研究生: |
卓弘哲 Chuo, Hung Che |
---|---|
論文名稱: |
以文件內容與審核角色為基之審核流程指派模式與技術 A Content- and Role-Based Approach for Document Authentication Sequence Determination |
指導教授: |
侯建良
|
口試委員: | |
學位類別: |
碩士 Master |
系所名稱: |
工學院 - 工業工程與工程管理學系 Department of Industrial Engineering and Engineering Management |
論文出版年: | 2003 |
畢業學年度: | 91 |
語文別: | 中文 |
論文頁數: | 138 |
中文關鍵詞: | 文件管理 、文件審核 、流程推論 、知識管理 、流程管理 |
外文關鍵詞: | Document Management, Document Authentication, Sequence Determination, Knowledge Management, Process Management |
相關次數: | 點閱:3 下載:0 |
分享至: |
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報 |
摘要
由於電子商務的蓬勃發展,現代企業中許多原以人力進行之文件管理工作,已逐漸為電子化文件管理系統取代。在文件管理課題中,文件審核任務常伴隨企業內外部交易等活動時發生,故其乃成為電子化文件管理系統是否具有實效之關鍵活動。其中,文件審核流程之正確與否,乃影響待審核文件是否正確傳送予審核人員並正確完成審核。若流程決策者未能全盤瞭解文件內容與審核群組前後之關聯性,即可能造成錯誤的流程決策、審核程序不流暢等問題,而形成無效之審核。此外,文件於審核過程中傳遞時,不完善之流程控管機制亦可能使企業無法即時掌握審核進度與文件狀態,及申請者無法即時確認審核結果並作成對應回應等文件管理瓶頸。
為增進企業對審核文件管理之有效性與正確性,本論文乃提出一套以網際網路為基之電子化文件審核流程推論模式與技術,結合審核文件權限指派機制,將文件權限管理與審核流程決策整合於電子化文件管理系統中。本研究之推論模式乃提出六項以文件內容及審核角色導向之指標,各指標可個別或綜合運用以進行審核流程推論。文件導向指標乃利用文件權限群組於文件類別、關鍵字等相關資訊對應之審核紀錄進行推論。群組導向指標則利用審核群組內員工職等、審核群組於審核流程中之順序趨勢,與審核群組間傳遞流程之前後關聯等資訊進行推論。藉由此六項指標,將可決策文件審核之流程,或提供流程決策者決定流程之初始參考方案。根據推論模式構建、資料模式分析與系統架構設計,本研究並開發一雛形系統與實作一汽車專利審核案例,以驗證此方法論之可行性。
導入此模式與技術後,將可賦予企業內電子化文件管理系統具有自我學習之能力,並減輕企業內部人員對於審核文件管理工作之負擔。透過此模式與技術之開發,使審核申請者與審核人員可於此審核文件管理系統下,快速地進行審核申請、文件傳遞與審核、及審核狀態掌握與回應等任務,以提高企業文件審核之效率,進而帶動企業運作之電子化,促進產業經營型態升級。
Abstract
Owing to the drastic development of the Internet and information technologies, electronic document management solutions have been widely applied in organizations. Among the document management activities, document authentication is one of the typical issues to ensure the document quality before publication. Reliable authentication relies on the effective management of authentication processes. Due to the variety of document features and contents, different documents might follow distinct authentication processes. If the administrator cannot totally recognize the document contents or the reviewer background, the authentication sequence cannot be accurately determined.
Concerning efficiency of the electronic authentication model, this research proposes an Internet-based approach for document authentication process determination to improve the efficiency of documentation authentication and management. Combined with the document authority reasoning model, an heuristic algorithm for authentication sequence determination is developed. In the integrated algorithm, six content- and reviewer-oriented decision indices are provided. The content-oriented indices emphasize two critical document attributes (i.e., document type and keywords) for authentication sequence reasoning while the reviewer-oriented indices utilize the information about entry-level percentage, sequence history and hierarchical relationship of the authorized reviewers. The reasoning results can be used to directly carry out document authentication or to provide the decision maker an initial suggestion for validation. In addition, based on the reasoning model, a prototype system and a case study are developed to validate the effectiveness of the proposed methodology. Incorporated with the approach developed in this research, the document management system will have the learning capability for accurate authentication sequence reasoning and effectiveness and efficiency of document authentication activities in the collaborative environment can be significantly improved.
