跳到主要內容

臺灣博碩士論文加值系統

(18.97.9.172) 您好!臺灣時間:2025/02/11 13:54
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

我願授權國圖
: 
twitterline
研究生:張展嘉
研究生(外文):Chan-Chia Chang
論文名稱:知識分享之研究-以部落格(論壇)使用者其知識分享意願為例
論文名稱(外文):A study on the knowledge sharing behavior on blogs and forums
指導教授:丘宏昌丘宏昌引用關係
指導教授(外文):Hung-Chang Chiu
學位類別:碩士
校院名稱:國立中興大學
系所名稱:科技管理研究所
學門:商業及管理學門
學類:其他商業及管理學類
論文種類:學術論文
論文出版年:2006
畢業學年度:94
語文別:英文
論文頁數:45
中文關鍵詞:電子口碑行銷部落格論壇知識分享行為
外文關鍵詞:word-of-mouthblogsforumsknowledge sharing
相關次數:
  • 被引用被引用:9
  • 點閱點閱:368
  • 評分評分:
  • 下載下載:0
  • 收藏至我的研究室書目清單書目收藏:15
在顧客購買決策過程中,電子口碑行銷(eWOM)扮演一個重要的角色。企業可以透過部落格(blog)與論壇(forums)來進行電子口碑行銷(eWOM),進而維持一個較好的品牌形象與顧客關係。然而過去的研究發現,只有少數的網路使用者願意在部落格與論壇中,分享他們寶貴的經驗與知識,因此本研究的目的在於探討使用者在部落格與論壇中,影響其知識分享意圖的決定因素為何?
本研究使用利益-成本架構來預測部落格與論壇中,知識傳播者的知識分享行為。研究結果顯示,其知識分享意圖被外在利益(聲譽、互惠)、內在利益(喜歡幫助別人、自我勝任感)、與成本(便利成本、互動成本)所影響。透過本研究的結果,可以作為企業在設置部落格與論壇的參考。
Electronic word-of–mouth (eWOM) plays a major role for customers’ buy decision. Through blogs and forums, company may be able to use eWOM to maintain a better customer relationship by enhancing customers’ knowledge sharing. Thus, this study attempts to enhance our understanding of knowledge sharing intention to enhance their valuable knowledge or experience leading to eWOM behavior through blogs and forums.
This study uses this model of cost-benefit framework to predict the users’ contribution behavior. It provides four types of benefit (include reputation, reciprocity, enjoy helping, self-efficacy) and two types of cost (include convenient costs and interaction costs) developed from psychology literature. The results suggest that qualified support for all of our hypothesized relationships.
According to social exchange theory, if the blogs or forums can provides a controllable benefit to its users or reduce the user cost, access can also be linked to behavior. Thus, firm may be able to use the results of this study to enhance customers’ knowledge sharing intention in their blogs or forums.
Introduction 1
Theoretical Rationale and Hypothesis Development 4
Extrinsic Benefits—Reputation 6
Extrinsic Benefits—Reciprocity 8
Intrinsic Benefits—Enjoy Helping 9
Intrinsic Benefits—Self-Efficacy 11
User cost—Convenient costs 13
User cost—Interaction costs 14
Methodology 17
Sample and data collection 17
Measures 20
Data Analysis and Results 23
Reliability and Construct Validity 23
Hypotheses Testing 24
Conclusions 26
Discussions 26
Managerial implications 30
Research Limitations and Future directions 32
Ardichvili, A., Page, V., and Wentling, T. (2003), “Motivation and Barriers to Participation in Virtual
Knowledge Sharing Teams,” Journal of Knowledge
Management, 7(3), 64-77.
Arpan L. M. and Raney, A. A. (2003), “An Experimental
Investigation of News Source and the Hostile Media
Effect,”Journalism and Mass Communication Quarterly, 80
(2), 265-281.
Avolio, B., Yammarino, F. J., and Bass, B. M. (1991),
“Identifying Common Methods Variance with Data Collected
from a Single Source: An Unresolved Sticky Issue,”
Journal of Management, 17(3), 571-587.
