您好,欢迎访问三七文档
当前位置:首页 > 商业/管理/HR > 资本运营 > 设备维护外包策略研究
华中科技大学硕士学位论文设备维护外包策略研究姓名:李怀玉申请学位级别:硕士专业:管理科学与工程指导教师:崔南方20041022IIIAbstractEquipmentmaintenanceandrepairisamainoperationinthecorporationespeciallyinthecapitalintensiveindustry.Withaggravatingcompetitioncurrentlyinthemarketandgreatchangeintherunningcircumstance,theoutsourcingofequipmentmaintenanceandrepairisaveryimportantmeansforaplanttodecreasecosts,cutdownrisks,gaincompetitionadvantageandtoconvertmanagementmodel.Outsourcingpatternsplaysaveryimportantroleintheprocessoftheoutsourcingofequipmentmaintenanceandrepair..Outsourcingpatternsiscalledoutsourcingmannerwhichcorporationdecidetoselectintheequipmentmaintenanceandrepairoutsourcing.Researchofoutsourcingpatternsisthepremiseandfoundationofoutsourcingdecisionandacompletelyparticularanalysisofoutsourcingmannerisofgreatimportanceinthestudyofmaintenanceoutsourcing.Aftersummarizingthetheoreticalresearchofoutsourcing,thispaperhasstudiedequipmentmaintenanceoutsourcingpatternsbasedonsource,controlling,procedureandtimewhichareinducedaccordinglyandanalyzedfromtheseaspects:outsourcingreasons,outsourcingrelationships,outsourcingfeatures,obtainmentofagreement,featuresofagreementandgovernancestructures.Thepaperhasbringforwardtwophasesmaintenanceoutsourcingpatternschoicemodelbasedonsystemsengineeringandcorecompetencetheoryandemphaticallyselecteddifferentdecisionfactorsaimsatdifferentindustry,differentcorporations,differentequipmentsanddifferentmaintenances.Concretelyspeaking,forkeyequipmentinthefactoriesthisarticleclaimstrategicoutsourcingpatternandthenchoosetechnologymaturityandvulnerabilityofoutsourcingaspivotalfactorstoconstructdecisionmodel.Forcommonequipmentinthefactoriesthepaperaffirmthatitisappropriatetoadopttacticaloutsourcingpatternandthenselecteconomyofscaleandmanagementlevelaspivotalfactorstoconstructdecisionmodel.Thusthemaintenanceoutsourcingpatternschoicemodelcanbeworkableforcorporation’soutsourcingmanagement.KeyWords:EquipmentmaintenanceoutsourcingOutsourcingpatternChoosingmodel111.11.1.1[1][234]12231.1.2([1996]75)[56]190-38-112334(Competition)(Customer)(Change)()41.270[7](95.0594.98)0.58[8][9][10]51.31.3.161.3.2ITITMary.C.LacityLeslie.P.WillcocksDavid.F.Feeny1994162[11]70%43%12ITITITIT734WTO1.3.3822.12.1.11(PlantManagement)[1213]2()(Maintenance)(Repair)(repair)2.1.22.12.12050(BM:BreakdownMaintenance)2050--2060(PM:PreventiveMaintenance)2060--2070(PM:ProductiveMaintenance)92.12070(Terotechnology&TPM:TotalProductionMaintenance)2080(CBM:ConditionBasedMaintenance)2080(TPQM:TotalPlanningQualitativeMaintence)2090(ACM:AvailabilityCenteredMaintenance)2090(AMAdaptiveMaintenance)(=+)2090(RCM:ReliabilityBasedMaintenance)LauraS.[14](Reactive)(Proactive)(Aggressive)[1516](BM)(Reactive)(PM)(PM)(Proactive)(TPM)(Aggressive)[17][18]EinarLTorivarJ[15][15]INTERNET(ComputerMaintenanceManagementSystemCMMS)10[19]CMMS[17]CMMS(EnterpriseAssetsManagementEAM)()2.22.2.1LohVenkatraman[20](1992)()2.2.2111Quinn(1994)Bailey(2002)[2122]2Quinn[21]Bailey[22]Pagnocelli[23]Dess[24]3Gilley(2000)4Quinn(1994)[21]512[25]AT&T62.2.3Venkatesan(1992)Reve(1990)[26][27](2003)[28]IT[25](2004)[29]KlaasMclendonGainey(1999)13[30]QuinnHilmer(1994)[21]Venkatesan(1992)2.1:(potentialforcompetitiveedge)(degreeofstrategicvulnerability)2.1ViningGloberman(1999)/(GovernanceCosts)[31]ArnoldU.(2000)(coreactivities)(core-closeactivities)(core-distinctactivities)(disposableactivities)[32](2004)[33](1999)IT[34]14IT(2002)[35]ITITITITITIT123IT4(2001)1/(financialresult)2(internalcapability)[36]KevinP.O’Brien[37]Gupta(1994)15[38]KingWilliam.RIS[39]OlsenEllram(1997)Olsen(Parts)(Strategic)(Bottleneck)(Leverage)(Non-critical)[40](2004)[41]NgwenyamaO.K.BrysonN.(1999)[42](2000)Ngwenyama(1999)[43](2004)2[44]Chyan(2000)(2003)(AHP)[45][46](2002)Chyan(2000)16[47]JaakJurison(1995)[48]2.2.4[49]Everest(1997)[50]CrossEarlNelson(19951996)[51][52]Earl(1996)Cross(1995)EarlLacityWillcocks(2000)17[53]Leary(1990)[54]ClemonsHittSnir(2000)IT()[55]AubertPatryRivard(2001)ITIT[56]ITITBahli(2002)[57]Hendry(1995)(Dilution)(Robust)[58]--[59][60][61][62]2.3SandyDunn182X2[63]Benoff[64]Deierlein[65]Mans[66]Finchem[67]KellieJeff[68](2003)[69]4[70]()[72].()[71]1933.1AubertRivardPatry1996[73]ArnettJones1994/PC20[74]Takac1994RetentionTransferTransferGrover1996/[75]Lacity1996Earl1996ITTotalOutsouringInsourcingSelectiveOutsourcingSmartOutsourcing[11][76]LacityWillcocksFeeny199680[77](2002)IT[35]ITIT(1999)[34]Ballow(1999)[78](2001)[36]21;200120/80(20%80%)ABC[36]HenrikBrandes(1994)[79]3.2EAM3.2.1221Alexander(1996)[80](2001)[36]()Venkatesan(1992)[26]()()2352Alexander(1996)Venkatesan(1992)[8026]3.1243.13.2.2Lacity1996Earl1996ITTotalOutsouringInsourcingSelectiveOutsourcingSmartOutsourcing[11][76]LacityWillcocksFeeny1996[11]IT80208020Lacity1996ITIT125233.2.3BMBreakdownMaintenancePMPreventiveMaintenancePDMPredictiveMaintenance2003[72]EAM------2612HowWhenWhat3WhenHow27[72]3.2.41232844.14.2ABC29A10%BC()()4.14.1304.31234.24.231[39]4.4324.34.31AA3390ABCAAA342BB3CC35CC4DDCD364.54.24.44.4371EE2F3GGGF384H3955.1405.212344142[1]GillanSymon.Informationandcommunicationtechnologies
本文标题:设备维护外包策略研究
链接地址:https://www.777doc.com/doc-834077 .html