跳到主要內容

臺灣博碩士論文加值系統

(216.73.216.110) 您好!臺灣時間:2025/09/29 23:55
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

我願授權國圖
: 
twitterline
研究生:蕭丞甫
研究生(外文):Hsiao, Cheng-Fu
論文名稱:探討消費者取得線上盜版音樂之行為研究
論文名稱(外文):Exploring Consumer Behavior of Online Music Piracy
指導教授:陶蓓麗陶蓓麗引用關係
學位類別:碩士
校院名稱:國立嘉義大學
系所名稱:行銷與運籌研究所
學門:商業及管理學門
學類:行銷與流通學類
論文種類:學術論文
論文出版年:2010
畢業學年度:99
語文別:中文
中文關鍵詞:線上音樂盜版計畫行為理論態度意圖
相關次數:
  • 被引用被引用:0
  • 點閱點閱:351
  • 評分評分:
  • 下載下載:0
  • 收藏至我的研究室書目清單書目收藏:0
在今日,線上盜版音樂已經對音樂產業產生很大的威脅,所以本研究希望探究消費者取得線上盜版音樂的行為態度和意圖,並推測可能原因以尋求解決之道。而在本研究中,除了延用TPB模式來探討行為的態度、主觀規範及控制認知會如何影響取得線上盜版音樂的行為意圖,還繼續討論道德問題(後果的嚴重性)、認知被告風險和線上盜版音樂的屬性滿意度會如何影響取得線上盜版音樂的行為態度。

本研究在線上發放問卷後,收集到了304份有效樣本來分析,最後結果證實在線上盜版音樂的議題領域下,TPB模式中的行為態度及行為控制認知的假設依然成立,但是主觀規範的假設並不成立,可能是盜版行為已經普遍的被接受,故大家不在乎彼此間的盜版行為。此外,在探討影響行為態度的相關因素中,後果的嚴重性和屬性的滿意度是有顯著影響著取得線上盜版音樂的態度。由以上兩點來看,音樂產業似乎很難利用再教育使消費者不該盜版,建議要以加強音樂品質來使消費者想要購買正版音樂,或是利用藝人宣告無法再出片的嚴重性來根本性改善消費者對音樂盜版的態度,使其線上盜版音樂的行為能有效被終止。

目錄

致謝 I
摘要 II
Abstract III
目錄 IV
表目錄 VI
圖目錄 VII
壹、序論 1
一、研究背景與動機 1
二、研究目的與問題 4
貳、文獻回顧 5
一、盜版 5
二、音樂盜版 7
三、計劃行為理論(Theory of Planned Behavior, TPB) 10
四、道德決策 17
五、認知風險 20
六、滿意度 23
参、研究模式 25
一、主觀規範(Subjective Norms) 27
二、行為態度(Attitude) 28
三、行為控制認知(Perceived Behavioral Control) 29
四、後果的嚴重性(Magnitude of Consequence) 30
五、被告風險(Prosecution Risk) 31
六、屬性的滿意度(Attributive Satisfaction) 32
肆、研究方法 34
一、研究標的與對象 34
二、變數衡量 35
三、問卷設計 36
四、前測與試測 42
五、抽樣方法 43


伍、資料分析 44
一、基本敘述統計 44
(一)樣本的敘述統計 44
(二)各變項的敘述性統計 46
二、研究假說檢定 48
(一)衡量模型 48
(二)結構模型 52
陸、結論與建議 55
一、研究結果 55
二、討論與結論 56
(一)行為的主觀規範對取得線上盜版音樂的行為意圖之影響 56
(二)取得線上盜版音樂的行為態度對取得線上盜版音樂的行為意圖之影響 56
(三)行為的控制認知對取得線上盜版音樂的行為意圖之影響 57
(四)認知後果的嚴重性對取得線上盜版音樂的行為態度之影響 57
(五)認知被控告的風險對取得線上盜版音樂的行為態度之影響 57
(六)屬性滿意度對取得線上盜版音樂的行為態度之影響 58
三、研究貢獻 58
(一)學界方面 58
(二)產業方面 59
四、研究限制 59
(一)樣本方面 59
(二)研究本身方面 60
五、未來研究方向 60
參考文獻 62
一、中文文獻 62
二、英文文獻 63
附錄A 75



圖目錄

圖2-1 音樂盜版的態度及意圖模式 (CHIOU ET AL., 2005) 9
圖2-2 計畫行為理論 (FISHBIEN & AJZEN, 1975) 12
圖2-3 軟體盜版模式 (PEACE ET AL., 2003) 16
圖3-1 研究架構 26
圖5-1 PLS整體結構模型與控制變數分析 54



