研究生: |
陳音筑 Chen, Yin-Chu |
---|---|
論文名稱: |
以技術探勘與多規則決策法定義技術路線圖-以雲端安全為例 Defining technology roadmaps Based on Technology Mining and Multiple Rule Decision Making Methods - A Case Study of Cloud Security |
指導教授: |
黃奇武
Huang, Chi-Wu |
學位類別: |
碩士 Master |
系所名稱: |
工業教育學系 Department of Industrial Education |
論文出版年: | 2018 |
畢業學年度: | 106 |
語文別: | 英文 |
論文頁數: | 127 |
中文關鍵詞: | 資料導向 、技術路徑圖 、文字探勘 |
英文關鍵詞: | Data-driven, Technology roadmap, Text Mining |
DOI URL: | http://doi.org/10.6345/THE.NTNU.DIE.012.2018.E01 |
論文種類: | 學術論文 |
相關次數: | 點閱:216 下載:0 |
分享至: |
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報 |
隨著科技創新,現今的資料儲存的已經不在只限於實體裝置,隨處都可存取的雲端空間,儼然快速取代實體儲存裝置,由於大家對於雲端的重度使用,資料的安全也成為各提供雲端服務的廠商不敢忽視的環節,雲端技術的發展變得日益重要。技術路線圖是現在到未來用以達成客戶要求的產品和技術並行發展的路徑圖,或是預測未來市場技術需求的展望圖。由於技術路徑圖可清楚呈現、並進而預測產品趨勢,近年來,已經為各大企業所採用,以作為產品規劃與開發之依據,且技術資料探勘與已經成為了解現況,並且預測未來技術走向的重要方式,本研究以技術路線圖來對雲端安全技術做分析,基於過去的研究主要基於以專家意見,導入質性研究之方法,較缺乏數據依據 。因此,本研究擬導入基於技術探勘之多規則決策法,定義技術路徑圖各層次層之關係。本研究首先將導入文字探勘方法,擷取技術資料內之關鍵字,經專家確認後,導入約略集合理論,並進而擷取關鍵字之間的若…則…關係,其後,並將前述關係導入DEMATEL法,求取所有影響關係,並可依據所有影響關係,定義關鍵字組合技術路圖與關鍵字關係技術圖。在關鍵字投資組合圖中,根據其支持和信度來識別兩種類型的關鍵字配對。在關鍵字關係圖中,則將導入DEMATEL總關係矩陣中關鍵字間之影響關係,作為技術圖各階層間,依賴關係和層間依賴關係的支持,開發二維度的映射。本研究之結果,將可作為雲端安全領域相關企業或組織導入能力集合擴展模式,進而訂定提昇策略之基礎。
The technology roadmap is a prospect of future market or satisfaction for the products or technology development of customer’s requirements. The technology roadmap was proposed by Motorola in 1980. Owing to the technology roadmap can present and forecast the trend of the products clearly, enterprises adopt this to be the basis of a product plan and development. Recently, technology mining has been being an important method to know the prevalence and forecast the trend. Even though the technology roadmap had been prevailed in academia and industry for a long time, the past researches were based on expert’s opinion and implemented qualitative research which was short of data. Hence, this paper defined the relationship between each layer of the technology roadmap based on technology mining and multiple rule decision making method. At first, this paper captured the keywords from technology data which implemented by text mining method. Those keywords need to be confirmed by experts then given to the rough set theory and we can get the relationship of “If… then…” between keywords. Then we obtain all dependency information from DEMATEL method by implementing the keywords relationship. We can define the keyword portfolio map and keyword relational map by dependency information. In the keyword relationship map, we have a two-dimensional map is development by using support as a affinity relationship and confidence as a dependency relationship which implemented by the matrix result of DEMATEL. The result of this paper can be a basis implementation of competence sets expansion for the enterprises or organizations and strategy enhancement.
Al-Saggaf, Y., & Islam, M. Z. (2015). Data Mining and Privacy of Social Network Sites' Users: Implications of the Data Mining Problem. science and engineering ethics, 21(4), 941-966.
Armbrust, O. (2010). Determining Organization-Specific Process Suitability Lecture Notes in Computer Science (pp. 26-38): Springer Berlin Heidelberg.
Baars, T., & Spruit, M. (2012). Designing a Secure Cloud Architecture. International Journal of Information Security and Privacy, 6(1), 14-32. doi:10.4018/jisp.2012010102
Bazin, A., & Ganascia, J.-G. (2015). Computing the Duquenne–Guigues basis: an algorithm for choosing the order. International Journal of General Systems, 45(2), 57-85. doi:10.1080/03081079.2015.1072922
Boire, R. (2014). Applying Data Mining Techniques Data Mining for Managers (pp. 95-113): Palgrave Macmillan US.
