簡易檢索 / 詳目顯示

研究生: 李郁姸
Yu-Yen Lee
論文名稱: 新創科技公司科技賦能信任之研究 — 以徵用理論為觀點
Exploring IT-enabled Trust in the Development of Technology Entrepreneurship: An Appropriation Theory Perspective
指導教授: 周子銓
Tzu-Chuan Chou
口試委員: 李國光
Gwo-Guang Lee
黃世禎
Sun-Jen Huang
學位類別: 碩士
Master
系所名稱: 管理學院 - 資訊管理系
Department of Information Management
論文出版年: 2022
畢業學年度: 110
語文別: 中文
論文頁數: 116
中文關鍵詞: 資源限制徵用靈巧性拼湊相依性科技賦能信任
外文關鍵詞: Resource constraints, Appropriation, Ambidexterity, Bricolage, Interdependence, IT-enabled, Trust
相關次數: 點閱:190下載:4
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • 隨著工作型態多元化,更多人選擇投入創業,期望自己掌握決策與致富,台 灣每年有約百間的新創公司成立,可看出創業為這世代的一大熱潮。然而創業容 易維持一家公司卻很難,多數的新創公司皆無法創立超過 7 年,因此有多間新創 公司創立的同時,多間新創公司正面臨倒閉。
    長久以來,新創公司存在許多不確定性,期望可以持續長久的發展,一直都 是新創公司的課題。本研究以質化研究為研究方法,經由個案研究之思維,探索 多個案公司如何藉由徵用行動突破困境,進而以科技的能量解決問題、產出更佳 的利益,建立與客戶、合作夥伴和產業間的信任。
    本研究以新創公司東詣科技、獵戶科技和翔探科技為主要的研究對象,詳細 分析多個案公司,如何突破資源限制和信任缺乏的困境,透過現有資源之徵用, 創造新的應用目的與價值或創新資源,以解決資源不足之問題,並進行靈巧性、 拼湊和相依性三種型態操作,以達成公司之目標與逐步建築信任之基石,藉科技 之能量解決問題、帶來更大利益,以取得客戶、合作夥伴和產業間的信賴與之合 作,並建立信任之鏈結;本研究進行個案分析建立一套「新創科技公司徵用行動 信任建立之架構」,提供給新創公司在長期發展中,面臨困境時可結合科技、資 源徵用的策略參考。


    With the diversification of work format, more people choose to start their own business rather than work in the office. People are inclined to making their own decision and hoping to make a fortune by starting their own business. There are hundreds of start-up companies established every year in Taiwan, which indicates that entrepreneurship is the trend for this generation. However, it is easy to start a business, but running one is not the same. Most start-up companies can not last for more than seven years. Therefore, start-up companies need to recognize that they face the threat of closure at the moment of establishment.
    Due to the uncertainties of start-up companies, the expectation of sustainable development has always been a goal for them. Qualitative research is the research method used in this study. Through case study, the study explores how multi-case companies overcome obstacles by appropriating. Furthermore, the study aims to solve problems and make better benefits by using technology to build trust with customers, partners, and companies in the industry.
    MMXtion Technology, Oriongo Technology, and Aeroprobing Technology are the main research subjects. The study analyzes how these companies overcome the obstacles such as resource constraints and lack of trust by appropriating the resources at hand to create new value, applications, or innovative resources. There are three types of activities: ambidexterity, bricolage, and interdependence. Adopting these to achieve the company's goals and building trust step by step are essential. It hopes to gain trust, cooperation opportunities, and links of trust by using information technology. This case study is to develop an "IT-enabled trust with action of appropriation framework in the entrepreneurship." It provides a strategy for start-up companies to combine technology and resource appropriation when they face difficulties in a long-term development.

