跳到主要內容

臺灣博碩士論文加值系統

(44.192.22.242) 您好!臺灣時間:2021/08/01 13:51
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

我願授權國圖
: 
twitterline
研究生:錢宇威
研究生(外文):YU WEI CHIEN
論文名稱:台灣企業員工資訊倫理行為之態度與主觀規範影響變因研究
論文名稱(外文):A Research of the Factors influencing Taiwan’s Employees information Ethics Attitude and Subjective Norm of Behaviors
指導教授:莊雅茹莊雅茹引用關係
學位類別:碩士
校院名稱:輔仁大學
系所名稱:資訊管理學系
學門:電算機學門
學類:電算機一般學類
論文種類:學術論文
論文出版年:2007
畢業學年度:95
語文別:中文
論文頁數:97
中文關鍵詞:資訊倫理資訊倫理行為模型資訊倫理態度資訊倫理規範
外文關鍵詞:information ethicsbehavioral model of information ethicsinformation ethics attitudesubjective norm of behaviors.
相關次數:
  • 被引用被引用:3
  • 點閱點閱:375
  • 評分評分:
  • 下載下載:0
  • 收藏至我的研究室書目清單書目收藏:0
目前資訊科技普遍應用於現今企業之中,資訊科技對於員工的重要性也相對提升,但現今資訊科技的使用卻造成許多爭議與弊案,所造成的損失也無法估算。因此,多數企業也開始著手防範員工資訊誤用的產生。本研究希望深入探討員工的資訊倫理態度與主觀規範,相信研究結果在實務上對企業提升資訊倫理的意識與引導員工正確的資訊科技使用行為會有實質的幫助,在學術上也增進對資訊倫理態度與主觀規範理論架構的瞭解。本研究將以「理性行為理論」(TRA)作為理論基礎,為了進一步去了解是怎樣的因素影響企業員工的資訊倫理態度與主觀規範,所以將TRA做適當的調整,並納入企業資訊倫理政策、資訊倫理認知、企業資訊倫理教育訓練、企業資訊倫理氣候、政府資訊法律等構面建立理論架構。透過問卷調查法,以便利抽樣收集問卷並進行量化統計分析。
本研究結果發現,企業資訊倫理政策、資訊倫理認知、企業資訊倫理教育訓練、企業資訊倫理氣候顯著影響員工資訊倫理態度與主觀規範;政府資訊法律顯著影響員工資訊倫理態度,但未顯著影響員工資訊倫理主觀規範。因此,在企業制定資訊倫理政策時,可針對影響員工資訊倫理態度與主觀規範的因素來做考量,提供企業執行資訊倫理政策時參考的關鍵性因素。
The information technology is generally applied to the enterprises at present. Though information technology facilitates work and life, corporations suffer huge revenue loss from employee’s misconduct of computer using. Therefore, most of the enterprises begin to take actions to prevent their employee’s from getting information abuses. The purpose of this study was to thoroughly research into employee’s information ethical attitudes and subjective norm of behaviors. Results of this study could help enterprises to promote the consciousness of information ethics and lead employees to use the information technology properly. Academically this study enhances understandings of the behavioral theory of information ethical attitudes and intentions.To further understand factors influencing employee’s information ethical attitude and subjective norm of behaviors in corporations, this study proposed and examined five possible variables, namely, corporate information ethical policy, employee’s information ethical cognition, corporate educational training on information ethics, corporate information ethical climate, and government information law . Subjects of the study included 298 employees from major corporations in Taiwan. A self-administered questionnaire was employed to collect data of the study.
Results of this study revealed that corporate information ethical policy, employee’s information ethical cognition, corporate educational training on information ethics, and corporate information ethical climate all significantly affected employee’s information ethical attitude and subjective norm of behaviors. Government information law significantly correlated to employee’s information ethical attitudes, but not to the subjective norm of behaviors.
Therefore, it was suggested from the study when establishihg policies of information ethics, corporations should be considered and aimed at the factors which influence employee’s information ethical attitudes and subjective norm of behaviors.