Ba, S., Stallaert, J., and Whinston, A. B. (2001),
“Research Commentary: Introducing a Third Dimension in
Information Systems Design-The Case for Incentive
Alignment,” Information Systems Research, 12(3), 225-
239.
Babin, B. J., Darden, W. R., and Griffin, M. (1994),
“Work and/or Fun: Measuring Hedonic and Utilitarian
Shopping Value,” Journal of Consumer Research, 20(4),
644-656.
Bagozzi, R. P. (1975), “Marketing as Exchange,” Journal
of Marketing, 39(4), 32-39.
Balasubramanian, S., Bronnenberg, B. J., and Peterson, R.
(1997), “Exploring the Implications of the Internet.
for Consumer Marketing,” Journal of Academy of
Marketing Science, 25 (4), 329–46.
Bandura, A. (2001), “Guide for Constructing Self-Efficacy
Scales,” Measurement and Evaluation in Counseling and
Development, Published electronically,
http://www.emory.edu/EDUCATION/mfp/banseg.html.
Bandura, A. (2000), “Exercise of Human Agency through
Collective Efficacy,” Current Directions in
Psychological Science, 9(3), 75-78.
Bandura, A. (1997), “Self-efficacy: The Exercise of
Control,” New York: Freeman.
Bandura, A. (1986), “Social Foundations of Thought and
Action: A Social Cognitive Theory,” Prentice-Hall,
Englewood Cliffs, NJ.
Batson, C. D. and Shaw, L. L. (1991), “Evidence for
Altruism: Toward a Pluralism of Prosocial Motives,”
Psychological Inquiry, 2(2), 107-122.
Batson, C. D., Duncan, B. D., Ackerman, P., Buckley, T.,
And Birch, K. (1981), “Is Emphatic Emotion a Source of
Altruistic Motivation,” Journal of Personality and
Social Psychology, 40(2), 290-302.
Bayn, B. (2005), “Shaping Online Social Behavior Through
User Interface Design,” Published electronically,
http://www.bayn.org/cyberpsych/Shaping%20Online%
20Behavior.pdf.
Blau, P. (1964), “Exchange and Power in Social Life,”
John Wiley & Sons, Inc, New York
Berger, C. R. and Calabrese﹐“Some Explorations in
Initial Interaction and Beyond: Toward a Developmental
Theory of Interpersonal Communication,” Human
Communication Research, 1(2), 99-112.
Bock, G., Zmud, R., Kim, Y., and Lee, J. (2005),
“Behavioral Intention Formation in Knowledge Sharing:
Examining the Roles of Extrinsic Motivators, Social-
Psychological Forces, and Organizational Climate,” MIS
Quarterly, 29(1), 87-111.
Butler, B., Sproull, L., Kiesler, S., and Kraut, R.
(2002), “Community Effort in Online Groups: Who Does
the Work and Why?” Published electronically,
http://opensource.mit.edu/papers/butler.pdf.
Cabrera, A. and Cabrera, E. F. (2002),“Knowledge
Sharing Dilemmas,” Organization Studies, 23(5), 687–
710.
Campbell, D. T. and Fiske, D. W. (1959), “Convergent and
Discriminant Validation by the Multitrait-Multimethod
Matrix,” Psychological Bulletin, 56(2), 81-105.
Carroll, J., Howard, S., Vetere, F., Peck, J., and Murphy,
J. (2002), “Just What Do the Youth of Today Want?
Technology Appropriation by Young People,”System
Sciences, Proceedings of the 35th Annual Hawaii
International Conference on, 1777-1785.
Chapple, E. D. (1970), “Culture and Biological Man,”New
York: Holt, Rinehart and Winston.
Childers, T. L., Carr, C. L., Peck, J., and Carson, S.
(2001), “Hedonic and Utilitarian Motivations for Online
Retail Shopping Behavior,” Journal of Retailing, 77(4),
511-535.
Churchill, G. A. and Jr. (1979), “A Paradigm for
Developing Better Measures of Marketing Constructs,”
Journal of Marketing Research, 16 (1), 64-73.