    摘要 I ABSTRACT II 致謝 III 目錄 IV 表目錄 VII 圖目錄 VIII 第一章、緒論 1 1.1 研究背景與動機 1 1.2 研究問題與目的 2 1.3 研究範圍與流程 4 1.4 論文架構 6 第二章、文獻探討 7 2.1 環境限制 7 2.1.1 資源限制(Resource Constraints) 7 2.1.2 信任缺乏對新創公司的影響 8 2.2 徵用(APPROPRIATION) 11 2.2.1 徵用定義 11 2.3 靈巧性(AMBIDEXTERITY) 14 2.3.1 靈巧性之定義 14 2.4 拼湊(BRICOLAGE) 16 2.4.1 拼湊定義 16 2.5 相依性(INTERDEPENDENCE) 18 2.5.1 相依性定義 18 2.6 科技賦能 20 2.6.1 科技賦能定義 20 2.7 信任 21 2.7.1 信任的定義 21 2.7.2 信任與不信任的區別 22 第三章、研究方法與架構 24 3.1 研究方法 24 3.1.1 質化研究(Qualitative Research) 25 3.1.2 個案研究(Case Study) 25 3.2 研究架構 27 3.3 研究觀察重點 32 3.4 研究對象 33 3.5 資料蒐集與分析 34 3.5.1 資料搜集 34 3.5.2 資料分析 35 第四章、個案描述 39 4.1 新創公司之資源限制與信任缺乏 39 4.2 東詣科技 41 4.2.1 個案公司介紹 41 4.2.2 Rainmaking Innovation 盛宇創新股份有限公司 41 4.2.3 Petzzo 好好寵 42 4.3 獵戶科技 44 4.3.1 個案公司介紹 44 4.3.2 個案公司發展歷程 45 4.4 翔探科技 47 4.4.1 個案公司介紹 47 4.4.2 個案公司發展歷程 47 第五章、個案分析 50 5.1 東詣科技 50 5.1.1 資源限制與信任缺乏 50 5.1.2 徵用行動 52 5.1.3 科技賦能信任 59 5.1.4 個案分析小結 60 5.2 獵戶科技 63 5.2.1 資源限制與信任缺乏 63 5.2.2 徵用行動 64 5.2.3 科技賦能信任 70 5.2.4 個案分析小結 71 5.3 翔探科技 75 5.3.1 資源限制與信任缺乏 75 5.3.2 徵用行動 76 5.3.3 科技賦能信任 81 5.3.4 個案分析小結 83 5.4 個案間分析與總結 87 第六章、研究結論與建議 98 6.1 結論與研究貢獻 98 6.2 研究限制與未來研究方向 102 參考文獻 103 中文部分 103 英文部分 104 網路部分 115

    中文部分
    1. 陳向明,2002,社會科學質的研究。五南圖書出版股份有限公司。

    英文部分
    1. Schneider, A. (2006). Appropriation as Practice: Art and Identity in Argentina., Springer.
    2. Dourish, P. (2003). The Appropriation of Interactive Technologies: Some Lessons from Placeless Documents. Computer Supported Cooperative Work (CSCW), 12(4), 465–490.
    3. Voss, G. B., Sirdeshmukh, D., & Voss, Z. G. (2008). The effects of slack resources and environmental threat on product exploration and exploitation. Academy of Management Journal, 51(1), 147–164.
    4. Dahlander, L. (2005). Appropriation and Appropriability in Open Source Software. International Journal of Innovation Management, 09(03), 259–285.
    5. Baker, T., Miner, A. S., & Eesley, D. T. (2003). Improvising firms: bricolage, account giving and improvisational competencies in the founding process. Research Policy, 32(2), 255–276.
    6. Baker, T., & Nelson, R. E. (2005). Creating Something from Nothing: Resource Construction through Entrepreneurial Bricolage. Administrative Science Quarterly, 50(3), 329–366.
    7. March, J. G. (1991). Exploration and Exploitation in Organizational Learning. Organization Science, 2(1), 71–87.
    8. O’Reilly, C. A., & Tushman, M. L. (2013). Organizational Ambidexterity: Past, Present, and Future. Academy of Management Perspectives, 27(4), 324–338.