目 錄
表次iv
圖次vii
第壹章 緒論...1
第一節 研究背景...1
第二節 研究動機...2
第三節 研究目的...4
第四節 研究流程...5
第五節 預期貢獻...6
第貳章 文獻探討...7
第一節 倫理的意義與內涵...7
第二節 資訊倫理的意義與相關議題...10
第三節 資訊倫理行為模型探討...14
第四節 影響資訊倫理相關變因探討...23
第五節 文獻小結...29
第參章 研究方法...31
第一節 研究架構...31
第二節 研究假說...32
第三節 變數定義...36
第四節 研究工具...37
第五節 研究對象與資料蒐集方法...45
第六節 資料分析分法...46
第七節 研究限制...49
第肆章 研究結果...51
第一節 樣本基本資料分析...51
第二節 量表的效度與信度分析...56
第三節 相關分析...60
第四節 迴歸分析...61
第五節 假說檢定...75
第六節 相關分析...60
第伍章 結論與建議...81
第一節 研究結論...81
第二節 研究建議...82
參考文獻...85
附錄一:資訊倫理態度與主觀規範現況調查問卷...92

表 次
表2-1:倫理的定義整...8
表2-2:資訊倫理議題一覽...11
表3-1:研究假說彙整...34
表3-2:各變數的操作型定義...36
表3-3:前測之測量問項...37
表3-4:基本資料調查...41
表3-5:KMO與Bartlett檢定...43
表3-6:轉軸後的成份矩陣...43
表3-7:前測問項之信度分析 (Cronbach's α) ...45
表3-8:樣本的主要任職企業...46
表4-1:研究對象性別百分比統計表...51
表4-2:研究對象年齡百分比統計表...52
表4-3:研究對象工作年資百分比統計表...52
表4-4:研究對象產業類別百分比統計表...53
表4-5:研究對象職位百分比統計表...53
表4-6:研究對象員工人數百分比統計表...54
表4-7:研究對象使用電腦的員工比例百分比統計表...55
表4-8:研究對象服務部門百分比統計表...55
表4-9: KMO與Bartlett檢定...56
表4-10:轉軸後的成份矩陣...57
表4-11:解說變異量...59
表4-12: Cronbach α值...59
表4-13:相關分析結果...61
表4-14:企業資訊倫理政策對態度影響的迴歸變異數分析...62
表4-15:企業資訊倫理政策對態度影響的迴歸分析...62
表4-16:資訊倫理認知對態度影響的迴歸變異數分析...63
表4-17:資訊倫理認知對態度影響的迴歸分析...63
表4-18:政府資訊法律對態度影響的迴歸變異數分析...64
表4-19:政府資訊法律對態度影響的迴歸分析...64
表4-20:企業資訊倫理教育訓練對態度影響的迴歸變異數分析...65
表4-21:企業資訊倫理教育訓練對態度影響的迴歸分析...65
表4-22:企業資訊倫理氣候對態度影響的迴歸變異數分析...66
表4-23:企業資訊倫理氣候對態度影響的迴歸分析...66
表4-24:企業資訊倫理政策對主觀規範影響的迴歸變異數分析...67
表4-25:企業資訊倫理政策對主觀規範影響的迴歸分析...67
表4-26:資訊倫理認知對主觀規範影響的迴歸變異數分析...68
表4-27:資訊倫理認知對主觀規範影響的迴歸分析...68
表4-28:政府資訊法律對主觀規範影響的迴歸變異數分析...69
表4-29:政府資訊法律對主觀規範影響的迴歸分析...69
表4-30:資訊倫理教育訓練對主觀規範影響的迴歸變異數分析...70
表4-31:資訊倫理教育訓練對主觀規範影響的迴歸分析...70
表4-32:企業資訊倫理氣候對主觀規範影響的迴歸變異數分析...71
表4-33:企業資訊倫理氣候對主觀規範影響的迴歸分析...71
表4-34:各因素係數...72
表4-35:變異數分析...73
表4-36:模式摘要...73
表4-37:各因素係數...74
表4-38:變異數分析...75
表4-39:模式摘要...76