Brankovic, L., Islam, M. Z., & Giggins, H. Privacy-Preserving Data Mining Data-Centric Systems and Applications (pp. 151-165): Springer Berlin Heidelberg.
Brock, M., & Goscinski, A. (2010). Toward Ease of Discovery, Selection and Use of Clusters within a Cloud. Paper presented at the 2010 IEEE 3rd International Conference on Cloud Computing.
Casola, V., Rak, M., & Villano, U. (2010). Identity federation in cloud computing. Paper presented at the 2010 Sixth International Conference on Information Assurance and Security.
Chen, Y. L., Liu, Y. H., & Ho, W. L. (2013). A text mining approach to assist the general public in the retrieval of legal documents. Journal of the American Society for Information Science and Technology, 64(2), 280-290.
Choi, S., Kim, H., Yoon, J., Kim, K., & Lee, J. Y. (2013). An SAO-based text-mining approach for technology roadmapping using patent information. R & D Management, 43(1), 52-74.
Delen, D. (2012). Extracting Knowledge from Published Literature Using RapidMiner, Practical Text Mining and Statistical Analysis for Non-structured Text Data Applications (pp. 375-394): Elsevier.
Dias, P., & Ergan, S. (2016). The Need for Representing Facility Information with Customized LOD for Specific FM Tasks. Paper presented at the Construction Research Congress 2016.
Edosomwan, J. A. Achieving product and service fast time to market objectives through technology management. Paper presented at the Technology Management : the New International Language.
Ellis, J., Pursell, C., & Rahman, J. (2003). Quality of Service (QoS)—Overcoming One of the Biggest Challenges Voice, Video, and Data Network Convergence (pp. 245-268): Elsevier.
Ghazinoory, S., Daneshmand-Mehr, M., & Arasti, M. R. (2014). Developing a model for integrating decisions in technology roadmapping by fuzzy promethee. Joural of Intelligent & Fuzzy Systems, 26(2), 625-645.
Gray, K., & Nadeau, T. D. (2016). Network Function Virtualization Network Function Virtualization (pp. 1-18): Elsevier.
Grispos, G., Glisson, W. B., & Storer, T. (2015). Recovering residual forensic data from smartphone interactions with cloud storage providers The Cloud Security Ecosystem (pp. 347-382): Elsevier.
Grobauer, B., Walloschek, T., & Stocker, E. (2011). Understanding Cloud Computing Vulnerabilities. IEEE Security & Privacy Magazine, 9(2), 50-57. doi:10.1109/msp.2010.115
Gupta, G., & Pathak, D. R. (2016). Cloud Computing: “Secured Service Provider for data mining”. International Journal Of Engineering And Computer Science. doi:10.18535/ijecs/v5i5.17
Hayes, J. (2008). TAT-1 and Deregulation. Paper presented at the IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.
Huang, C. Y., Shyu, J. Z., & Tzeng, G. H. (2007). Reconfiguring the innovation policy portfolios for Taiwan's SIP Mall industry. Technovation, 27(12), 744-765.
Hull, J. C. (1980). SEQUENTIAL INVESTMENT DECISIONS The Evaluation of Risk in Business Investment (pp. 87-101): Elsevier.
Hussain, S. A. (2017). How to make knowledge resources valuable. VINE Journal of Information and Knowledge Management Systems, 47(1), 42-54. doi:10.1108/vjikms-01-2016-0002
Ji, W., Liu, Y., & Cui, W. (2010). The Home Gateway used in FTTH which can Implement Triple Play. Journal of Optical Communications, 31(2). doi:10.1515/joc.2010.31.2.109
Kauppinen, M., Savolainen, J., Lehtola, L., Komssi, M., Tohonen, H., & Davis, A. (2009). From Feature Development to Customer Value Creation. Paper presented at the 2009 17th IEEE International Requirements Engineering Conference.
Kerr, C., Phaal, R., & Probert, D. (2012). Cogitate, articulate, communicate: the psychosocial reality of technology roadmapping and roadmaps. R & D MANAGEMENT, 42(1), 1-13.
Kostoff, R. N., & Schaller, R. R. (2001). Science and technology roadmaps. IEEE Transactions on engineering management, 48(2), 132-143.
Kumar, V., & Reinartz, W. (2012). Customer Relationship Management Issues in the Business-To-Business Context Springer Texts in Business and Economics (pp. 261-277): Springer Berlin Heidelberg.