    9. Raisch, S., & Birkinshaw, J. (2008). Organizational Ambidexterity: Antecedents, Outcomes, and Moderators. Journal of Management, 34(3), 375–409.
    10. Cui, T., Wu, Y., & Tong, Y. (2018). Exploring ideation and implementation openness in open innovation projects: IT-enabled absorptive capacity perspective. Information & Management, 55(5), 576–587.
    11. Joshi, K. D., Chi, L., Datta, A., & Han, S. (2010). Changing the Competitive Landscape: Continuous Innovation Through IT-Enabled Knowledge Capabilities. Information Systems Research, 21(3), 472–495.
    12. Nevo, & Wade. (2010). The Formation and Value of IT-Enabled Resources: Antecedents and Consequences of Synergistic Relationships. MIS Quarterly, 34(1), 163.
    13. Vom Brocke, J., Schmid, A. M., Simons, A., & Safrudin, N. (2020). IT-enabled organizational transformation: a structured literature review. Business Process Management Journal
    14. CHO, J. (2006). The mechanism of trust and distrust formation and their relational outcomes. Journal of Retailing, 82(1), 25–35.
    15. Das, T. K., & Teng, B.-S. (1998). Between Trust and Control: Developing Confidence in Partner Cooperation in Alliances. The Academy of Management Review, 23(3), 491.
    16. Wang, Y. D., & Emurian, H. H. (2005). An overview of online trust: Concepts, elements, and implications. Computers in Human Behavior, 21(1), 105–125.
    17. Alfred, S. & Wen, X. (2013). The Importance of Trust in the Development of Entrepreneurship.
    18. Mickiewicz, T. & Rebmann, A. (2020). Entrepreneurship as Trust. Foundations and Trends® in Entrepreneurship, 16(3), 244-309.
    19. Bar, F., Weber, M. S., & Pisani, F. (2016). Mobile technology appropriation in a distant mirror: Baroquization, creolization, and cannibalism. New Media & Society, 18(4), 617–636.
    20. Wagner, S. M., Eggert, A., & Lindemann, E. (2010). Creating and appropriating value in collaborative relationships. Journal of Business Research, 63(8), 840–848.
    21. Stavraki, G., Plakoyiannaki, E., & Clarke, J. (2018). The appropriation cycle: novice and expert consumers. European Journal of Marketing.
    22. Amoah, F., Radder L. & Van Eyk M. (2017). Experience composite worth: A combination of experience quality and experience value. Southern African Business Review, 21, 292-310.
    23. Van Lange, P. A. M., & Balliet, D. (2015). Interdependence theory. APA handbook of personality and social psychology, 3, 65–92.
    24. Gundlach, G. T., & Cadotte, E. R. (1994). Exchange Interdependence and Interfirm Interaction: Research in a Simulated Channel Setting. Journal of Marketing Research, 31(4), 516.
    25. Lenox, M. J., Rockart, S. F., & Lewin, A. Y. (2006). Interdependency, Competition, and the Distribution of Firm and Industry Profits. Management Science, 52(5), 757–772.
    26. Victor, B., & Blackburn, R. S. (1987). Interdependence: An alternative conceptualization. The Academy of Management Review, 12(3), 486–498.
    27. An, W., Xu, Y., & Zhang, J. (2018). Resource constraints, innovation capability and corporate financial fraud in entrepreneurial firms. Chinese Management Studies, 12(1), 2–18.
    28. Dawa, S. G. (2018). Resource constraints and sustainable entrepreneurship in sub-Saharan Africa: An effectual view, PhD thesis. University of Pretoria, Pretoria.
    29. Neuman, W. Lawrence (2017). Social Research Methods: Qualitative and Quantitative Approaches. Pearson Education Inc., 7th ed.
    30. Yin, R. K. (2017). Case Study Research and Applications: Design and Methods. SAGE Publications.
    31. Saša Baškarada (2014). Qualitative Case Study Guidelines. The Qualitative Report., 19(40), 1-18.
    32. Runeson, P., & Höst, M. (2008). Guidelines for conducting and reporting case study research in software engineering. Empirical Software Engineering, 14(2), 131–164.