表4-40:研究假設與結果...77

圖 次
圖1-1:研究程序...5
圖2-1:計畫行為理論模型...16
圖2-2:修改後的自我效能TPB模式...17
圖2-3:電腦使用倫理決策模型...20
圖2-4:Leonard等提出的資訊倫理決策模型...22
圖3-1:研究架構...32
參考文獻
1.David B. Resnik 作/何畫瑰譯,科學倫理的思索,台北:韋伯文化國際,2003。
2.王郁琦,工作場合中電子郵件隱私權之研究,國科會計畫(編號:87-2414-H-155-001),1998。
3.王臣瑞,倫理學,台北:臺灣學生書局,1980。
4.王保進,多變量分析:套裝程式與資料分析,初版,台北:高等教育總經銷,2004。
5.江玫君,業務員人口與心理特徵對績效的影響,私立東海大學企業管理研究所碩士論文,1991。
6.余春達,不確定環境下資訊倫理決策行為探討,國立中央大學資管所碩士論文,2001。
7.沈清松,科技發展的倫理問題,人事月刊,第15卷,第4期,台北:行政院人事行政局,1992,頁8-9。
8.吳秉恩,企業倫理教育的本質、內涵與實踐,第六屆全國管理教育研討會,1994。
9.吳明隆,SPSS 統計應用實務,二版,台北:松崗電腦圖書公司,2004。
10.林杏子等,資訊倫理,台北:華泰文化事業公司,2001。
11.林建良,資訊倫理教學之研究,國立台灣工業技術學院管理技術研究所資訊管理學程碩士論文,1996。
12.林傑斌、林川雄、劉明德、飛捷工作室,SPSS 12 統計建模與應用實務,初版,台北:博碩文化,2004。
13.邱皓政,量化研究與統計分析,初版,台北:五南,2000。
14.周文欽,研究方法:實徵性研究取向,初版,台北:心理,2002。
15.周逸衡、凌儀玲、關復勇,行銷人員行銷道德決策過程之研究,交大管理學報,第20卷,第1期,2000,頁1-28。
16.范錚強,倫理與法律問題,台北:國立空中大學,1997
17.郭俊宏,台灣企業資訊倫理政策現況調查,私立輔仁大學資訊管理所碩士論文,2006
18.郭鴻志,從網路倫理談資訊倫理教育,應用倫理研究通訊,第5期,1998,頁19-20。
19.黃建中,比較倫理學,台北:正中,1990。
20.黃貞芬、許孟祥、林東清,資訊倫理守則現況:以社會層級及倫理議題分析,第一屆資訊科技與社會轉型研討會,台北:中央研究院社會學研究所籌備處主辦,1996。
21.許士軍,新管理典範下的企業倫理,世界經理文摘,第101 期,1991。
22.陳建人、柯菁菁、陳協志,資訊倫理與社會:重建網路社會新秩序,台北:普林斯頓,2003。
23.陳永旺,電腦犯罪,台北:美歐萊禮台灣分公司,1999。
24.陳聰文,專科學校企業倫理教學研究,國立政治大學教育研究所博士論文,1993。
25.陳德禹,現代行政倫理體系初探,發展於行政現代化兩岸學術研討會,台北:國立台灣大學政治系,1998。
26.許秋芬,資訊時代的資訊倫理課題,台北市立圖書館館訊,第18卷,第3期,2001,頁56-64。
27.許孟祥,以意向模式研究資訊人員之專業倫理行為,中山大學資訊管理研究所博士論文,1996。
28.葉學志,教育哲學,台北:三民書局,1985。
29.葉匡時、周德光,企業倫理之形成與維持,回顧與探究,台大管理論叢,第六卷,第一期,1995,頁1-23。
30.游宣榮,資訊系統開發人員倫理敏感度影響因素之模式建構與驗證,銘傳大學資訊管理研究所碩士論文,2003。
31.詹炳耀等,資訊倫理與法律,台北:旗標出版社,2005。
32.賈馥茗,全民教育與中華文化,台北,五南出版社,1992。
33.蔡德輝等,犯罪學,台北:五南出版社,2004。
34.鍾佳雯,資訊倫理教學對大專學生資訊倫理認知與行為意向之影響以屏東科技大學四年制新生為例,國立屏東科技大學資訊管理研究所碩士論文,2003
35.Ajzen, I. & Fishbein, M., Understanding Attitudes and Predicting Social Behavior, Englewood Cliffs, NJ: Prentice-Hall, 1980.