Liu, Y., Sheng, X., & Marston, S. R. (2015). The Impact of Client-Side Security Restrictions on the Competition of Cloud Computing Services. International Journal of Electronic Commerce, 19(3), 90-117. doi:10.1080/10864415.2015.1000224
Marston, T. M., Kennedy, J. L., & Marston, P. L. (2011). Coherent and semi-coherent processing of limited-aperture circular synthetic aperture (CSAS) data. Paper presented at the OCEANS'11 MTS/IEEE KONA.
Mousannif, H., Khalil, I., & Kotsis, G. (2012). Collaborative learning in the clouds. Information Systems Frontiers, 15(2), 159-165. doi:10.1007/s10796-012-9364-y
Mousavi, H., Kerr, D., Iseli, M., & Zaniolo, C. (2014). Mining Semantic Structures from Syntactic Structures in Free Text Documents. Paper presented at the 2014 IEEE International Conference on Semantic Computing.
Pape, S. (2014). Privacy and Data Security Authentication in Insecure Environments (pp. 213-227): Springer Fachmedien Wiesbaden.
Petrick, I. J., & Echols, A. E. (2004). Technology roadmapping in review: A tool for making sustainable new product development decisions. Technological Forecasting and Social Change, 71(1-2), 81-100. doi:10.1016/s0040-1625(03)00064-7
Phaal, R., Farrukh, C., & Probert, D. R. (2013). Technology Management and Roadmapping at the Firm Level Technology Roadmapping for Strategy and Innovation (pp. 13-29): Springer Berlin Heidelberg.
Ren, D., Ren, L., Mao, X., & Wang, Z. (2012). Safety Problem and IT Information Resources. Paper presented at the 2012 Fourth International Conference on Computational and Information Sciences.
Robertson, M. C., Gillespie, B., & Friesen, H. G. (1982). Characterization of the Two Forms of Rat Placental Lactogen (rPL): rPL-I and rPL-II*. Endocrinology, 111(6), 1862-1866. doi:10.1210/endo-111-6-1862
Souag, A., Salinesi, C., Wattiau, I., & Mouratidis, H. (2013). Using Security and Domain Ontologies for Security Requirements Analysis. Paper presented at the 2013 IEEE 37th Annual Computer Software and Applications Conference Workshops.
Subramani, K., Ahmed, W., & Hartsfield, J. K. (2013). Dedication Nanobiomaterials in Clinical Dentistry (pp. ii): Elsevier.
Sung, H.-Y., Wang, C.-C., Chen, D.-Z., & Huang, M.-H. (2013). A comparative study of patent counts by the inventor country and the assignee country. Scientometrics, 100(2), 577-593. doi:10.1007/s11192-013-1192-4
Tavani, H. T., & Arnold, D. (2011). Trust and Privacy in Our Networked World. Information, 2(4), 621-623. doi:10.3390/info2040621
Teramoto, K., & Huang, H. H. (2012). Pay as You Go in the Cloud: One Watt at a Time. Paper presented at the 2012 SC Companion: High Performance Computing, Networking Storage and Analysis.
Thomson, C. C., & Jakubowski, M. (2012). Toward an Open Source Civilization: (Innovations Case Narrative: Open Source Ecology). Innovations: Technology, Governance, Globalization, 7(3), 53-70. doi:10.1162/inov_a_00139
Tzeng, G. H., Chiang, C. H., & Li, C. W. (2007). Evaluating intertwined effects in e-learning programs: A novel hybrid MCDM model based on factor analysis and DEMATEL. Expert Systems with Applications, 32(4), 1028-1044.
Wagner, G. R., Paradice, D., & Courtney, J. A Software Laboratory for Advancing Decision Support Simulation Intelligent Decision-making Support Systems (pp. 423-440): Springer London.
Wang, Z. (2011). Security and Privacy Issues within the Cloud Computing. Paper presented at the 2011 International Conference on Computational and Information Sciences.
Youssef, A. A., & Krishnamurthy, D. (2017). Burstiness-aware service level planning for enterprise application clouds. Journal of Cloud Computing, 6(1). doi:10.1186/s13677-017-0087-y
Zhao, J. (2010). Generic Technology Roadmap for Areas of Ecological and Environmental Technologies Ecological and Environmental Science & Technology in China: A Roadmap to 2050 (pp. 142-143): Springer Berlin Heidelberg.
Zhou, L., Varadharajan, V., & Hitchens, M. (2015). Trust Enhanced Cryptographic Role-Based Access Control for Secure Cloud Data Storage. IEEE Transactions on Information Forensics and Security, 10(11), 2381-2395.