    33. Karis K. F. Cheng & Alison Metcalfe (2018). Qualitative Methods and Process Evaluation in Clinical Trials Context: Where to Head to? International Journal of Qualitative Methods, 17, 1-4.
    34. Baucus, M.S. and Near, J.P. (1991). Can illegal corporate behavior be predicted? An event history analysis, Academy of Management Journal, 34(1), 9-36.
    35. Chakravarthy, B.S. (1982). Adaptation: a promising metaphor for strategic management. Academy of Management Review, 7(1), 35-44.
    36. Bilal, A.R., Khan, A.A. and Akoorie, M.E.M. (2016). Constraints to growth: a cross country analysis of Chinese, Indian and Pakistani SMEs. Chinese Management Studies, 10(2), 365-386.
    37. Lin, S. and Lasserre, P. (2015). Entrepreneurship research amid transitional economies: domains and opportunities. Chinese Management Studies, 9(2), 123-129.
    38. Ruef, M., Aldrich, H. E., & Carter, N. M. (2003). The structure of founding teams: Homophily, strong ties, and isolation among US entrepreneurs. American Sociological Review, 195-222.
    39. Penrose, E. G. (1959). The theory of the growth of the firm. New York: Wiley.
    40. Damanpour, F. (1991). Organizational innovation: a meta-analysis of effects of determinants and moderators. Academy of Management Journal, 34(3), 555-590.
    41. Dougherty, D. (1992). Interpretive barriers to successful product innovation in large firms. Organization Science, 3(2), 179-202.
    42. Paeleman, I. and Vanacker, T. (2015). Less is more, or not? On the interplay between bundles of slack resources, firm performance and firm survival. Journal of Management Studies, 52(6), 819-848.
    43. Wu, P., Gao, L., Chen, Z. and Li, X. (2016). Managing reputation loss in China: in-depth analyses of financial restatements. Chinese Management Studies, 10(2), 312-345.
    44. Finney, H.C. and Lesieur, H.R. (1982). A contingency theory of organization crime”, in Bacharach, S.B. (Ed.). Research in the Sociology of Organizations, JAI Press, Greenwich, CT, 255-299.
    45. Vaughan, D. (1983). Controlling Unlawful Organizational Behavior. University of Chicago Press, Chicago.
    46. Rao, H. and Drazin, R. (2002). Overcoming resource constraints on product innovation by recruiting talent from rivals: a study of the mutual fund industry. Academy of Management Journal, 45(3), 491-507.
    47. Situmeang, F.B., Gemser, G., Wijnberg, N.M. and Leenders, M.A. (2016). Risk-taking behavior of technology firms: the role of performance feedback in the video game industry. Technovation, 54, 22-34.
    48. Mishina, Y., Dykes, B.J., Block, E.S. and Pollock, T.G. (2010). Why ‘good’ firms do bad things: the effects of high aspirations, high expectations, and prominence on the incidence of corporate illegality. Academy of Management Journal, 53(4), 701-722.
    49. Katila, R. and Shane, S. (2005). When does lack of resources make new firms innovative? Academy of Management Journal, 48(5), 814–829.
    50. Scopelliti, I., Cillo, P., Busacca, B., & Mazursky, D. (2014). How do financial constraints affect creativity? Journal of Product Innovation Management, 31(5), 880–893.
    51. Eshima, Y., & Anderson, B. S. (2017). Firm growth, adaptive capability, and entrepreneurial orientation. Strategic Management Journal, 38(3), 770–779.
    52. Shane, S., & Venkataraman, S. (2000). The Promise of Entrepreneurship as a Field of Research. Academy of Management Review, 25(1), 217-226.
