题名

資安洞見:由使用者痛點提煉創新來源

并列篇名

Security Insights: User's Pain Points as a Source of Innovation

DOI

10.6792/OM.201008.0093

作者

蕭瑞麟(Ruey-Lin Hsiao);許瑋元(Carol Hsu)

关键词

使用者導向設計 ; 服務創新 ; 資訊安全 ; 防毒軟體 ; 質性研究 ; user centric innovation ; service innovation ; information security ; anti computer virus software ; qualitative research

期刊名称

組織與管理

卷期/出版年月

3卷2期(2010 / 08 / 01)

页次

93 - 128

内容语文

繁體中文

中文摘要

近年來,由於電腦病毒的演進,造成資安事件頻繁,資訊安全市場也因此大幅成長。資安軟體不斷地推陳出新,但是客戶卻對新產品與新服務興趣缺缺。這不但導致軟體廠商損失龐大的開發費用,也使企業持續地面臨電腦病毒攻擊與資安問題之恐懼。然而,爲何詢問使用者後所開發的新產品,仍然不是客戶所需要的?本文以質性研究法調查一家電腦防毒廠商的新產品開發過程,分析使用者導向設計的迷思,並強調在地知識對創新的重要性。本研究透過四個案例,分析在地脈絡於創新中的角色,以及如何由在地知識找出使用者在該組織中的獨特痛點,進而找到創新的機會。使用者雖然是創新的來源,但是本研究發現,使用者並不一定能知道自己的需求,唯有瞭解他們的工作實務,以及使用者在特定工作情境中的痛點,才能化痛點爲創新的亮點。本研究由在地脈絡之分析補強使用者導向創新理論之不足,同時也點出資安文獻中過度強調資訊安全技術,而忽視人性議題的缺失。最後,本文也將說明如何以在地脈絡進行產品與服務創新的實務做法。

英文摘要

The rising numbers of computer viruses and information security breaches have led to the growth of managed security services market in the recent years. Although security software firms have continued with the development and sales of new products, it has been a constant challenge to design a product that meets the customers' expectations and requirements. To examine this problem, this research deploys a qualitative approach to analyze the product innovation process in a security software firm. Through the in-depth analysis of four selected case studies, our findings reveal the significance of local context and work practices in capturing the customers' pain point from the viewpoint of user centric innovation. Furthermore, we demonstrate that the analysis of local context and work practices is valuable in the situation where the user requirements are unclear. We conclude with implications on the area of user centric innovation and information security literature, and for practices on how product developers can incorporate local knowledge and work practice into the innovation process.

