摘要: | 軍事單位(國軍)在民國98年開始推行風險管理資訊化,起初由人工紙本的方式來進行,到後來引進ORMIT作業風險整合管理套裝軟體(Operational Risk Management Integration Tool),以資訊科技輔助人工的方式來進行風險控管,國軍使用至近已有10多年,該系統在多年使用經驗的情況下,因不可抗拒因素而失去奧援,進而改成ORMI風險作業(第二階段風險評估)是否影響該組織運作;是本研究關注的重點。基於組織內部人員所屬職務、專業各不相同,本研究引用Leavitt(1965)的鑽石模型(Leavitt’s Diamond Model)來做為分析組織運作的基礎。 本研究以質性個案研究法的方式,深入訪談軍警消單位因其職務上的特殊性,在執行危險性較高的工作時,風險控管的方式與一般民間企業差異甚大,不能因為危險性高而拒絕該項任務執行,因此,本研究利用張文玲(2007)提出鑽石模型之組織、任務、人員及技術等四大構面,來探討國軍在兩個時期對於風險評估,組織是如何進行實務整合,分析出對於特定之工作(高風險)的軍警消單位,對於資訊系統的導入不單只是驗證系統功能,需包含政策推動及納編各地區專業人員進行先期研討,在實務上亦可以本研究為樣本,協助未來軍警消單位,導入新的資訊科技及新政策的推動。 The military (The Republic of China Armed Forces) began to implement risk management informatization in 1999. In the beginning, system is working with manual paperwork, after introduction of an ORMIT(Operational Risk Management Integration Tool), becomes to use technology of information to help manual work for deal with risk control. The military has been using it for over 10 years. In the case of many years of experience, because the force majeure caused losing of support from other country, changed to ORMI risk operation (the second stage). Whether the risk assessment affects the function of the organization operation is the focus of this study. According to the different position and profession of the people in the squad, this study uses Leavitt's Diamond Model(Leavitt's Diamond Model in 1965)as the basis for analyzing organization operations. This study uses qualitative methods of case study to do the depth interviews with military, police and firemen, and know the specificity of different positions. When performing high-risk work, the way of risk control is very different from ordinary private enterprises, the task cannot be denied due to high risk. Therefore, this study uses Zhang Wenling(2007)proposes four structures of the diamond model, including of organization, tasks, personnel and technology to discuss how the military conducts practical of risk assessment between two periods. Analysis specific jobs (high risk) of military, police and firemen units, we can know the import of the information system what is not only verify the function of the system, but also need to include policy promotion and recruit professionals from various regions to conduct preliminary discussions, In practical, this study can also be used as a sample to assist military, police and firemen units to introduce new information technology and promote new policies in the future. |