36.Ajzen, I., Intentions To Actions: A theory of Planned Behaviour, Action-Control: From cognition to Behaviour, 1985, pp.11-39.
37.Ajzen, I., Attitude structure and behavior, Hillsdale: Lawrence Erlbaum Associates, 1989. pp. 241-274.
38.Alam, Kazi Firoz, Business ethics in New Zealand organizations: views from the middle and lower level managers, Journal of Business Ethics, 22, 1999, pp145-154.
39.Anderson, R.E., Johnson, D.G., Gotterbarn D., & Perrole, J., Using the New ACM code of ethics in Decision Making, Communications of ACM, 36(2), February 1993, pp.98-107.
40.Athey, S., A comparison of expert’s and high tech students’ ethical beliefs in computer-related situations, Journal of business ethics, 12, 1993, pp.359-370.
41.Bandura, A., Self-efficacy Mechanism in Human Agency, American Psychologist, 37(2), February 1982, pp.122-147.
42.Bandura, A. & Jourden, F.G. Self-Regulatory Mechanisms Governing the Impact of Social Comparison on Complex Decision Making, Journal of Personality and Social Psychology,1991, pp.941-951.
43.Banerjee, D., Cronan, T.P., & Jones, T.W., Modeling IT Ethics: A study in situational ethics, MIS Quarterly, 22(1), 1998, pp.31-60.
44.Bequai, A., How to Prevent Computer Crime: A Guide for Managers, NY: John Wiley & Sons, 1983.
45.BloomBecker, B., Spectacular computer crimes, Homewood, IL: Dow Jones-Irwin, 1990.
46.Bommer, M., Gratto, C., Gravander, J., & Tuttle, M., A behavioral model of ethical and unethical decision making, Journal of Business Ethics, 6, 1987, pp.265-280.
47.Center for Business Ethics, B.C., Are corporations institutionalizing ethics? , Journal of Business Ethics, 5, 1986, pp.85-91.
48.Chang, M.K., Predicting Unethical Behavior: A Comparison of the Theory of Reasoned Action on the Theory of Planned Behavior, Journal of Business Ethics, 17(16), 1998, pp.1828-1834.
49.Collins, W.R., Miller, K.W., Spielman, B.J., & Wherry, P., How Good is Good Enough, Communications of ACM, 37(1), 1994, pp.81-91.
50.Conger, J. D., Preparing IS Students to Deal With Ethical Issues, MIS Quarterly, 19, 1995, 211-218.
51.Conger, S., & Loch, K.D., Ethics and Computer Use, Communications of the ACM, 38(12), 1995a, pp.31-39.
52.Conger, S., Loch, K.D., & Helft, B.L., Ethics and Information Technology Use: A Factor Analysis of attitudes to Computer Use, Information Systems Journal, 5, 1995b, pp.161-184.
53.Cook, P.J., Research in Criminal Deterrence: Laying the Groundwork for the Second Decade, In N. Morris., & M. Tonry (Eds.), Crime and Justice: An Annual Review of Research(2), Chicago, IL: The University of Chicago Press, 1980.
54.Cressey, D.R., & Moore, C.A., Managerial Values and Corporate Codes of Ethics, California Management Review, 25(4), 1983, pp.53-77.
55.Culnan, M. J., How Did They Get My Name? An Exploratory Investigation of Consumer Attitudes Toward Secondary Information Use, MIS Quarterly, 1993, pp. 341-363.
