跳到主要內容

臺灣博碩士論文加值系統

(3.235.120.150) 您好!臺灣時間:2021/08/03 06:59
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

我願授權國圖
: 
twitterline
研究生:陳禹廷
研究生(外文):Yu-Ting Chen
論文名稱:電子郵件安全管理政策對使用者行為影響之研究
論文名稱(外文):Exploring the Effects on User's Behavior Consider with E-mail Security Policies
指導教授:陳俊德陳俊德引用關係
指導教授(外文):Chun-Te Chen
學位類別:碩士
校院名稱:華梵大學
系所名稱:資訊管理學系碩士班
學門:電算機學門
學類:電算機一般學類
論文種類:學術論文
論文出版年:2007
畢業學年度:95
語文別:中文
論文頁數:75
中文關鍵詞:計劃行為理論任務科技配適度電子郵件資訊安全管理使用意願
外文關鍵詞:Theory of Planned BehaviorTask Technology FitE-mailInformation security managementIntention
相關次數:
  • 被引用被引用:8
  • 點閱點閱:218
  • 評分評分:
  • 下載下載:0
  • 收藏至我的研究室書目清單書目收藏:0
電腦與網際網路的興盛,在全球造成網路應用的快速成長,其中對人類溝通影響最為深遠的應用即為電子郵件。然而,電子郵件擁有的優點,同時也帶來許多問題,垃圾郵件、病毒郵件、詐騙郵件(網路釣魚)、洩密、散佈謠言等,造成企業有形無形的損失,於是企業便開始進行一連串的郵件過濾、限制等措施來管控電子郵件的收發行為,員工感受到了不同以往在使用電子郵件時的不便性與干擾,該如何拿捏安全管理策略將是現今管理員工使用電子郵件成功的關鍵因素。
本研究透過文獻的探討、運用問卷方式收集員工意見,以任務科技配適度與計劃行為理論為基礎,以及經實務界觀察後加以擴充的公平認知與操作認知構面,來探討員工在電子郵件管理系統使用上,影響其使用意願的因素。研究回收325份有效問巻,並藉由結構方程模式來分析,結果發現員工對於電子郵件管理系統的使用行為會受到對行為的態度、電子郵件管理規範影響。而在電子郵件管理系統的使用認知上,主要會受到認知易用性、認知有用性、公平認知影響。在任務科技配適度上,則受到任務特性、科技特性及員工特質的影響。而任務科技配適度會正向影響員工的使用認知及使用行為,另一方面也會經由使用認知而影響使用行為,由使用行為影響並增加其使用意願。
本研究的結論建議,在資訊系統建置方面,建議企業採用電子郵件管理系統時,應評選操作介面容易使用,功能項目切合實務需求且有用的系統;在管理策略方面,則須加強建立電子郵件安全政策的制度,以及審慎選用對員工工作任務影響最低的控管機制,並經常進行安全政策的宣導及教育訓練,以增加員工的使用意願,創造企業與員工的雙贏局面。
The blooming of computers and the Internet induces the worldwide rapid growth to use the computer network applications. The most far-reaching application which affects the human communication is E-mail systems. However, several problems arise along with the advantage that E-mail brings, for example, spam, virus mail, mail fraud (Phishing), and rumor spreading. These problems damage enterprises both tangible and intangible and induce them to take a series of mail filtering measurements to control and to monitor the use of E-mail systems. Employees feel more inconvenience and interference as they use E-mail system and that is different from what they experienced before. A proper security management strategy will affect the success or failure of e-mail management.
Through the study of literatures, the Structured Equation Model base on the Task technology fit (TTF), the Theory of Planned Behavior (TPB), the Cognitive fair, and the Cognitive operation is constructed to explore the influence factors on the Intention to Use E-mail Security Management System. There are 325 variable respondents were be collected. After the analysis, it found that the behavior of the user to use the e-mail management system will be affected by Attitudes, Toward the Behavior and E-mail security Norms. The use of cognitive of the e-mail management system will be influenced by the Perceive ease of use, the Perceived usefulness and the Cognitive fair effects. In the TTF view, it has been influenced by the task characteristics, the technology characteristics and the staff characteristics. And the TTF will affect their perception, through perception to affect behavior, thereby to increase its influence and the intention to use.
