work through information technology: A comparative case study of geographic information systems in county government. Information systems research, 7(1), 93-110.new window
109.Rockart, J. F., & Short, J. E. (1989). IT in the 1990s: Managing organizational interdependence. Sloan Management Review, 30(2), 7-17.
110.Rogers, E. (1983). Diffusion of innovations. New York.
111.Rogers Everett, M. (1995). Diffusion of innovations. New York, 12.
112.Romanelli, E., & Tushman, M. L. (1994). Organizational transformation as punctuated equilibrium: An empirical test. Academy of Management Journal, 37(5), 1141-1166.
113.Romer, H. (2014). Best practices for BYOD security. Computer Fraud & Security, 2014(1), 13-15.new window
114.Sabherwal, R., Hirschheim, R., & Goles, T. (2001). The dynamics of alignment: Insights from a punctuated equilibrium model. Organization science, 12(2), 179-197.
115.Sadler, P. (1995). Managing change: Kogan Page.
116.Scarfo, A. (2012). New security perspectives around BYOD. Paper presented at the Broadband, Wireless Computing, Communication and Applications (BWCCA), 2012 Seventh International Conference on.
117.Schalow, P. R., Winkler, T. J., Repschlaeger, J., & Zarnekow, R. (2013). The Blurring Boundaries Of Work-Related And Personal Media Use: A Grounded Theory Study On The Employee's Perspective. Paper presented at the ECIS.
118.Schultz, E. E., Proctor, R. W., Lien, M.-C., & Salvendy, G. (2001). Usability and security an appraisal of usability issues in information security methods. Computers & Security, 20(7), 620-634.
119.Senior, B., & Fleming, J. (2006). Organizational change: Pearson Education.
120.Shim, J., Mittleman, D., Welke, R., French, A. M., & Guo, J. C. (2013). Bring your own device (BYOD): Current status, issues, and future directions.
121.Siau, K., Sheng, H., & Nah, F. F.-H. (2004). The value of mobile commerce to customers. SIGHCI 2004 Proceedings, 8.
122.Singh, N. (2012). BYOD Genie Is Out Of the Bottle–“Devil Or Angel”. Journal Of Business Management & Social Sciences Research, 1(3), 1-12.new window
123.Smith, K. J., & Forman, S. (2014). Bring your own device—challenges and solutions for the mobile workplace. Employment Relations Today, 40(4), 67-73.
124.Stickney, C. P., Brown, P. R., & Wahlen, J. M. (2004). Financial reporting and statement analysis: A strategic perspective: South-Western Pub.
125.Stieglitz, S., & Brockmann, T. (2012). Increasing Organizational Performance by Transforming into a Mobile Enterprise. MIS Quarterly Executive, 11(4).
126.Teece, D. J., Pisano, G., & Shuen, A. (1997). Dynamic capabilities and strategic management. Strategic management journal, 18(7), 509-533.
127.Teo, T. S., Lin, S., & Lai, K.-h. (2009). Adopters and non-adopters of e-procurement in Singapore: An empirical study. Omega, 37(5), 972-987.
128.Thompson, J. D. (2003). Organizations in Action: Social Science Bases of Administrative Theory (Classics in Organization and Management Series).
129.Thong, J. Y. (1999). An integrated model of information systems adoption in small businesses. Journal of Management Information Systems, 15(4), 187-214.
130.Tornatzky, L. G., & Fleischer, M. (1990). The Processes of Technological Innovation: Lexington Books.
131.Tornatzky, L. G., Fleischer, M., & Chakrabarti, A. K. (1990). Processes of technological innovation.
132.Tsoukas, H., & Chia, R. (2002). On organizational becoming: Rethinking organizational change. Organization science, 13(5), 567-582.
133.Van de Ven, A. H., & Poole, M. S. (1995). Explaining development and change in organizations. Academy of management review, 20(3), 510-540.
134.Varshney, U., & Vetter, R. (2000). Emerging mobile and wireless networks. Communications of the ACM, 43(6), 73-81.
135.Vermeulen, F., Puranam, P., & Gulati, R. (2010). Change for change’s sake. Harvard business review, 88(6), 70-76.
136.Wade, M., & Hulland, J. (2004). Review: The resource-based view and information systems research: Review, extension, and suggestions for future research. MIS quarterly, 28(1), 107-142.new window
137.Watanabe, Y., Kitagawa, H., & Ishikawa, Y. (2001). Integration of multiple dissemination-based information sources using source data arrival properties. Paper presented at the Web Information Systems Engineering, 2001. Proceedings of the Second International Conference on.
138.Weeger, A., & Gewald, H. (2014). Factors Influencing Future Employees Decision-Making to Participate in a BYOD Program: Does Risk Matter?
139.Wei#westeur032#, F., & Leimeister, J. M. (2013). Consumerization: Herausforderungen f#westeur061#r das betriebliche Informationsmanagement durch iPhone und Co.
140.Weick, K. E. (1993). Organizational redesign as improvisation. Organizational change and redesign: Ideas and insights for improving performance, 346, 379.
141.Wernerfelt, B. (1985). The dynamics of prices and market shares over the product life cycle. Management Science, 31(8), 928-939.
142.Wischnevsky, J. D., & Damanpour, F. (2006). Organizational transformation and performance: An examination of three perspectives. Journal of Managerial Issues, 104-128.
143.Wymer, S. A., & Regan, E. A. (2005). Factors influencing e‐commerce adoption and use by small and medium businesses. Electronic markets, 15(4), 438-453.
144.Yetton, P. W., Johnston, K. D., & Craig, J. F. (1994). Computer-aided architects: a case study of IT and strategic change. Sloan Management Review, 35(4), 57.
145.Yin, R. K. (2013). Case study research: Design and methods: Sage publications.
146.Zhou, K. Z., David, K. T., & Li, J. J. (2006). Organizational changes in emerging economies: Drivers and consequences. Journal of International Business Studies, 37(2), 248-263.
 
 
 
 
第一頁 上一頁 下一頁 最後一頁 top
QR Code
QRCODE