:::

詳目顯示

回上一頁
題名:建構具流程推論能力之電子化文件審核/知識驗證模式--以銀行業信用卡審核為案例
書刊名:管理與系統
作者:侯建良畢威寧 引用關係卓弘哲
作者(外文):Hou, Jiang-liangPi, Wei-ningChuo, Hung-che
出版日期:2004
卷期:11:3
頁次:頁339-365
主題關鍵詞:文件審核知識驗證知識管理流程管理Document authenticationKnowledge validationKnowledge managementProcess management
原始連結:連回原系統網址new window
相關次數:
  • 被引用次數被引用次數:期刊(1) 博士論文(0) 專書(0) 專書論文(0)
  • 排除自我引用排除自我引用:1
  • 共同引用共同引用:6
  • 點閱點閱:46
現今文件審核與知識驗證作業大多仍以書面方式進行資料審閱與評核,造成資訊傳遞速度緩慢、審核狀態無法即時追蹤等管理缺憾。有鑑於此,本論文乃以網際網路技術為基礎,提出一套電子化文件審核流程推論模式與技術,結合審核文件權限指派機制,將文件審核流程決策整合於電子化文件管理系統中。此一推論模式乃以整合文件內容及審核角色導向之指標進行審核流程推論,文件導向指標乃利用權限群組對應文件關鍵資訊(含文件關鍵字、文件類型)之審核紀錄進行推論;群組導向指標則利用審核群組內員工職等、審核群組於審核流程中之順序趨勢與歷史流程前後關聯等資訊進行推論。透過整合此六項指標,將可提供流程決策者決定流程之初始參考方案。研究中並針對銀行業之產業運作需求,設計一套信用卡文件審核與管理雛形系統。系統之顯著效益乃可減少銀行業相關部門文件審核與處理流程中的紙張成本、降低審核流程決策者之工作負荷,並以電子化解決方案強化審核文件存取與控管效率。在產業電子化的趨勢下,此技術模式可促進文件審核/知識驗證作業與其它電子化解決方案相互整合,進而提升企業體對客戶關係管理之深度。
Traditionally, document authentication or knowledge validation is performed in a paper-based format and consequently results in several shortcomings such as inefficient document flow and authentication status tracking. Based on the current internet technology, this paper presents an internet-based solution for document authentication and knowledge validation. In the proposed solution, the document authentication process can be determined according to the document contents and authority. The corresponding framework, data definition and process model are explored and a prototype system is also implemented to demonstrate the online authentication and status tracking for the credit card business. According to case study, it is ensured that application of the proposed system significantly enhances the efficiency of document accessing, authentication, and status tracking. Moreover, incorporated with the mechanism of security control, different auditing levels can be assigned to ensure the higher system security. Ascribing to the popularity and user-friendly operation of the internet technology, the proposed models and system can be effectively integrated with the existing internet-based solutions adopted by the modern enterprises to efficiently reply and satisfy the miscellaneous customer requests.
期刊論文
1.施孟隆、游清芳、李佳珍(19991000)。Logit模式應用於信用卡信用風險審核系統之研究--以國內某銀行信用卡中心為例。金融財務,4,85-104。  延伸查詢new window
2.孫銘聰、侯建良(20030700)。建構電子化知識文件之權限指派架構與模式。工業工程學刊,20(4),305-316。new window  延伸查詢new window
3.陳玉枝(1992)。護理用品審核制度之建立與評價。榮總護理,9(3),301-308。new window  延伸查詢new window
4.陳守金(1992)。內部審核與政府審計之探討。主計月報,74(2),23-25。  延伸查詢new window
5.陳啟光、林大舜、張啟昌(2003)。建構資訊推動計畫風險管理模式之研究-以電子公文計畫推動為例。管理與系統,10(3),303-328。new window  延伸查詢new window
6.曾麗雯(1994)。主從運作架構於捷運技術文件流程管控系統之應用。捷運技術,11,42-53。new window  延伸查詢new window
7.廖素華(1993)。中美兩國醫療保險費用申報制度與費用審核制度比較。醫院:中華民國醫院協會雜誌,2(5),259-265。  延伸查詢new window
8.Anderson, R.、Lee, J. H.(2000)。Jikzi - A New Framework for Security Policy, Trusted Publishing and Electronic Commerce。Computer Communications,23(17),1621-1626。  new window
9.Anthes, G.(1998)。Security Tool Blocks Document Misuse。Computers and Security,17(5),409-410。  new window
10.Bertino, E.、Ferrari, E.(2002)。Secure and Selective Dissemination of XML Documents。ACM Transactions on Information and System Security,5(3),290-331。  new window
11.Brzakovic, D.、Vujovic, N.(1996)。Authentication of Random Patterns by Finding a Match in an Image Database。Image and Vision Computing,14(7),485-499。  new window
12.Garg, G.、Sharma, P. K.、Chaudhury, S.(2001)。Image Based Document Authentication Using DCT。Pattern Recognition Letters,22(6/ 7),725-729。  new window
13.Israel, J. E.、Linden, T. A.(1983)。Authentication in Office System Internetworks。ACM Transactions on Information Systems,1(3),139-210。  new window
14.Kirstein, P. T.、Sameshima, Y.(1996)。Secure Document Interchange: A Secure User Agent。Computer Networks and ISDN Systems,28(4),513-523。  new window
15.Lee, J. Y.(2001)。Threshold Signature Scheme with Multiple Signing Policies。IEE Proceedings - Computer and Digital Techniques,148(2),95-99。  new window
會議論文
1.Ando, K.、Yamasaki, T.、Shishibori, M.、Aoe, J.(2001)。Automatic Text Summarization Based on KeywordDerivation。Tucson, AZ。464-469。  new window
2.Atif, Y.(2001)。Real-Time Network Resources Allocation in Distributed Multimedia Information Systems。San Antonio, TX。2014-2019。  new window
3.Chen, D.、Sun, C.(2001)。Optional Instant Locking in Distributed Collaborative Graphics Editing Systems。Kyongju, South Korea。109-166。  new window
4.DeSimon, A.(1989)。The Information Distribution System at the University of Georgia and the Role of the Document Manager。Maryland, USA。421-427。  new window
5.Devanbu, P.、Gertz, M.、Kwong, A.、Martel, C.、Nuckolls, G.、Stubblebine, S. G.(2001)。Flexible Authentication of XML Document。Philadelphia, PA。136-145。  new window
6.Ho, K. S.、Leong, H. V.、Lam, W.(2001)。A Collaborative Word Processing System Using a CORBA-Based Workflow Framework。Rome, Italy。176-185。  new window
7.Jurecic, M.、Bunz, H.(1994)。Exchange of Patient Records - Prototype Implementation of a Security Attributes Service in X.500。Virginia, USA。30-38。  new window
8.Kwong, A.、Gertz, M.(2001)。Authentic Publication of XML Document Data。Davis, CA。331-340。  new window
9.Narendran, B.、Rangarajan, S.、Yajnik, S.(1997)。Data Distribution Algorithms for Load Balanced Fault-Tolerant Web Access。Durham, NC。97-106。  new window
10.Russell, S.(1993)。Transparent Cosignatures for Electronic Documents。Orlando, FL。82-91。  new window
11.Zhao, J. L.(2002)。Workflow-Centric Distribution of Organizational Knowledge: The Case of Document Flow Coordination。Tucson, AZ。3828-3835。  new window
 
 
 
 
第一頁 上一頁 下一頁 最後一頁 top