The conclusion of this study suggested that when the enterprises establish the security policy management system for e-mail system, the interface operation must be easy to use and the features must meet the demand with more practical and useful. On the strategies selection, it should be strengthen the security policies of the e-mail system with minimum regulatory mechanisms. In addition, the regular e-mail security policy advocacy, education and training for employees to increase their intention to use.
誌 謝
摘 要
ABSTRACT
目 錄
表 錄
圖 錄
一、緖論
1.1 研究背景與動機
1.2 研究目的
1.3 研究範圍與對象
1.4 研究流程
二、文獻探討
2.1 電子郵件
2.1.1 電子郵件的定義
2.1.2 電子郵件的特性
2.2 企業電子郵件安全管理
2.2.1 電子郵件的安全問題
2.2.2 電子郵件安全政策
2.2.3 電子郵件過濾系統
2.3 電子郵件控管之行為理論
2.3.1 計劃行為理論(TPB)
2.3.2 任務科技配適度(TTF)
2.3.3 公平理論
三、研究方法
3.1 研究架構
3.2 研究假說
3.3 變數操作性定義
3.4 問卷設計與資料分析方法
四、資料分析
4.1 基本資料分析
4.2 項目分析
4.3 信度及效度分析
4.4 因素分析
4.5模式架構修正
4.6結構方程模式
4.6.1 測量模式分析
4.6.2 結構模式分析
4.7 假說檢定
五、結論與建議
參考文獻
[1]資策會電子商務研究所,http:// www.find.org.tw/。
[2]Mirapoint,http://www.mirapoint.com/。
[3]黃芳銘,結構方程模式理論與應用,四版,五南圖書,台北市,民國九十五年五月。
[4]邱皓政。結構方程模式:LISREL的理論、技術與應用。雙葉書廊,台北市,民國九十二年。
[5]董陳明,「企業電子郵件系統特性與規範對行為影響之研究」,銘傳大學資訊管理學系碩士論文,民國九十二年。
[6]黃雯汝,「組織內使用電子郵件之滿意度探討」,屏東科技大學資訊管理研究所碩士論文,民國八十八年。
[7]黃志偉,「資訊安全認知平台之研究」,淡江大學資訊管理研究所碩士論文,民國九十三年。
[8]李文雅,「TAM與TTF整合模式之驗證:以乙級電腦軟體應用技術士為例」,民國九十二年五月。
[9]李碧瑜,「以公平理論觀點探討網路商務模式之服務補救-以網路購物退換貨為例」,民國九十三年六月。
[10]林東清、孫培真、徐景智,「影響資訊系統使用者抗拒行為之原因:以計劃行為理論為基礎之整合研究」,資訊管理研究,第二卷,第二期,民國八十九年七月,第1-26頁。
[11]董和昇,「網站使用者資訊獲取策略之研究」,中山大學資訊管理學系博士論文,民國九十一年七月。
[12]劉蔚廷,「資訊科技在組織內擴散之研究-以TAM與TTF探討」,東吳大學企管學系碩士論文,民國九十三年七月。
[13]顏奕仁,「資訊系統特性、任務特性與電腦自我效能對工作績效的影響」,中央大學資訊管理學系碩士論文,民國九十一年六月。
[14]王淑娟,「資訊系統採用行為之研究-以某大學資訊系統為例」,雲林科技大學資訊管理系碩士論文,民國九十一年六月。
[15]朱景文,「科技接受模式應用於KIOSK捷運生活站使用行為之研究」,華梵大學資訊管理學系碩士論文,民國九十三年六月。
[16]盧惠柔,「組織導入電子郵件系統過程之探討-個案研究」,高雄第一科技大學資訊管理系碩士論文,民國九十年六月。
[17]朱筱琪,「個人管理電子郵件行為之研究」,政治大學資訊管理研究所碩士論文,民國九十三年六月。
[18]王宗立,「個人沈浸體驗、任務/科技配適度及科技接受之實徵研究-以電子郵件使用為例」,樹德科技大學資訊學院資訊管理研究所碩士論文,民國九十一年六月。
[19]戴豪君,「資訊社會的圓形監獄-談工作場所之電子郵件法律爭議與管理政策」,資訊與電腦,第253期,民國九十年八月。
[20]張紹勳,研究方法,三版,滄海,台中市,民國九十四年八月。
[21]李茂能,結構方程模式軟體Amos之簡介及其在測驗編製上之應用,初版,心理出版社,台北市,民國九十五年十一月。
[22]吳明隆,spss統計應用學習實務:問卷分析與應用統計,三版,知城,台北市,民國九十五年二月。
[23]資安人科技網,http://www.informationsecurity.com.tw/。
[24]Adams D.A., Todd P.A. and Nelson R.R., “A comparative evaluation of the impact of electronic and voice mail on organizational communication”, Information & Management, 1993, Vol.24, pp9-21.