56.Eining, M.M., & Christensen, A.L., A psycho-social model of software piracy: the development and test of a model, In: R. Dejoie, G. Fowler, & D. Paradice (Eds.), Ethical Issues in Information Systems, Boston, MA: Boyd and Fraser, 1991.
57.Emmans, C., Internet ethics won’t go away. Education Digest, 66(1), 2000, pp.24-26.
58.Ethics Resource Center and the Behavior Research Center, Ethics Policies and Programs in American Business, Washington, D.C.: Ethics Resource Center, 1990.
59.Ferrell, O.C., & Gresham, L.G., A Contingency Framework for Understanding Ethical Decision Making in Marketing, Journal of Marketing, 49, 1985, pp.87-96.
60.Ferrell, O.C., & Fraderich, J., Business Ethics, Ethical Decision Making and Ethics, Boston: Houghton Mifflin Company, 1991.
61.Fimbel, N. and J. S. Burstein, Defining the Ethical Standards of the High-Technology Industry, Journal of Business Ethics, 9, 1990, pp.929-948.
62.Fishbein, M., & Ajzen, I., Belief, Attitude, Intention and Behavior: An Introduction to Theory and Research, Reading, MA: Addison-Wesley, 1975.
63.Frankena, W.K. Ethics, Prentice Hall, Englewood Cliffs, NJ, 1963.
64.Geis, G. & Meier, R.F., The White-Collar Offender, In H. Toch (Eds.), Psychology of Crime and Criminal Justice, New York: Holt, Rinehart and Winston, 1979, pp.427-443.
65.Goodman, M., Making Computer Crime Count, FBI Law Enforcement Bulletin, 70(8), 2001, pp.10-17
66.Greenberg, J., Equity and Workplace Status: A Field Experiment, Journal of Applied Psychology, 73(4), 1988, pp.71-78.
67.Hafner, K., & Markoff, J., Cyberpunk: Outlaws and Hackers on the Computer Frontier, New York: Simon & Schuster, 1991.
68.Harrington, S.J., “The Impact of Codes of Ethics on Infor-mation systems Personnel”, Association for Computing Machinery, 1994, Retrieved August 5, 2005, from the world Wide Web: http://portal.acm.org/citation.cfm?id=18632
3&coll=portal&dl=ACM&CFID=52993699&CFTOKEN=72527507.
69.Harrington, S.J., The Effects of Codes of Ethics and Personal Denials of Responsibility on Computer Abuse Judgments and Intentions, MIS Quarterly, 20(3), 1996, pp.257-278.
70.Heide, D., & Hightower, J.K., Organizations, Ethics, and the Computing professional, Journal of Systems Management, 34(11), November 1983, pp.37-42.
71.Herndon, N. C., Perceived corporate ethicalness and salesforce turnover: a new rationale for more ethical corporate behavior, Proceeding of the Academy Science, April, 1992, pp.44-49
72.Huff, C., & Martin, C.D., Computing consequences: a framework for teaching ethical computing, Communications of the ACM, 38(12), 1995, pp.75-84.
73.Hunt, S. D., & Vitell, S. A., “General theory of marketing ethics”,Journal of Marketing, 6 (Spring),1986, pp.5-16.
74.Johnson, D. G., Ethics Online, Communications of the ACM, 40(1), January 1997, pp.60-65.
75.Jones, T. M., Ethical Decision Making by Individuals in Organizations: An Issues Contigent Model, Academy of Management Review, 16(2), 1991, pp.366-395.
76.Kuo, F.Y. & Hsu, M.H. “Development and Validation of Ethical Computer Self-Efficacy Measure: The Case of Softlifting,” Journal of Business Ethics, 32, 2001, pp. 299-315.
77.Kohlberg, L., The philosophy of moral development, San Franciso: Harper &Row., 1984.
78.Laudon, K.C., & Landon,J.P., Management Information Systems:Organization and Technology in the Networked Enterprise, Prentice Hall, 2000.