主题分类 社會科學 > 管理學
参考文献
  1. Ancona, D. G.,Bresman, H.(2007).X-teams: How to build teams that lead, innovate, and succeed.Boston:Harvard Business School Press.
  2. Avgerou, C.(2001).The significance of context in information systems and organizational change.Information Systems Journal,11,43-63.
  3. Avgerou, C.(2002).Information systems and global diversity.Oxford, UK:Oxford University Press.
  4. Avgerou, C.,Walsham, G.(2000).Information technology in context: Studies from the perspective of developing countries.Aldershot:Ashgate.
  5. Backhouse, J.,Dhillon, G.(1996).Structures of responsibility and security of information security.European Journal of Information Systems,5(1),2-9.
  6. Baldwin, C.,Hienerth, C.,von Hippel, E.(2006).How user innovations become commercial products: A theoretical investigation and case study.Research Policy,35(9),1291-1313.
  7. Barley, S. R.(1986).Technology as an occasion for structuring: Evidence from observations of CT scanners and the social order of radiology departments.Administrative Science Quarterly,31(1),78-109.
  8. Barley, S. R.,Kunda, G.(2001).Bringing work back in.Organization Science,12(1),76-95.
  9. Baskerville, R.,Siponen, M.(2002).An information security meta-poilcy for emergent organizations.Journal of Logistics Information Management,15(5/6),337-346.
  10. Beaudry, A.,Pinsonneault, A.(2005).Understanding user response to information technology: A coping model of user adaptation.MIS Quarterly,29(3),493-526.
  11. Bechky, B. A.(2003).Sharing meaning across occupational communities: The transformation of Understanding on a production floor.Organization Science,14(3),312-330.
  12. Dhillon, G.,Backhouse, J.(2001).Current directions in IS security research: Towards socio-organizational perspectives.Information Systems Journal,11,127-153.
  13. Dhillon, G.,Torkzaden, G.(2006).Value-focused assessment of information security in organization.Information Systems Journal,16,293-314.
  14. Enos, J. L.(1962).Petroleum progress and profits: A history of process innovation.Cambridge, MA:MIT Press.
  15. Franke, N.,Shah, S.(2003).How communities support innovative activities: An exploration of assistance and sharing among end-users.Research Policy,32,157-178.
  16. Franke, N.,von Hippel, E.(2003).Satisfying heterogeneous user needs via innovation toolkits: The case of apache security software.Research Policy,32(7),1199-1215.
  17. Franke, N.,von Hippel, E.,Schreir, M.(2006).Finding commercially attractive user innovation: A test of lead-user theory.Journal of Product Innovation Management,23,301-315.
  18. Freeman, C.(1968).Chemical process plant: Innovation and the world market.National Institute Economic Review,45,29-57.
  19. Garud, R.,Rappa, M. A.(1994).A socio-cognitive model of technology evolution: The case of cochlear implants.Organization Science,5(3),344-362.
  20. Hsu, C.(2009).Frame misalignment: Interpreting the implementation of information systems security certification in an organization.European Journal of Information Systems,18,140-150.
  21. Jeppesen, L. B.,Frederiksen, L.(2006).Why do users contribute to firm-hosted user communities? The case of computer-controlled music instruments.Organization Science,17(1),45-63.
  22. Lakhani, K. R.,von Hippel, E.(2003).How open source software works: 'Free' user-to-user assistance.Research Policy,32(6),923-943.
  23. Lee, G. K.,Cole, R. E.(2003).From a firm-based to a community-based model of knowledge creation: The case of the linux kernel development.Organization Science,14(6),633-649.
  24. Lengnick-Hall, C. A.(1996).Customer contributions to quality: A different view of the customer-oriented firm.The Academy of Management Review,21(3),791-824.
  25. Lettl, C.,Herstatt, C.,Gemunden, H.(2006).Users' contributions to radical innovation: Evidence from four cases in the field of medical equipment technology.R&D Management,36(3),251-272.
  26. Luthje, C.,Herstatt, C.,von Hippel, E.(2005).User-innovators and 'local' information: The case of mountain bike.Research Policy,34,951-965.
  27. Markus, M. L.,Manville, B.,Agres, C. E.(2000).What makes a virtual organization work?.Sloan Management Review,42(1),13-26.
  28. Morrison, P. D.,Roberts, J. H.,von Hippel, E.(2000).Determinants of user innovation and innovation sharing in a local market.Management Science,46(12),1513-1527.
  29. Nonaka, I.(Ed.),Kohlbacher, F.(Ed.),Hirata, T.(Ed.),Toyama, R.(Ed.)(2008).Managing flow: A process theory of the knowledge-based firm.New York:Palgrave Macmillan.
  30. Orlikowski, W. J.,Robey, D.(1991).Information technology and the structuring of organizations.Information Systems Research,2(2),143-169.
  31. Orr, J. E.(1996).Talking about machines: An ethnography of a modern job.Ithaca, NY:Cornell University Press.
  32. Puri, S. K.(2007).Integrating scientific with indigenous knowledge: Constructing knowledge alliances for land management in India.MIS Quarterly,31(2),355-379.
  33. Rogers, E. M.(1995).The diffusion of innovations.New York:Free Press.
  34. Rothwell, R.,Gardiner, P.(1988).Re-innovation and robust designs: Producer and user benefits.Journal of Marketing Management,3(3),372-387.
  35. Schreier, M.,Oberhauser, S.,Prugl, R.(2007).Lead users and the adoption and diffusion of new products: Insights from two extreme sports communities.Marketing Letters,18(1/2),15-30.
  36. Siponen, M.(2000).A conceptual foundation for organizational information security awareness.Information Management & Computer Security,8(1),31-41.
  37. Siponen, M.,Iivari, J.(2006).Six design theories for IS security policies and guidelines.Journal of Association for Information Systems,7(7),445-472.
  38. Sutton, R. I.,Hargadon, A.(1996).Brainstorming groups in context: Effectiveness in a product design firm.Administrative Science Quarterly,41(4),685-718.
  39. Tortoriello, M.,Krackhardt, D.(2010).Activating cross-boundary knowledge: The role of simmelian ties in the generation of innovations.Academy of Management Journal,53(1),167-181.
  40. Van de Ven, A. H.,Polley, D. E.,Garud, R.,Venkataraman, S.(1999).The innovation journey.New York:Oxford University Press.
  41. von Hippel, E.(1994).Sticky information' and the locus of problem solving: Implications for innovation.Management Science,40(4),429-439.
  42. von Hippel, E.(1986).Lead users: A source of novel product concepts.Management Science,32(7),791-805.
  43. von Hippel, E.(2007).Horizontal innovation networks: By and for users.Industrial & Corporate Change,16(2),293-315.
  44. von Hippel, E.(1988).The sources of innovation.Oxford:New York University Press.
  45. von Hippel, E.(1998).Economics of product development by users: The impact of 'sticky' local information.Management Science,44(5),629-644.
  46. von Hippel, E.(2005).Democratizing innovation.Boston:MIT Press.
  47. von Hippel, E.,Katz, R.(2002).Shifting innovation to users via toolkits.Management Science,48(7),821-833.
  48. von Solms, R.(1999).Information security management: Why standards are important.Information Management & Computer Security,7,50-57.
  49. Vroom, C.,von Solms, R.(2004).Towards information security behavioral compliance.Computers & Security,23,191-198.
  50. Walsham, G.(2006).Doing interpretive research.European Journal of Information Systems,15,320-330.
  51. Whittington, R.(2006).Learning more from failure: Practice and process.Organization Studies,27(12),1903-1906.
  52. Willcocks, L.,Margetts, H.(1994).Risk assessment and information systems.European Journal of Information Systems,3,127-139.
被引用次数
  1. 歐素華(2019)。精準分眾以創新:由使用者行為引導媒體服務設計。中山管理評論,27(1),11-56。
  2. 蕭瑞祥、鄭哲斌、傅大煜(2013)。摩斯漢堡:QR Code—創新服務的秘密武器。管理評論,32(2),1-20。