Connolly, T. and Thom B. K. (1990), “Discretionary
Databases: Theory, Data, and Implications,” in
organizations and Communication Technology, J. Fulk and
C. Steinfilied (Eds), Sage Publications, Newbury Park,
CA, 219-233.
Constant, D., Kiesler, S., and Sproull, L. (1994),
“What''s Mine Is Ours, or Is It? A Study of Attitude
About Information Sharing,” Information Systems
Research, 5(4), 400-422.
Constant, D., Sproull, L., and Kiesler, S. (1996), “The
Kindness of Strangers: On the Usefulness of Weak Ties
for Technical Advice,” Organization Science, 7(2), 119–
135.
Covington, M. V. (1992), “Making the Grade: A Self-Worth
Perspective on Motivation and School Reform,”New York:
Cambridge University Press.
Culnan, M. J. (1993), “How Did They Get My Name? An
Exploratory Investigation of Consumer Attitudes
Toward Secondary Information Use,”MIS Quarterly, 17
(3), 341-363.
Davenport, T. H. and Prusak, L. (1998), “Working
Knowledge: How Organizations Manage What They Know,”
Harvard Business School Press, Boston.
Davis, F. D., Bagozzi, R. P., and Warshaw P. R. (1992),
“Extrinsic and Intrinsic Motivation to Use Computers in
the Workplace,” Journal of Applied Social Psychology, 22
(14), 1111-1132.
Davis, F., Bagozzi, R. P., and Warshaw, P. R. (1989),
“User Acceptance of Computer Technology: A Comparison
of Two Theoretical Models,” Management Science, 35(8),
982-1003.
Deci, E. L. (1971), “Effects of Externally Mediated
Rewards on Intrinsic Motivation,” Journal of
Personality and Social Psychology, 18 (1), 105-115.
Deci, E. L. and Ryan, R. M. (1980), “The Empirical
Exploration of Intrinsic Motivational Processes,”
Advances in Experimental Social Psychology, Ed: L.
Berkowitz, Academic Press, New York, 13, 39-80.
Dellarocas, C., Fan, M., and Wood, C.A. (2004), “Self-
Interest, Reciprocity, and Participation in Online
Reputation Systems,” Workshop in Information Systems
and Economics (WISE), Published electronically,
http://ebusiness.mit.edu/research/papers/205_Dellarocas
_EbayParticipation.pdf.
Doty, D. H., and Glick, W. H. (1998), “Common Methods
Bias: Does Common Methods Variance Really Bias
Results?” Organizational Research Methods, vol. 1(4),
374-406.
Eccles, J. S., Wigfield, A., and Schiefele, U. (1998),
“Motivation,”In N. Eisenberg (Ed.), Handbook of child
psychology, vol. 3, 5th ed, 1017-1095. New York: Wiley.
Eighmey, J. (1997),“Profiling User Responses to
Commercial Web Sites,”Journal of Advertising Research,
37 (3), 59–66.
Elliot, A. J. and Dweck, C. S. (2005),“Handbook of
Competence and Motivation,”The Guilford Press, New York.
Emerson, R. M. (1976), “Social Exchange Theory,” Annual
Review of Sociology, 2(15), 335-362.
Fehr, E. and Gachter, S. (2000), “Fairness and
Retaliation: The Economics of Reciprocity,” Journal of
Economic Perspectives, 14(40), 159-181.
Fogel, M. (2003), “Blogging for Dollars,” Inc, 25(5),
36, Retrieved from Ebsco database.
Fornell, C. and Larcker, D. F. (1981), “Evaluating
Structural Equation Models with Unobservable Variables
and Measurement Error,” Journal of Marketing Research,
vol. 18 (1), 39-50.
Gist, M. E. and Mitchell, T. R. (1992), “Self-efficacy: A
Theoretical Analysis of Its Determinants and
Malleability,” Academy of Management Review, 17(2), 183-
211.
Goodman, P. S. and Darr, E. D. (1998), “Computer-Aided
Systems and Communities: Mechanisms for Organisational
Learning in Distributed Environments,” MIS Quaterly, 22
(4), 417-440.