[25]Fishbein, M. & Ajzen, I. , Belief, Attitude, Intention, and Behavior: An Introduction to Theory and Research. 1975, MA: Addison-Wesley Publishing company.
[26]Sheppard, B. H., J. Hartwick, and P. R. Warshaw, “The Reasoned Action: A Meta-analysis of Past Research with Recommendations Future Research,” Journal Consumer Research (15), 1988, pp.325-343.
[27]Ajzen, I. From Intentions to Actions: A Theory of Planned Behavior. 1985, In J. Kuhl & J. Beckman (Eds.), Action Control: From Cognition to Behavior. Heidelberg: Springer.
[28]Ajzen, I., “Attitude Structure and Behavior,” Breckler, and A. G. Greenwald (Eds.), Attitude Structure Erlbaum Associates, Hillsdale, NJ, 1989, pp.241-274.
[29]Mathieson, K., “Predicting User Intentions: Comparing the Technology Acceptance Model with The Theory of Planned Behavior,” Information System Research, 1991, Vol. 2, No. 3, pp.173-191.
[30]Madden, T. J., P. S. Ellen, and I. Ajzen, “A Comparison of the Theory of Planned Behavior and the Theory of Reasoned Action,” Personality and Social Psychology Bulletin (18:1), 1992, pp.3
[31]Schifter, D. B. and I. Ajzen, “Intention, Loss: An Application of the Theory of Planned Society Psychology (49), 1985, pp.843-851.
[32]Goodhue, D. L. & Thompson, R. L. “Task-Technology Fit and Individual Performance,” MIS Quarterly, 1995a, Vol. 19, No. 2, pp. 213-236.
[33]Adams, J. S., “Inequity in Social Exchange,” In R. M. Steers and L. W. Porter, eds., Motivation and Work Behavior. New York: McGraw-Hill, 1979, pp. 111-24.
[34]Joshi, K., “A Model of User's Perspective on Change: The Case of Information Systems Technology Implementation,” MIS Quarterly, June 1991, pp. 229-242.
[35]Joshi, K., “Interpersonal Skills for Cooperative User-Analyst Relationships: Some Research Issues,” Data Base, 1992, pp. 630-646.
[36]Hunton, J. E., “Effects of the user participation process and task meaningfulness on key information system outcomes,” Management Science, 1997, Vol. 43, No. 6, pp. 797-808.
[37]Mark T. Dishaw,Diane M. Strong. “Experience as a moderating variable in a task-technology fit model”,in Association for Information Sy stems, Fourth Americas Conference on Information Systems. Baltimore,MD, 1998, pp722-724.
[38]Montazemi, A. R. “Factors Affecting Information Satisfaction in the Context of the Small Business Environment”, MIS Quarterly, 1988.
[39]Rivard, S. and S.L. Huff. “Factors of Success of End User Computing”, Communications of the ACM, 1988.
[40]Bentler, P.M. and C.P. Chou, “Practical Issues in Structural Modeling,” Sociological Methods & Research, 1987, pp.78-117.
[41]Breckler, S. J. “Applications of covariance structure modeling in psychology: Cause for concern?” Psychological Bulletin, 1990, pp. 260-273.
[42]Hair et al., “Multivariate Data Analysis,” Prentice Hall, New Jersey, 1998.