表目錄

表2-1 計畫行為理論之變數定義及說明 13
表2-2 偶發事件決策模型之變數定義 18
表2-3 議題-風險-判斷模型之認知風險變數說明 22
表4-1 問項之參考文獻 40
表5-1 樣本特徵描述 45
表5-2 各變項的敘述統計表 47
表5-3 CROSS LOADING值 49
表5-4 PLS信度分析 50
表5-5 AVE平方根值 51
表5-6 PLS 假說檢定結果 53
表6-1 研究假說驗證結果 55




參考文獻

一、 中文文獻

1. 宋文娟,2001,「一種質量並重的研究法-德菲法在醫務管理學研究領域之應用」,醫務管理,第2卷2期,頁11-20。
2. 李正國,2003,「盜版光碟犯罪行為現況分析與建議」,智慧財產季刊,44 期,頁59-63。
3. 李利芳,趙傑,2006,「Rational Analysis on Relationship between Ethics and Law in Legal Ethics」,太原師範學院學報,3 月號。
4. 李昇穎、陳怡璇、陳郁佳、盧欣妤、羅淑汝,2006,「台灣線上音樂之商業模式探討」,網路社會學通訊期刊52。
5. 汪志堅,2005,「盜版商品購買意願影響因素之研究:以音樂雷射唱片為例」,行銷評論,第2卷第4期,頁491-522。
6. 何雍慶、張威龍、林泰安,2004,「行銷道德強度、知覺風險與道德判斷力對購買意願之影響:以大專學生之MP3盜錄為例」,『管理思維與實務』學術研討會論文集,頁90-105,台北。
7. 林東清,2005,第二版,資訊管理,台北,智勝文化。
8. 劉耀仁,2008,台灣音樂著作盜版防治政策工具之系統動態研究,國立交通大學科技管理研究所博士論文。
9. 謝鴻源,2004,本地唱片業者如何因應當前主要問題之研究,國立交通大學傳播所碩士論文。