Gupta, S. and Kim, H. (2004), “Virtual Community:
Concepts, Implications, and Future Research
Directions,” In Proceedings of the Tenth Americas
Conference on Information Systems, 2679- 2687.
Hall, H. (2001), “Social Exchanges for Knowledge Exchange
Paper Presented at Managing Knowledge: Conversations and
Critiques,” University of Leicester Management Centre,
10–11, Published electronically,
http://www.bim.napier.ac.uk/esis/about_us/
hazel_publications.html.
Hennig-Thurau, T., Gwinner, K. P., Walsh, G., and Gremler,
D. D. (2004), “Electronic Word-of-Mouth via Consumer-
Opinion Platforms: What Motivates Consumers to
Articulate Themselves on the Internet,” Journal of
Interactive Marketing, 18(1), 38-52.
Herbig, P. and Milewicz, J. (1995), “The Relationship of
Reputation and Credibility to Brand Success,” Journal
of Consumer Marketing, 12(4), 5-10.
Herbig, F., Milewicz, J., and Golden, J. (1994), “A Model
of Reputation Creation and Destruction,” Journal of
Business Research (forthcoming), Vol. 31, 23-31.
Hibbard, J. D., Kumar, N., and Stern, L. W. (2001),
“Examining the Impact of Destructive Acts in Marketing
Channel Relationships,” Journal of Marketing Research,
28 (1), 45-61.
Hilliard, A. L. (1950), “The Forms of Value: The
Extension of Hedonistic Axiology,” New York, NY:
Columbia University Press.
Hiltz, S. R. and Wellman, B. (1997), “Asynchronous
Learning Networks as A Virtual Classroom,”
Communications of the ACM, 40(9), 44–49.
Hoffman, M. L. (1981), “Is Altruism Part of Human
Nature,” Journal of Personality and Social Psychology,
40(1), 121-137.
Holbrook, M.B. (1999), “Consumer Value: A Framework for
Analysis and Research,” New York, NY: Routledge.
Hui, K. L., Tan B. C. Y., and Goh, C. Y. (2006), “Online
Information Disclosure: Motivators and Measurements,”
ACM Transactions on Internet Technology, vol. 6(4),1543.
Published electronically,
http://www.comp.nus.edu.sg/~lung/motivators.pdf.
Jap, S. D. and Ganesan, S. (2000), “Control Mechanisms
and the Relationship Life Cycle: Implications for
Safeguarding Specific Investments and Developing
Commitment,” Journal of Marketing Research, 37 (2), 227-
245.
Jarvenpaa, S. L. and Staples, D. (2000), “The Use of
Collaborative Electronic Media for Information Sharing:
An Exploratory Study of Determinants,” Journal of
Strategic Information Systems, 9(2/3), 129-154.
Johnson, R. A. and Wichern, D. W. (1992), “Applied
Multivariate Statistical Analysis,” 3d ed, Englewood
Cliffs, New Jersey: Prentice-Hall.
Kankanhalli, A., Tan, B. C. Y., and Wei K. K. (2005),
“Contributing Knowledge to Electronic Knowledge
Repositories: An Empirical Investigation,” MIS
Quarterly 29(1), 113-143.
Kanter, R. M. (1995), “Managing the Human Side of
Change,” in The Organizational Behavior Reader, D. A.
Kold, J. S. Osland, and I. M. Rubin, Eds. New Jersey:
Prentice Hall.
Kim, C. and Kertadjaja, R. (2004), “Weblogs and Instant
Messengers: Communication Methods for Asian
International Students to Maintain Long-Distance
Friendships,” Published electronically,
http://www.ischool.washington.edu/programs/
informatics/capstones/2004/kertadjaja_kim.pdf.
Kollock, P. (1999), “The Economies of Online Cooperation:
Gifts and Publics Goods in Cyberspace,” in Communities
in Cyberspace, P. Kollock, Ed. London: Routledge, 220-
239.
Krebs, D. L. (1975), “Empathy and Altruism,” Journal of
Personality and Social Psychology, 32(6), 1132-1146.