參考文獻
1. 吳泗重,1997,「如何強化各級機關內部審核功能(上)」,主計月報,Vol. 83,No. 2,第51-56頁。
2. 吳泗重,1997,「如何強化各級機關內部審核功能(下)」,主計月報,Vol. 83,No. 3,第29-34頁。
3. 李玉,1998,「如何加強非營業基金之審核促其提昇營運績效」,審計季刊,Vol. 18,No. 3,第39-44頁。
4. 施孟隆、游清芳、李佳珍,1999,「Logit模式應用於信用卡信用風險審核系統之研究--以國內某銀行信用卡中心為例」,金融財務,Vol. 4,第85-104頁。
5. 柯承恩,1998,「強化內部審核提升行政績效」,主計月報,Vol. 87,No. 5,第10-12頁。
6. 侯建良、花麒昌,2001,「全球資訊網下之電子化文件審核與追蹤系統開發」,中國工業工程學會九十年度年會,CIIE2001-0022。
7. 侯建良、花麒昌,2002,「協同合作環境下之文件審核資料模式」,第一屆知識管理與協同規劃研討會,Paper ID:A102。
8. 侯建良、孫銘聰,2001,「網際網路為基之電子化文件管理與自動指派模式構建與系統開發」,中國工業工程學會九十年度年會,CIIE2001-0023。
9. 孫銘聰、侯建良,2002,「以推論法則為基之知識文件權限管理程序模式」,產業電子化運籌管理學術暨實務研討會,Paper ID:39。
10. 侯建良、詹權恩,2003,「電子化文件庫之詞彙相關性解析模式」,2003電子商務與數位生活研討會論文集,第38-47頁。
11. 郭建良,1996,「文件式資料庫的權限管理模型」,國立台灣工業技術學院工程技術研究所碩士論文,指導教授:詹朝基。
12. 陳玉枝,1992,「護理用品審核制度之建立與評價」,榮總護理,Vol. 9,No. 3,第301-308頁。
13. 陳守金,1992,「內部審核與政府審計之探討」,主計月報,Vol. 74,No. 2,第23-25頁。
14. 曾麗雯,1994,「主從運作架構於捷運技術文件流程管控系統之應用」,捷運技術,第十一期,第42-53頁。
15. 黃正,1998,「審計機關對各機關內部審核之聯繫及考查」,審計季刊,Vol. 18,No. 4,第113-121頁。
16. 葉啟興,2000,「主從式文件管理系統」,國立海洋大學系統工程暨造船學系碩士論文,指導教授:楊劍東。
17. 廖素華,1993,「中美兩國醫療保險費用申報制度與費用審核制度比較」,醫院,Vol. 2,No. 5,第259-265頁。
Reference:
18. Anderson, R. and Lee, J. H., 2000, "Jikzi - a new framework for security policy, trusted publishing and electronic commerce," Computer Communications, Vol. 23, No. 17, pp. 1621-1626.
19. Anthes, G., 1998, "Security tool blocks document misuse," Computers & Security, Vol. 17, No. 5, pp. 409-410.
20. Atif, Y., 2001, “Real-time network resources allocation in distributed multimedia information systems,” Proceedings of the Global Telecommunications Conference, Vol. 3, November, pp. 2014-2019.
21. Aversano, L., Canfora, G., De Lucia, A. and Gallucci, P., 2001, “Integrating document and workflow management systems,” Proceedings of IEEE Symposia on Human-Centric Computing Languages and Environments, pp.328-329.
22. Balacheff, B., Chen, L., Plaquin, D. and Proudler, G., 2001, “A trusted process to digitally sign a document,” Proceedings of the 2001 Workshop on New Security Paradigms, pp. 79-86.
23. Barros, A. P. and terHofstede, A. H. M., 1999, "Modelling extensions for concurrent workflow coordination," Proceedings of 1999 IFCIS International Conference on Cooperative Information Systems, pp. 337-347.
24. Bertino, E. and Ferrari, E., 2002, "Secure and selective dissemination of XML documents," ACM Transactions on Information and System Security, Vol. 5, No. 3, pp. 290-331.
25. Brzakovic, D. and Vujovic N., 1996, "Authentication of random patterns by finding a match in an image database," Image and Vision Computing, Vol. 14, No. 7, pp. 485-499.
26. Brzakovic, D. and Vujovic N., 1998, "Evaluation of an algorithm for finding a match of a distorted texture pattern in a large image database," ACM Transactions on Information Systems (TOIS), Vol. 16, No. 1, pp. 31-60.
27. Chen, D. and Sun, C., 2001, “Optional instant locking in distributed collaborative graphics editing systems,” Proceedings of the 8th International Conference on Parallel and Distributed Systems, pp. 109-166.
28. DeSimon, A., 1989, "The information distribution system at the University of Georgia and the role of the document manager," Proceedings of the 17th Annual ACM SIGUCCS Conference on User Services, pp. 421-427.