二、 英文文獻

1. Ajzen I (1985), “From Intentions to Behavior: A Theory of Planned Behavior,” in I. J. K. J. B. (eds.), Action-Control: From Cognition to Behavior (Spinger, Heidelberg), pp. 11–39.
2. Ajzen, I (1991), “The Theory of Planned Behavior,” Organizational Behavior and Human Decision Processes 50(1), pp. 179–211.
3. Ajzen, I. (2002), “Perceived Behavioral Control, Self-Efficacy, Locus of Control, and the Theory of Planned Behavior,” Journal of Applied Social Psychology 32, pp. 1-20.
4. Anderson, R. and D. Johnson, et al. (1993), “Using the New ACM Code of Ethics in Decision Making,” Communications of the ACM 36(2), pp. 98–107.
5. Ang, S. H., P. S. Cheng, E. A. C. Lim and S. K. Tambyah (2001), “Spot the Difference: Consumer Responses Towards Counterfeits,” Journal of Consumer Marketing 18(3), pp. 219-235.
6. Banerjee, D. and T. P. Cronan, et al. (1998), “Modeling IT Ethics: A Study in Situational Ethics,” MIS Quarterly 22(1), pp. 31–60.
7. Bansal, H. S., Voyer, P. A. (2000), “Word-of-Mouth Processes within a Services Purchases Decision Context,” Journal of Service Research 3, pp. 166-177.
8. Bauer, R. A. (1960), “Consumer Behavior as Risk Taking, Dynamic Marketing for a Changing World,” American Marketing Association, Chicago, pp. 389-398.
9. Beck, L. and I. Ajzen (1991), “Predicting Dishonest Actions Using the Theory of Planned Behavior,” Journal of Research in Personality 25(3), pp. 285–301.
10. Bolton, R. N (1998), “A Dynamic Model of the Duration of the Customer’s Relationship with A Continuous Service Provider: The Role of Satisfaction,” Marketing Science 17, pp. 45-65.
11. Bolton, R. N. and K. N. Lemon (1999), “A Dynamic Model of Customers’ Usage of Services: Usage as an Antecedent and Consequence of Satisfaction,” Journal of Marketing Research 36, pp. 171-186.
12. Bhattacherjee, A. (2001) “Understanding Information Systems Continuance: An Expectation Confirmation Model,” MIS Quarterly 25(3), pp. 351-370.
13. Bhattacharjee, S. and R. Gopal, et al. (2003), “Digital Music and Online Sharing: Software Piracy 2.0,” Communication of the ACM 46(7), pp. 107–111.
14. Bhattacharjee, S. and R. Gopal, et al. (2006), “Consumer Search and Retailer Strategies in the Presence of Online Music Sharing,” Journal of Management Information Systems 23(1), pp. 129–141.
15. Bhattacharjee, S. and R. Gopal, et al. (2006), “What Happened to Payola? An Empirical Analysis Online Music Sharing,” Decision Support Systems 42(1), pp. 104–110.
16. Chang, M. K. (1998), “Predicting Unethical Behavior: A Comparison of the Theory of Reasoned Action and the Theory of Planned Behavior,” Journal of Business Ethics 17(16), pp. 1825–1834.
17. Chellappa, R. and S. Shivendu (2003), “Economic Impacts of Variable Technology Standards for Movie Piracy in a Global Context,” Journal of Management Information Systems 20(2), pp. 137–149.
18. Cheng, H. and R. Sims, et al. (1997), “To Purchase or to Pirate Software: An Empirical Study,” Journal of Management Information Systems 4, pp. 49–60.
19. Chiou, J. S., C. Y. Huang and H. H. Lee (2005), “The Antecedents of Music Piracy Attitudes and Intentions,” Journal of Business Ethics 57(2), pp. 161–174.
20. Chiou, J. S. and Shen, C. C. (2006), “The effects of satisfaction, opportunism, and asset specificity on consumers’ loyalty intention toward internet portal sites,” International Journal of Service Industry Management 17(1), pp. 7-22.
21. Colbert, F., Tomiuk, M.-A., Hwang, H., & Me’nard, M. (2003). An investigation into the effects of Napster’s demise on the purchase of music CD’s. Proceedings of the 7th International Conference on Arts and Cultural Management. Milan, Italy: Universita` Commerciale Luigi Bocconi (electronic document).
22. Connolly, Marie and Alan B. Krueger (2005), “Rockonomics: The Economics of Popular Music,” in Handbook of the Economics of Arts and Culture, V.A. Ginsburgh and D. Throsby, eds. Amsterdam: North Holland, pp. 667–720.
23. Conti, G. (2006), “Hacking and Innovation,” Communications of the ACM 49(6), pp. 33–36.
24. Cronin, J. J. and S. A. Taylor (1992), “Measuring Service Quality: A Reexamination and Extension,” Journal of Marketing 56, pp. 55-68.
25. Cronan T. P. and Al-Rafee S. (2008), “Factors that Influence the Intention to Pirate Software and Media,” Journal of Business Ethics 78, pp. 527-545.