    53. Venkataraman, S. (1997). The Distinctive Domain of Entrepreneurship Research. London: Jai Press
    54. Fukuyama, F. (1995). Trust—The social virtues and the creation of prosperity. New York: Free Press.
    55. Dwyer, F. R., Paul, H.S. and Sejo, O. (1987). Developing buyer-seller relationships. I. Marketing, 51, 11-27.
    56. Luhmann, N. (2000). Vertrauen: ein Mechanismus der Reduktion sozialer Komplexität. Stuttgart, Germany: Lucius & Lucius.
    57. Zand, D. E. (1972). Trust and Managerial Problem Solving. Administrative Science Quarterly, 17, 229-239.
    58. Anderson J. C. and Narus J. A. (1990). A Model of Distributor Firm and Manufacturer Firm Working Partnerships. Journal of Marketing, 54(1), 42-58.
    59. Levin, RC, AK Klevorick, R Nelson and S Winter (1987). Appropriating the returns from industrial research and development. Brookings Papers on Economic Activity, (3), 783–831.
    60. Von Hippel, E. A., & von Krogh, G. (2009). Open Source Software and the “Private-Collective” Innovation Model: Issues for Organization Science. Organization Science, 14(2), 209-223.
    61. De Souza e Silva A, Sutko DM, Salis FA, et al. (2011). Mobile phone appropriation in the favelas of Rio de Janeiro, Brazil. New Media & Society.
    62. Sey, A. (2011). “We use it different, different”: making sense of trends in mobile phone use in Ghana. New Media & Society, 13(3), 375–390.
    63. Jamison, A. and Hård, M. (2003). The story-lines of technological change: innovation, construction and appropriation. Technology Analysis & Strategic Management, 15(1), 81–91.
    64. Hård, M. and Jamison, A. (2013). Hubris and Hybrids: A Cultural History of Technology and Science. London: Routledge.
    65. Jones, M. and Twidale, M. (2005). What’s in a name? Exploring the connections between abstraction and appropriation. International Reports on Socio-Informatics, 2(2), 43–47.
    66. Fang, E., Palmatier, R. W., Evans, K. R. (2008). Influence of customer participation on creating and sharing of new product value. J Acad Mark Sci, 36(3), 36-322.
    67. Palmatier, R. W. (2008). Relationship marketing. Cambridge, MA: Marketing Science Institute
    68. Palmatier, R. W., Dant, R. P., Grewal, D., Evans, K. R. (2006). Factors influencing the effectiveness of relationship marketing: a meta-analysis. J Mark, 70(4), 53–136.
    69. Kumar, N., Scheer, L. K., Steenkamp, JB. E. M. (1995). The effects of supplier fairness on vulnerable resellers. J Mark Res, 32(1), 54–65.
    70. Morgan, R. M., Hunt, S. D. (1994). The commitment–trust theory of relationship marketing. J Mark, 58(3), 20–38.
    71. Ghosh, M., John, G. (1999). Governance value analysis and marketing strategy. J Mark, 63, 45-131.
    72. Lindgreen, A., Vanhamme, J. & Beverland, M. B. (2009). Memorable customer experiences. Farnham, Surrey: Gower Publishing.
    73. Loureiro, S.M.C. (2014). The role of the rural tourism experience economy in place attachment and behavioural intentions. International Journal of Hospitality Management, 40, 1–9.
    74. Schmitt, B. (2010). Experiential marketing: Concepts, frameworks and consumer insights. Foundation of Trends in Marketing, 5(2), 55–112.
    75. Prahalad, C. K. & Ramaswamy, V. (2004). Co-creation experiences: The next practice in value creation. Journal of Interactive Marketing, 8(3), 5–14.
    76. Duncan, R. B. (1976). The ambidextrous organization: Designing dual structures for innovation. The Management of Organization, 1, 167-188.
    77. Gibson, C. B., & Birkinshaw, J. (2004). The antecedents, consequences and mediating role of organizational ambidexterity. Academy of Management Journal, 47, 209-226.
    78. Tushman, M. L., & O’Reilly, C. A. (1996). Ambidextrous organizations: Managing evolutionary and revolutionary change. California Management Review, 38, 8-30.