29. Devanbu, P., Gertz, M., Kwong, A., Martel, C., Nuckolls, G. and Stubblebine, S. G., 2001, "Flexible authentication of XML document," Proceedings of the 8th ACM Conference on Computer and Communications Security, pp.136-145.
30. Garg, G., Sharma, P. K. and Chaudhury, S., 2001, "Image based document authentication using DCT," Pattern Recognition Letters, Vol. 22, No. 6-7, pp. 725-729.
31. Ho, K. S., Leong, H. V. and Lam, W., 2001, "A collaborative word processing system using a CORBA-based workflow framework," Proceedings of the 3rd International Symposium on Distributed Objects and Applications, pp. 176-185.
32. Hou, J.-L., 2002, "A knowledge authority reasoning approach using keyword ontology," The Fourth Asia-Pacific Conference on Industrial Engineering and Management Systems, Paper ID: TM031.
33. Hou, J.-L. and Chuo, H.-C., 2002, "A model for electronic document authentication and management," The 30th International Conference on Computers & Industrial Engineering, pp. 317-322.
34. Hou, J.-L., Trappey, C. V., and Trappey A. J. C., 2002, "A web-based document server for knowledge management in a supply chain," International Journal of Agile Manufacturing, Vol. 5, No. 1, pp. 77-87.
35. Israel, J. E. and Linden, T. A., 1983, "Authentication in office system internetworks," ACM Transactions on Information Systems, Vol. 1, No. 3, pp. 193-210.
36. Jie Meng, Krithivasan, R., Su, S. Y. W. and Helal, S., 2002, "Flexible inter-enterprise workflow management using e-services," Proceedings of the 4th IEEE International Workshop on Advanced Issues of E-Commerce and Web-Based Information Systems, pp. 43-50.
37. Jurečič, M. and Bunz, H., 1994, "Exchange of patient records - prototype implementation of a security attributes service in X.500," Proceedings of the 1st ACM Conference on Computer and Communications Security, pp. 30-38.
38. Kirstein, P. T. and Sameshima, Y., 1996, "Secure document interchange: a secure user agent," Computer Networks and ISDN Systems, Vol. 28, No. 4, pp. 513-523.
39. Kwong, A. and Gertz, M., 2001, “Authentic publication of XML document data,” Proceedings of the Second International Conference on Web Information Systems Engineering, pp.331-340.
40. Lee, J. Y., 2001, "Threshold signature scheme with multiple signing policies," IEE Proceedings-Computers and Digital Techniques, Vol. 148, No. 2, pp. 95-99.
41. Lv, G., Wang, J. and Yan, J., 2002, "Research of workflow management system based on enterprise process modeling," Proceedings of the 4th World Congress on Intelligent Control and Automation, Vol. 1, No. 1, pp. 547-550.
42. Markousis, T., Tsirikos, D., Vazirgiannis, M. and Stavrakas, Y., 2000, "WWW-enabled delivery of interactive multimedia documents," Computer Communications, Vol. 23, No. 3, pp. 242-252.
43. Narendran, B., Rangarajan, S. and Yajnik, S., 1997, "Data distribution algorithms for load balanced fault-tolerant web access," Proceedings of The 16th Symposium on Reliable Distributed Systems, pp. 97-106.
44. Pierre, G., vanSteen, M. and Tanenbaum, A. S., 2002, “Dynamically selecting optimal distribution strategies for web documents,” IEEE Transactions on Computers, pp. 637-651.
45. Preuner, G. and Schrefl, M, 2002, "Integration of web services into workflows through a multi-level schema architecture," Proceedings of the 4th IEEE International Workshop on Advanced Issues of E-Commerce and Web-Based Information Systems, pp. 51-60.
46. Russell, S., 1993, "Transparent cosignatures for electronic documents," Proceedings of the Ninth Annual Conference on Computer Security Applications, pp. 82-91.
47. Takase, T., Uramoto, N. and Baba, K., 2002, “XML digital signature system independent of existing applications,” Proceedings of Symposium on Applications and the Internet Workshops, pp. 150-157.
48. Tolksdorf, R., 2002, "Workspaces: a web-based workflow management system," IEEE Internet Computing, Vol. 6, No. 5, pp. 18-26.
49. Trung, N. Q., Kokoszka, A., Siekierska, K., Pawlak, A., Obrebski, D. and Lugowski, N., 2002, "Organization of a microprocessor design process using Internet-based interoperable workflows," Proceedings of the International Symposium on Quality Electronic Design, pp. 405-410.
50. Zhao, J. L., 2002, “Workflow-centric distribution of organizational knowledge: the case of document flow coordination,” Proceedings of the 35th Annual Hawaii International