26. d’Astous, A., F. Colbert & D. Montpetit (2005) “Music Piracy on the Web – How Effective Are Anti-Piracy Arguments? Evidence From the Theory of Planned Behaviour.” Journal of Consumer Policy 28, pp. 289–310.
27. Deng, S., P. Townsend, M. Robert and N. Quesnel (1996), “A Guide to Intellectual Property Rights in Southeast Asia and China,” Business Horizon 39(6), 43–51.
28. Dubinsky, A. J., Loken, B. (1989), “Analyzing Ethical Decision Making in Marketing,” Journal of Business Ethics 19(2), pp 83-107.
29. Feinberg, R. M. and D. J. Rousslang (1990), “The Economic Effects of Intellectual Property Right Infringements,” Journal of Business 63(1), pp. 79–90.
30. Feuilherade, P. (2004) Online Piracy “Devastates” Music, BBC News. 2004.
31. Fishbein, M. and I. Ajzen (1975), “Attitude, Intention, and Behavior: An Introduction to Theory and Research” (Reading, MA).
32. Fornell, C., and Larcker, D.F. (1981), “Structural equation models with unobservable variables and measurement errors,” Journal of Marketing Research 18(2), pp. 39–50.
33. Fornell, C. (1992), “A National Customer Satisfaction Barometer: The Swedish Experience.” Journal of Marketing 56(1), pp. 6-21.
34. Fornell, C., M. D. Johnson, E. W. Anderson, J. Cha, and B. E. Bryant (1996), “The American Customer Satisfaction Index: Nature, Purpose, and Findings,” Journal of Marketing 60, pp. 7-18.
35. Fritzsche, D.J., Becker, H. (1983), “Ethical Behavior of Marketing Managers,” Journal of Business Ethics 2, pp. 291-299.
36. Fraedrich, J. P., Ferrell, O.C. (1992), “The impact of perceived risk and moral philosophy type on ethical decision making in business organizations,” Journal of Business Research 24(4), pp. 283-95.
37. Forrester (2003):“US Youth Online Study.”
38. Garbarino, E. and Johnson, M.S. (1999), “The different roles of satisfaction, trust and commitment in customer relationships,” Journal of Marketing 63, pp. 70-87.
39. Gefen, D.; Straub, D.; and Boudreau, M. (2000), “Structural equation modeling and regression: Guidelines for research practice,” Communications of the Association for Information Systems 4(7), pp. 1–77.
40. Gefen, D. (2002), “Customer loyalty in e-commerce,” Journal of the Association for Information Systems 3(1), pp. 27–51.
41. Gopal, R. D. and G. L. Sanders (1998), “International Software Piracy: Analysis of Key Issues and Impacts,” Information Systems Research 9(4), pp. 380–397.
42. Gopal, R. D., Sanders, G. L., Bhattacharjee, S., Agrawal, M., & Wagner, S. C. (forthcoming). “A behavioral model of digital music piracy,” Journal of Organizational Computing and Electronic Commerce.
43. Graziano, M. and L. Rainie (2001), “The Music Downloading Deluge: 37 Million American Adults and Youths Have Retrieved Music Files on the Internet,” Pew Internet Tracking Report (April 24), pp. 1-8.
44. Graham, A. P. (2003),“Software Piracy in the Workplace: A Model and Empirical Test,” Journal of management Information Systems 20(1), pp. 153-177.
45. Helm, B. (2005), “A hard ride for eDonkey,” Business Week, October 24, pp. 90-2.
46. Hiatt, B. and Serpick, E. (2007), “The record industry’s slow fade,” Rolling Stone, June 28, pp. 13-14.
47. Howard, J. A. and Sheth, J. N. (1969), “The Theory of Buyer Behavior,” John Wiley and Sons Inc., New York, NY.
48. Huang C. Y. (2005), “File Sharing as a Form of Music Consumption.” International Journal of Electronic Commerce 9(4), pp. 37-55
49. Huang, M., Liu, M. and Zhu, H. (2007), “Why Do Chinese Users Use Pirated Software: An Integrative Perspective?”[Downloaded on November 11, 2009 at 03:05 from IEEE Xplore.]
50. Hunt, S. and S. Vitell (1986), “A General Theory of Marketing Ethics,” Journal of Micromarketing 6, pp. 5–16.
51. Husted, B. W. (2000), “The Impact of National Culture on Software Piracy,” Journal of Business Ethics 26(3), pp. 197–211.
52. Hsu M.H. and Kuo F.Y.(2002),“An Investigation of Volitional Control in Information Ethics,” Behaviour and Information Technology, pp. 1-10.
53. IFPI (2008), “IFPI Digital Music Report: Revolution, Innovation, Responsibility,” (accessed March 29, 2008), [available at http://www.ifpi.org/content/library/DMR2008.pdf].
54. Jintae, L. and Younghwa, L. (2002), “A holistic Model of Computer Abuse within Organizations,” Information Management and Computer Security, 10 (2/3), pp. 57-63.