    79. Thompson, J. D. (1967). Organizations in action: Social sciences bases of administrative theory. New York: McGraw-Hill.
    80. Winter, S. G. (1971). Satisficing, Selection, and the Innovating Remnant. Quarterly Journal of Economics, 85, 237-261.
    81. Levinthal, D. A. & March, J. G. (1981). A Model of Adaptive Organizational Search. Journal of Economic Behavior and Organization, 2, 307-333.
    82. Lévi-Strauss, C. (1967). The Savage Mind. Chicago: University of Chicago Press.
    83. Thibaut, J. W., & Kelley, H. H. (1959). The social psychology of groups. New York, NY: Wiley.
    84. Fiske, S. T., Gilbert, D. T., & Lindzey, G. (2010). Handbook of social psychology (5th ed.). New York, NY: Wiley.
    85. Porter, M. (1996). What is strategy? Harvard Bus. Rev. (November December) 61-78.
    86. Levinthal, D. A. (1997). Adaptation on rugged landscapes. Management Sei., 43(7), 934-950.
    87. Rivkin, J. (2000). Imitation of complex strategies. Management Sei., 46(6), 824-844.
    88. Siggelkow, N. (2002). Evolution toward fit. Admin. Sei. Quart., 47(1), 125-159.
    89. Pfeffer, J., & Salancik, G. R. (1978). The external control of organizations: A resource dependence perspective. New York: Harper & Row.
    90. Tedeschi, J. T., Barry, S. & Thomas, B. (1973). Conflict, Power and Games. Chicago: Aldine.
    91. Cadotte, E. R. & Louis, S. (1979). A Process Model of Interorganizational Relations in Marketing Channels. Research in Marketing, 2, Jagdish Sheth, ed. Greenwich, CT: JAI Press, Inc.
    92. Barua, A., Konana, P., Whinston, A. B. & Yin, F. (2004). An empirical investigation of net-enabled business value. MIS Quarterly, 28(4), 585-620.
    93. Powell, T.C. & Dent-Micallef, A. (1997). Information technology as competitive advantage: the role of human, business, and technology resources. Strategic Management Journal, 18(5), 375-405.
    94. Brynjolfsson, E. & Hitt, L. M. (2000). Beyond computation: information technology, organizational transformation and business performance. Journal of Economic Perspectives, 14(4), 23-48.
    95. Melville, N., Kraemer, K.L. & Gurbaxani, V. (2004). Review: information technology and organizational performance: an integrative model of IT business value. MIS Quarterly, 28(2), 283-322.
    96. Cooper, R.B. (2000). Information technology development creativity: a case study of attempted radical change. MIS Quarterly, 24(2), 245-276.
    97. Pillay, J., Hackney, R. & Braganza, A. (2012). Informing strategic IS change: towards a ‘meta- learning’ framework. Journal of Strategic Information Systems, 21(1), 58-71.
    98. Silva, L. & Hirschheim, R. (2007). Fighting against windmills: strategic information systems and organizational deep structures. MIS Quarterly, 31(2), 327-354.
    99. McKnight, D. H. & Norman L. C. (2001). Trust and Distrust Definitions: One Bite at a Time. Trust in Cyber-societies: Integrating the Human and Artificial Perspectives. Berlin, Germany: Springer, 27–54.
    100. Sirdeshmukh, D., Singh J. & Sabol B. (2002). Consumer Trust, Value, and Loyalty in Relational Exchanges. Journal of Marketing, 66, 15–37.
    101. Gambetta, D. (1988). Trust: Making and Breaking Cooperative Relations. Oxford: Blackwell.
    102. Sabel, C. F. (1993). Studied trust: Building new forms of cooperation in a volatile economy. Human Relations, 46 (9), 1133–1170.
    103. Fukuyama, F. (1995). Trust—The social virtues and the creation of prosperity. New York: Free Press.
    104. Dollinger, M. J. (2003). Entrepreneurship: Strategies and Resources. Upper Saddle River: Prentice Hall.
    105. Giffin, K. (1967). The contribution of studies of source credibility to a theory of interpersonal trust in the communication process. Psychological Bulletin, 68, 20-104.