Kwok, J. S. H. and Gao, S. (2004), “Knowledge Sharing
Community in P2P Network: A Study of Motivational
Perspective,” Journal of Knowledge Management, 8(1), 94-
102.
Levin, D.Z., Cross, R., and Abrams L. C. (2002), “Why
Should I Trust You? Predictors of Interpersonal Trust in
a Knowledge Transfer Context,” Academy of Management
Meeting, Published electronically,
http://www.providersedge.com/docs/km_articles/
Why_Should_I_Trust_You.pdf.
Luthans, F. (2000a), “Positive Organizational Behavior:
Developing and Managing Psychological Strengths,”
Academy of Management Executive, 16(1), 57-72.
Luthans, F. (2000b), “The Need for and Meaning of
Positive Organizational Behavior,” Journal of
Organizational Behavior, 23(6), 695-706.
Lovelock, C. and Wirtz J. (2004), “Services Marketing:
People, Technology, Strategy,” 4th ed., Prentice Hall,
New Jersey.
Markus, M. L. (2001), “Toward a Theory of Knowledge
Reuse: Types of Knowledge Reuse Situations and Factors
in Reuse Success,” Journal of Management Information
Systems, 18(1), 57-94.
Milewicz, J. and Herbig, P. (1994), “Reputation and Sales
Force Success,” Marketing Intelligence and Planning, 12
(1), 4-16.
Molm, L.D. (1997), “Coercive Power in Social Exchange,”
Cambridge University Press.
Montgomery, B M. and Duck, S. (1991), “Studying
Interpersonal Interaction,” The Guilford press, New
York, London.
Neter, John, M. H., Kutner, C. J., Nachtsheim, and
Wasserman (1996), “Applied Linear Statistical Models,”
4th ed, Boston: McGraw-Hill.
O''Dell, C. and Grayson, C. J. (1998), “If Only We Knew
What We Know,” The Free Press, New York.
Orlikowski, W. J. (1993), “CASE Tools as Organizational
Change: Investigating Incremental and Radical Changes in
Systems Development,” MIS Quarterly, 17(3), 309-340.
Papacharissi, Z. and Rubin, A.M. (2000), “Predictors of
Internet Use,”Journal of Broadcasting & Electronic
Media, 44 (2), 175–196.
Podsakoff, P. M., MacKenzie, S. B., Lee, J. Y., and
Podsakoff, N. P. (2003)“Common Method Bias in
Behavioral Research: A Critical Review of the Literature
and Recommended Remedies,” Journal of Applied
Psychology, 88(5), 879-903.
Podsakoff, P. M. and Organ, D. W. (1986), “Self-Reports
in Organizational Research: Problems and Prospects,”
Journal of Management, 12(4), 531-544.
Prasad, B. (1999), “A Model for Optimizing Performance
Based on Reliability, Life-Cycle Costs and Other
Measurements,” Production Planning & Control, 10(3),
286-300.
Rioux, K. (2000), “Sharing Information Found for Others
on the Web: A Preliminary Examination,” In D. Kraft
(Ed.), Proceedings of the 63rd Annual Meeting of the
American Society for Information Science, (37), 68-77.
Medford, New Jersey: Information Today.
Santosa, P. I., Wei, K. K., and Chan, H. C. (2005),
“Student Involvement with Online Forum and Its Effects
on Intention to Seek and Intention to Share: An
Exploratory Study,” Published electronically,
http://www.yorku.ca/yciss/whatsnew/documents/WP30-
Lee_and_Rao.pdf.
Seybold, P. B. and Marshak, R. T. (1998), “Customers.Com:
How to Create a Profitable Business Strategy for the
Internet & Beyond,” Times press, New York, NY.
Shumaker, S. and Brownell, A. (1984), “Toward a Theory of
Social Support: Closing Conceptual Gaps,” Journal of
Social Issues, 40(4), 11-36.
Smith, D. H. (1981), “Altruism, Volunteers, and
Voluteerism,” Journal of Voluntary Action Research, 10
(1), 21-36.