55. Jones, M.A. and Suh, J. (2000), “Transaction-specific satisfaction and overall satisfaction: an empirical analysis,” Journal of Service Marketing 14(2), pp. 147-59.
56. Jones, T. M. (1991), “Ethical Decision Making by Individuals in Organizations:An Issue Contingent Model,” Academy fo Management Review, 16(2), pp. 336-395
57. Keaveney, S.M. and Parthasarathy, M. (2001), “Customer Switching Behavior in Online Service: An Exploratory Study of the Role of Selected Attitudinal, Behavioral, and Demographic Factors,” Academy of Marketing Science, 29(4), pp. 374-390.
58. Knopper, S. (2004), “Lawsuits fail,” Rolling Stone, August 19, p. 32.
59. Knopper, S. (2007), “RIAA campaign rejected by colleges,” Rolling Stone, April 19, p. 12.
60. Kotler, P. (2000), “Marketing Management: Analysis, Planning Implementation and Control,” 10th Ed., Prentice Hall, Englewood Cliffs, NJ.
61. Kreie, J. and P. Cronan (1999), “Copyright, Piracy, Privacy, and Security Issues: Acceptable or Unacceptable Actions for End Users,” Journal of End User Computing 11(2), pp. 13–21.
62. Kuo, F. and M. Hsu (2001), “Development and Validation of Ethical Computer Self-Efficacy Measure: The Case of Softlifting,” Journal of Business Ethics 32, pp. 299–315.
63. Kwong, T. C. H., & Lee, M. K. O. (2002). “Behavioral intention model for the exchange mode Internet music piracy,” Proceedings of the 35th Annual Hawaii International Conference on System Sciences, Computer Society (electronic document).
64. Kwong, K. K et al (2003), “The Effects of Attitudinal and Demographic Factors on Intention to Buy Pirated CDs: The Case of Chinese Consumers,” Journal of Business Ethics 47, pp. 223-235.
65. Lai, K. K-Y. and J. L. Zaichkowsky (1999), “Brand Imitation: Do the Chinese Have Different Views?,” Asia Pacific Journal of Management 16(2), 179–192.
66. Lau, E. (2003), “An Empirical Study of Software Piracy,” Business Ethics 12(3), pp. 233–245.
67. Lessig, L (2002), The Future of Ideas (Vintage Books, New York, NY).
68. Liao, C, Lin, H. N. and Liu, Y. P. (2010), “Predicting the Use of Pirated Software: A Contingency Model Integrating Perceived Risk with the Theory of Planned Behavior,” Journal of Business Ethics 91, pp. 237–252.
69. Limayem, M., Khalifa M. and Chin, W. W. (1999),“Factors Motivating Software Piracy: A Longitudinal Study,” Proceeding of the 20th International Conference on Information, pp 124–131.
70. Loch, K. D. and Conger, S. (1996), “Evaluating Ethical Decision Making and Computer Use,” Communications of the ACM 39(7), pp. 74-83.
71. Lysonski, S. and Durvasula, S. (2008), “Digital piracy of MP3s: consumer and ethical predispositions,” Journal of Consumer Marketing 25(3), pp.167-178.
72. Madden, T. and P. Ellen, et al (1992), “A Comparison of the Theory of Planned Behavior and the Theory of Reasoned Action,” Personality and Social Psychology Bulletin 18, pp. 3-9.
73. McDonald, G. and C. Roberts (1994), “Product Piracy: The Problem that will not Go Away,” Journal of Product & Brand Management 3(4), pp. 55–65.
74. Morris, S. A. and R. A. McDonald (1995), “The Role of Moral Intensity in Moral Judgments: An Empirical Investigation,” Journal of Business Ethics 14, pp. 715-726.
75. Moores, T. T. and J. C. J. Chang (2006), “Ethical Decision Making in Software Piracy: Initial Development and Test of a Four-Component Model,” MIS Quarterly 30(1), pp. 167–180.
76. Nia, A. and J. L. Zaichkowsky (2000), “Do Counterfeits Devalue the Ownership of Luxury Brands?,” Journal of Product & Brand Management 9(7), 485–497.
77. Nunnally, J.(1978), “Psychometric Theory,” New York: McGraw-Hill.
78. Oliver, R.L (1980), “A Cognitive Model of the Antecedents and Consequences of Satisfaction Decision,” Journal of Marketing Research 17(11), pp. 460-469.
79. Oliver, R. L (1999), “Whence Consumer Loyalty?” Journal of Marketing 63, pp. 33-44.
80. Park, C., and Kim, Y. (2006), “The Effect of Information Satisfaction and Relational Benefit on Consumers’ Online Shopping Site Commitments,” Journal of Electronic Commerce in Organization 4(1), pp. 70-90.
81. Peace, A. G., Galletta, D. F., and Thong, J. Y. L. (2003). “Software piracy in the workplace: A model and empirical test,” Journal of Information Systems 20, pp. 153-177.
82. Rest, J. R. (1986), “Moral Development: Advances in Research and Theory,” N.Y., Westprot, Connneticut.
83. Rest, J. R (1979), “Developing in Judging Moral Issues” (University of Minnesota Press, Minneapolis, MN).
