题名

建構具流程推論能力之電子化文件審核/知識驗證模式-以銀行業信用卡審核為案例

并列篇名

An Internet-Based Document Authentication and Knowledge Validation Model: Authentication of the Credit Card Application

作者

侯建良(Jiang-Liang Hou);畢威寧(Wei-Ning Pi);卓弘哲(Hung-Che Chuo)

关键词

文件審核 ; 知識驗證 ; 知識管理 ; 流程管理 ; Document Authentication ; Knowledge Validation ; Knowledge Management ; Process Management

期刊名称

管理與系統

卷期/出版年月

11卷3期(2004 / 09 / 01)

页次

339 - 365

内容语文

繁體中文

中文摘要

現今文件審核與知識驗證作業大多仍以書面方式進行資料審閱與評核,造成資訊傳遞速度緩慢、審核狀態無法即時追蹤等管理缺憾。有鑑於此,本論文乃以網際網路技術為基礎,提出一套電子化文件審核流程推論模式與技術,結合審核文件權限指派機制,將文件審核流程決策整合於電子化文件管理系統中。此一推論模式乃以整合文件內容及審核角色導向之指標進行審核流程推論,文件導向指標乃利用權限群組對應文件關鍵資訊(含文件關鍵字、文件類型)之審核紀錄進行推論;群組導向指標則利用審核群組內員工職等、審核群組於審核流程中之順序趨勢與歷史流程前後關聯等資訊進行推論。透過整合此六項指標,將可提供流程決策者決定流程之初始參考方案。研究中並針對銀行業之產業運作需求,設計一套信用卡文件審核與管理雛形系統。系統之顯著效益乃可減少銀行業相關部門文件審核與處理流程中的紙張成本、降低審核流程決策者之工作負荷,並以電子化解決方案強化審核文件存取與控管效率。在產業電子化的趨勢下,此技術模式可促進文件審核/知識驗證作業與其它電子化解決方案相互整合,進而提升企業體對客戶關係管理之深度。

英文摘要

Traditionally, document authentication or knowledge validation is performed in a paper-based format and consequently results in several shortcomings such as inefficient document flow and authentication status tracking. Based on the current internet technology, this paper presents an internet-based solution for document authentication and knowledge validation. In the proposed solution, the document authentication process can be determined according to the document contents and authority. The corresponding framework, data definition and process model are explored and a prototype system is also implemented to demonstrate the online authentication and status tracking for the credit card business. According to case study, it is ensured that application of the proposed system significantly enhances the efficiency of document accessing, authentication, and status tracking. Moreover, incorporated with the mechanism of security control, different auditing levels can be assigned to ensure the higher system security. Ascribing to the popularity and user-friendly operation of the internet technology, the proposed models and system can be effectively integrated with the existing internet-based solutions adopted by the modern enterprises to efficiently reply and satisfy the miscellaneous customer requests.

主题分类 基礎與應用科學 > 統計
社會科學 > 財金及會計學
社會科學 > 管理學
参考文献
  1. 孫銘聰、侯建良(2003)。建構電子化知識文件之權限指派架構與模式。工業工程學刊,20(4),305-316。
    連結:
  2. Anderson, R.,Lee, J. H.(2000).Jikzi-a new framework for security policy, trusted publishing and electronic commerce.Computer Communications,23(17),1621-1626.
  3. Ando, K.,Yamasaki, T.,Shishibori, M.,Aoe, J.(2001).2001 IEEE International Conference on Systems, Man, and Cybernetics.Tucson, AZ, USA:
  4. Anthes, G.(1998).Security tool blocks document misuse.Computers and Security,17(5),409-410.
  5. Atif, Y.(2001).Proceedings of the Global Telecommunications Conference.TX, USA:San Antonio.
  6. Bertino, E.,Ferrari, E.(2002).Secure and selective dissemination of XML documents.ACM Transactions on Information and System Security,5(3),290-331.
  7. Brzakovic, D.,Vujovic N.(1996).Authentication of random patterns by finding a match in an image database.Image and Vision Computing,14(7),485-499.
  8. Chen, D.,Sun, C.(2001).Proceedings of the 8th International Conference on Parallel and Distributed Systems.Kyongju City, South Korea:
  9. DeSimon, A.(1989).Proceedings of the 17th Annual ACM SIGUCCS Conference on User Services.Maryland, USA:
  10. Devanbu, P.,Gertz, M.,Kwong, A.,Martel, C.,Nuckolls, G.,Stubblebine, S. G.(2001).Proceedings of the 8th ACM Conference on Computer and Communications Security.Philadelphia, Pennsylvania, USA:
  11. Garg, G.,Sharma, P. K.,Chaudhury, S.(2001).Image based document authentication using DCT.Pattern Recognition Letters,22(7),725-729.
  12. Ho, K. S.,Leong, H. V.,Lam, W.(2001).Proceedings of the 3rd International Symposium on Distributed Objects and Applications.Rome, Italy:
  13. Israel, J. E.,Linden, T. A.(1983).Authentication in office system internetworks.ACM Transactions on Information Systems,1(3),193-210.
  14. Jurečič, M.,Bunz, H.(1994).Proceedings of the 1st ACM Conference on Computer and Communications Security.Virginia, USA:
  15. Kirstein, P. T.,Sameshima, Y.(1996).Secure document interchange: a secure user agent.Computer Networks and ISDN Systems,28(4),513-523.
  16. Kwong, A.,Gertz, M.(2001).Proceedings of the Second International Conference on Web Information Systems Engineering.Davis, CA, USA:
  17. Lee, J. Y.(2001).IEE Proceedings-Computers and Digital Techniques.Tainan, Taiwan:
  18. Narendran, B.,angarajan, S.,Yajnik, S.(1997).Proceedings of the 16th Symposium on Reliable Distributed Systems.Durham, NC, USA:
  19. Russell, S.(1993).Proceedings of the Ninth Annual Conference on Computer Security Applications.FL, USA:Orlando.
  20. Zhao, J. L.(2002).Proceedings of the 35th Annual Hawaii International Conference on System Sciences.Tucson, AZ, USA:
  21. 施孟隆、游清芳、李佳珍(1999)。Logit模式應用於信用卡信用風險審核系統之研究-以國內某銀行信用卡中心為例。金融財務,4,85-104。
  22. 陳玉枝(1992)。護理用品審核制度之建立與評價。榮總護理,9(3),301-308。
  23. 陳守金(1992)。內部審核與政府審計之探討。主計月報,74(2),23-25。
  24. 陳啟光、林大舜、張啟昌(2003)。建構資訊推動計畫風險管理模式之研究-以電子公文計畫推動為例。管理與系統,3(3),303-328。
  25. 曾麗雯(1994)。主從運作架構於捷運技術文件流程管控系統之應用。捷運技術,11,42-53。
  26. 廖素華(1993)。中美兩國醫療保險費用申報制度與費用審核制度比較。醫院,2(5),259-265。
被引用次数
  1. 劉任昌、葉馬可、李世欽(2014)。國內期刊國際化之影響:以工業工程學刊為例。臺灣企業績效學刊,8(1),35-55。