79.Leonard, L., Cronan, T.P., & Kreie, J., What influences IT ethical behavior intentions ─ planned behavior, reasoned action, perceived importance, or individual characteristics, Information & Management, 42, 2004, pp.143-158.
80.Loch, K.D. & Conger, S. “Evaluating Ethical Decision Making and Computer Use,” Communication of ACM, 39(7), 1996, pp.74-83.
81.Madden, T.J. Ellen, P.S., & Ajzen, I. A comparison of the theory of planned behaviour and the theory of reasoned action, Personality and Social Psychology Bulletin, 18, 1992, pp.3- 9.
82.Manley, W.J., Executive’s Handbook of Model Business Conduct Code, Englewood Cliffs, NJ: Prentice-Hall, 1991, pp.3-10.
83.Mason, R. O., Four Ethical Issues of the Information Age, MIS Quarterly (10)1, March 1986, pp. 5-12.
84.Mathews, M.C., Codes of Ethics: Organizational Behavior and Misbehavior, In W. Frederick, & L. Preston (Eds.), Research in Corporate Social Performance and Policy, Greenwich, CT: JAI Press, 1987, pp.107-130.
85.Moser, M. R., Ethical conflict at work: A critique of the literature and recommendations for future research, Journal of Business Ethics, 7, 1998, pp. 381-387.
86.Parker, D.B., Computer Crime: Criminal Justice Resource Manual (2ed.), National Institute of Justice, U.S. Department of Justice, 1989.
87.Pearson, F.S., & Weiner, N.A., Criminology: Toward an Integration of criminological Theories, The Journal of Criminal Law & Criminology, 76(1), 1985, pp.116-150.
88.Pitt, H.L., & Groskaufmanis, K.A., Minimizing Corporate Civil and Criminal Liability: A Second Look at Corporate codes of Conduct, The Georgetown Law Journal, 78, 1990, pp.1559-1654.
89.Robin, D.P., Reidenbach, R.E., & Forrest, P.J., The perceived importance of an ethical issue as an influence on the ethical decision-making of ad managers, Journal of Business Research, 35, 1996, pp.17-28.
90.Robin, D., Giallourakis, M., David, F.R., & Moritz, T.E., A different look at codes of ethics, Business Horizons, 32(1), 1989, pp.66-73.
91.Schwartau, W., Internet & computer ethics for kids, Winn Schwartau & Interpact, Inc.,2000.
92.Sheppard, B.H., Hartwick, J., & Warshaw, P.R. “The theory of reasoned action: A meta-analysis of past research with recommendations for modifications and future research,” Journal of Consumer Research, 15, 1988, pp.325-343.
93.Spinell, R.A., Ethical Aspects of Information Technology, Prentice Hall, 1998.
94.Straub, D.W., Effective IS Security: An Empirical Study, Information Systems Research, 1(3), 1990, pp.255-276.
95.Straub, D.W., & Nance, W.D., Discovering and Disciplining Computer Abuse in Organizations, MIS Quarterly, 14(1), March 1990, pp.45-55.
96.Straub, D.W., Carlson, P.J., & Jones, E.H., Deterring Cheating by Student Programmers: A Field Experiment in Computer Security, Journal of Management Systems, 5(1), 1993, pp.33-48.
97.Swinyard, W.R., Rinne, H., & Kengkau, A., The Morality of Software Piracy Across-Cultural Analysis, Journal of Business Ethics, 9, 1990, pp.655-664.
98.Trevino, L.K., Ethical Decision Making in Organizations: A Person-Situation Interactionist Model, Academy of Management Review, 11(3), 1986, pp.601-617.
99.Victor,B.Cullen,J.B.,A theory and measure of ethical climate inorganizations, Researchin Corporate Social Performanc andPolicy, 9, 1987, pp.51-71
100.Vitell, S. J. and D. L. Davis, Ethical Beliefs of MIS Professionals: The Frequency and Opportunity for Unethical Behavior , Journal of Business Ethics, 9 , 1990, pp.63-70.
101.Zikmund, W, G., Business Research Methods (7th ed.), Ohio:South-Western, 2003.
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top