84. Ryu, S. et al.(2003), “Knowledge Sharing Behavior of Physicians in Hospitals,” Expert Systems with Applications 25, pp. 113-122.
85. Shultz II, C. J. and B. Saporito (1996), “Protecting Intellectual Property: Strategies and Recommendations to Deter Counterfeiting and Brand Piracy in Global Markets,” Columbia Journal of World Business 31 (Spring), pp. 18–28.
86. Simone, J. T. (1999), “Countering Counterfeiters,” The China Business Review ( January-February), pp. 12–19.
87. Simmons, L. (2004), “An exploratory analysis of software piracy using cross-cultural data,” International Journal of Technology Management 28(1), pp. 139-48.
88. Simpson P. M., Banerjee D. and Simpson C. L. (1994), “Softlifting: A Model of Motivating Factors,” Journal of Business Ethics 13, pp. 431-438.
89. Sinha, Rajiv K. and Naomi Mandel (2008), “Preventing Digital Music Piracy: The Carrot or the Stick? ” Journal of Marketing 72, pp. 1-15.
90. Siwek, Stephen E. (2006), “The True Cost of Motion Picture Piracy to the US Economy,” Institute for Policy Innovation, (accessed March 29, 2008), [available at http://www.ipi.org/ ipi%5CIPIPublications.nsf/PublicationLookupFullTextPDF/ 293C69E7D5055FA4862571F800168459/$File/CostOfPiracy. pdf?OpenElement].
91. Straub, D. and R. Collins (1990), “Key Information Liability Issues Facing Managers: Software Piracy, Proprietary Databases, and Individual Right to Privacy,” MIS Quarterly (June), pp. 143–156.
92. Swinyard, W. R., H. Rinne and A. K. Kau (1990), “The Morality of Software Piracy: A Cross-Cultural Analysis,” Journal of Business Ethics 9(8), pp. 655–664.
93. Tan, B. (2002), “Understanding consumer ethical decision making with respect to purchase of pirated software,” The Journal of Consumer Marketing 19(2), pp. 96-111.
94. Thong, J. and C. Yap (1998), “Testing an Ethical Decision- Making Theory: The Case of Softlifting,” Journal of Management Information Systems 15(1), pp. 213–237.
95. Tonglet, M. (2001), “Consumer misbehaviour: An exploratory study of shoplifting,” Journal of Consumer Behavior 1, pp.336-354.
96. Trevino, L. (1986), “Ethical Decision Making in Organizations: A Person- Situation Interactionist Model,” Academy of Management Review 11(3), pp. 601-617.
97. Vallerand, R. J. and L. G. Pelletier (1992), “Ajzen and Fishbein’s Theory of reasoned Action as Applied to Moral Behavior: A Confirmatory Analysis,” Journal of Personality and Social Psychology 62 (January), 98.
98. Von Lohmann, F. (2003), “Peer-to-Peer File Sharing and Copyright Law: A Primer for Developers,” in F. Kaashoek and I. Stoica (eds.), Peer-to-Peer System II: Second International Workshop (IPTPS 2003, LNCS 2735, Springer), pp. 108–117.
99. Walls, W. and P. Harvey (2006), “Digital Pirates in Practice: Analysis of Market Transactions in Hong Kong’s Pirate Software Arcades,” International Journal of Management 23(2), pp. 207–215.
100. Wagner, S. and G. Sanders (2001), “Considerations in Ethical Decision-Making and Software Piracy,” Journal of Business Ethics 29(1/2), pp. 161–167.
101. Walsh, G., Mitchell, V., Frenzel, T. and Wiedmann, K. (2003), “Internet-induced changes in consumer music procurement behavior,” Marketing Intelligence and Planning 21(5), pp. 305-17.
102. Wang, F., Zhang, H., Zang, H. and Ouyang, M. (2005), “Purchasing pirated software: an initial examination of Chinese consumers,” Journal of Consumer Marketing 22(6), pp.340-351.
103. Weber, J. (1990), “Manager’s Moral Reasoning: Assessing their responses to three moral dilemmas,” Human Relations 43, pp. 687-702.
104. Weber, J (1993), “Assessing the Role of the Moral Issue and its Intensity upon Managerial Decision Making,” International Association for Business and Society Proceedings pp. 390-394.
105. Wee, C. H., S. J. Tan and K. H. Cheok (1995), “Nonprice Determinants of Intention to Purchase Counterfeit Goods: An Exploratory Study,” International Marketing Review 12(6), pp. 19–46.
106. Westbrook, R. A. (1981), “Sources of consumer satisfaction with retail outlets,” Journal of Retailing 5, pp. 68-85.
107. Zeithaml, V. A., L. L. Berry and A. Parasuraman (1996), “The Behavioral Consequences of Service quality,” Journal of Marketing 60, pp. 31-46.

連結至畢業學校之論文網頁點我開啟連結
註: 此連結為研究生畢業學校所提供,不一定有電子全文可供下載,若連結有誤,請點選上方之〝勘誤回報〞功能,我們會盡快修正,謝謝!
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top