    106. Rotter, J. (1980). Interpersonal trust, trustworthiness and gullibility. American Psychologist, 35, 1–7.
    107. Mayer, R. C., Davis, J. H., & Schoorman, F.D. (1995). An integrative model of organizational trust. Academy of Management Review, 20, 709-734.
    108. Rousseau, D.M., Sitkin, S., Burt, R.S. & Camerer, C. (1998). Not so different after all: A cross-discipline view of trust. Academy of Management Review, 23, 393–404.
    109. March, J.G. & Shapira, Z. (1987). Managerial perspectives on risk and risk taking. Management Science, 33, 18-1404.
    110. Sitkin, S.B. & Pablo, A.L. (1992). Reconceptualizing the determinants of risk behavior. Academy of Management Review, 17, 9–38.
    111. Lewicki, R. J., McAllister, D. J. & Bies, R. J. (1998). Trust and Distrust: New Relationships and Realities. Academy of Management Review, 23(3), 438–458.
    112. Kramer, R. M. (1999). Trust and Distrust in Organizations: Emerging Perspectives, Enduring Questions. Annual Review of Psychology, 50, 569–598.
    113. Harding, R. (1993). The Street-level Epistemology of Trust. Politics & Society, 21, 505–529.
    114. Robinson, J. P., Shaver, P. R. & Wrightsman, L. S. (1991). Measures of Personality and Social Psychological Attitudes. San Diego: Academic Press.
    115. Luhmann, N. (1979). Trust and Power. Chichester, England: Wiley.
    116. Sitkin, S. B. & Roth, N. L. (1993). Explaining the Limited Effectiveness of Legalistic Remedies for Trust/Distrust. Organization Science, 4(3), 367–392.

    網路部分
    1. Petzzo | 寵牠、懂牠、守護牠官方網站。檢自:https://www.petzzo.com.tw/
    2. 東詣科技: 人機協作|MMXtion 官方網站。檢自:https://www.mmxtion.com.tw/
    3. Rainmaking Innovation官方網站。檢自:https://rainmaking.tw/aboutus/
    4. 今周刊(2021)。汪喵臉部辨識發威 寵物險理賠只要3天。檢自:https://www.businesstoday.com.tw/article/category/183015/post/202104140039/
    5. 經濟日報(2021)。明台產險首創寵物險一鍵理賠通知 簡化申請流程。檢自:https://money.udn.com/money/story/5617/5157894
    6. 獵戶科技 - 新世代室內定位領導品牌官方網站。檢自:https://oriongo.me/
    7. 聯合報(2021)。台科大生開發精準定位系統 獲100萬元創業獎金。檢自:https://udn.com/news/story/6929/5603561
    8. 工商時報(2020)。獵戶科技「室內定位」進軍智慧城市生態系統。檢自:https://ctee.com.tw/industrynews/technology/327305.html
    9. 翔探科技股份有限公司官方網站。檢自:https://aeroprobing.com/
    10. 工商時報(2021)。翔探科技由寶島出發 深耕海內外商業無人機服務市場。檢自:https://ctee.com.tw/industrynews/401955.html
    11. INSIDE(2016)。[2016 未來商務] 不與大疆、3DR 等大廠硬碰硬,台廠力拼「競速無人機」。檢自:https://www.inside.com.tw/article/6174-2016-future-commerce-drone
    12. 掌握企業經營祕訣 從活用專案管理開始。檢自:https://www.pm-mag.net/Article/article_content.aspx?Tid=882
    13. Experience Appropriation: A Writer’s Responsibilities. 檢自http://expandingtherainbow.com/2016/10/experience-appropriation-a-writers-responsibilities/
    14. Dictionary by Merriam-Webster: America's most-trusted online. 檢自:https://www.merriam-webster.com/dictionary/relationship

    QR CODE