Smith, H. J., Milberg, S. J., and Burke, S. (1996),
“Information Privacy: Measuring Individuals,’
Concerns about Organizations Practices,” MIS Quarterly,
20(2), 167-196.
Stajkovic, A. D. and Luthans, F. (1998), “Self-Efficacy
and Work-Related Outcomes,” A meta-analysis,
Psycholoxical Bulletin, 124(2), 240-261.
Stewart, K. A. and Segars, A. H. (2002), “An Empirical
Examination of the Concern for Information Privacy
Instrument,” Information Systems Research, 13(1), 36-49.
Sundar, H., Silver, D., Gagvani, N., and Dickinson, S.
(2003), “Skeleton Based Shape Matching and Retrieval,”
In Proceedings of Shape Modeling and Applications,
Seoul, Korea.
Swaminathan, V., Lepkowska-White, E., and Rao, B.P.
(1999), “Browsers or Buyers in Cyberspace? An
Investigation of Factors Influencing Electronic
Exchange,” Journal of Computer-mediated Communication,
5(2), 1-24.
Thibaut, J. W. and Kelley, H. H. (1959), “The Social
Psychology of Groups,” John Wiley and Sons Inc, New
York.
Tiwana, A. and Bush, A. (2001), “A Social Exchange
Architecture for Distributed Web Communities,” Journal
of Knowledge Management, 5(3), 242-248.
Tziner, A. (1999), “The Relationship Between Distal and
Proximal Factors and the Use of Political Considerations
in Performance Appraisal,”Journal of Business and
Psychology, 14(1), 217-231.
Tziner, A. and Murphy, K. R. (1999), “Additional Evidence
of Attitudinal Influences in Performance Appraisal,”
Journal of Business and Psychology, 13(3), 407-419.
Wagner, C. and Bolloju, N. (2005), “Supporting Knowledge
Management in Organizations with Conversational
Technologies: Discussion Forums, Weblog, Wikis,”Journal
of Database Management, 16(2), 1-16.
Vallerand, R. J. (1997), “Toward a Hierarchical Model of
Intrinsic and Extrinsic Motivation,” Advances in
Experimental Social Psychology, 29, 271-360.
Walsh, G., Gwinner, K. P., and Swanson, S. R. (2004),
“What Makes Mavens Tick? Exploring the Motives of
Market Mavens’ Initiation of Information Diffusion,”
Journal of Consumer Marketing, 21(2/3), 109-122.
Wasko, M. M. and Faraj, S. (2000), “It Is What One Does'':
Why People Participate and Help Others in Electronic
Communities of Practice,” Journal of Strategic
Information Systems, 9(2/3), 155–173.
Wasko, M. and Teigland, R. (2002),“The Provision of
Online Public Goods: Examining Social Structure in a
Network of Practice,”in Proceedings of the 23rd Annual
International Conference on Information Systems, L.
Applegate, R. Galliers, and J. I. DeGross (Eds),
Barcelona, Spain, 163-171.
Wasko, M. M. and Faraj, S. (2005), “Why Should I Share?
Examining Social Capital and Knowledge Contribution in
Electronic Networks of Practice,” MIS Quarterly, 29(1),
35-57.
Westin, A. F. (1967), “Privacy and Freedom,” Midwest
Journal of Political Science, 12(4), 620-621.
Westner, M. K. (2004), “Weblog Service Providing,”
Published electronically,
http://westner.levrang.de/cms/upload/pdf/master-
dissertation-weblog-blog-blogg-weblogs-blogs.pdf.
White, S. and Lui, S. (2005),“Distinguishing Costs of
Cooperation and Control in Alliances,” Strategic
Management Journal, Published electronically,
http://ged.insead.edu/fichiersti/inseadwp2001/2001-
70.pdf, 3.
Wolff, P. (2004),“Blog Posting Intervals. Mapping Blog
Communities,” Published electronically,
http://dijest.com/bc/2004_01_17_bc.html
#107209329503704470.
Zeithaml, V. A. and Bitner, M. J. (2003), “Services
Marketing: Integrating Customer Focus Across the Firm,”
3rd ed, McGraw-Hill, New York.
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top