[43]Tanaka, J. S. “How Big is Enough? Sample Size and Goodness-of-Fit in Structural Equation Models with Latent Variables,” Child Development,Vol.58, 1987, pp. 134-146.
[44]Guielford, J.P., Psychometric Methods, 2nd ed. McGraw-Hill, New York, 1965.
[45]Kaiser, H.F., “An index of factorial simplicity," Psychometrika, Vol.39, 1974, pp. 31-36
[46]Bollen K. A., & Long, J. S. “Testing Structural Equation Models”. Newbury Park: Sage, 1993.
[47]Bollen K. A. “Structural equations with latent variables”. New York: John Wiley &. Sons 1989.
[48]Marsh, H. W. “Confirmatory factor analyses of multitrait-multimethod data: Many Problems and a few solutions”. Applied Psychological Measurement, 13, 1989, pp. 335-361.
[49]Tanaka, J. S. “Multifaceted conceptions of fit in structural equation models”. In K. A. 1993.
[50]Hu, L. T. & Bentler, P. M. “Evaluating model fit. In R. H. Hoyle (Ed.) , Structural equation modeling: Concepts, issues and applications”. Thousand Oaks, CA: Sage, 1995.
[51]Ajzen, I. & Fishbein, M. Understanding Attitudes and Predicting Social Behavior. 1980, Englewood Cliffs, NJ: Prentice-Hall.
[52]Burns, Tom & G. M. Stalker., The management of innovation, London: Tavistock, 1961, pp. 119-125.
[53]Corbitt B. J., T. Thanasankit and H. Yi, “Trust and E-Commerce: A Study of Consumer Perception,” Electronic Commerce Research and Application, Vol. 2, No. 3, 2003, pp. 203-215.
[54]Cox, D., Rich, S., Perceived Risk and Consumer Decision Making-The Case of Telephone Shopping, Journal of Marketing Research, November 1964, pp. 32-39.
[55]Cox, D. F., and Rich, S. U. “Perceived risk and consumer decision making - the case of telephone shopping,” in Cox, D. F.(Ed.), Risk Taking and Information Handling in Consumer Behavior, 1967, Graduate School of Business Administration, Harvard University Press, Bobson, MA, pp.487-506.
[56]Cox, D. F. “Risk Handling in Consumer Behavior an Intensive Study of Two Cases,” in Cox, D. F.(Ed.), Risk Taking and Information Handling in Consumer Behavior, 1967, Graduate School of Business Administration, Harvard University Press, Bobson, MA, pp.34-81.
[57]Davis , F. D. , “Perceived Usefulness , Perceived Ease of use , and User Acceptance of Information Technology,” MIS Quarterly, 1989, Vol. 13, No. 3, pp. 319-342.
[58]Detmar W. Straub and James C. Wetherbe, “Information Technologies for the 1990s: An Organizational Impact Perspective”, Communications of the ACM, Vol.32, No.11, November, 1989, pp.1382-1339.
[59]Epstein, S., Pacini, R., Denes-Raj, V., & Heier, H. Individual differences in intuitive-experiential and analytical-rational thinking styles. Journal of Personality & Social Psychology, 1996, Vol. 71, pp. 390-405.
[60]Hsu, M.H., Chiu, C. M. and Kuo, F. Y., “An Empirical Examination of the Relationship Between the Internet Self-Efficacy and E-Service Usage,” 2002, Working Paper.
[61]Keeler Len L, “How to Wxtend Your E-Mail Reach”, Supervisory Management, Aug, 1995, pp.7-8.
[62]Fulk J., Schmitz J. and Ryu D., “Cognitive elements in the social construction of communication technology”, Management Communication Quarterly (8:3), 1995, pp. 259-288.
[63]Myers, I. B., and McCaulley, M. H., Manual: A Guide to the Development and Use of the Myers-Briggs Type Indicator, 2nd ed., 1985, Consulting Psychologists Press, Inc., Palo Alto, CA, p. 309.
[64]Pugh, D. S., Hickson, D.J., Hinings, C. R. , & Turner, C., Dimensions of Organizational Structure, Adminstration Science Quarterly, 1968, Vol. 13, pp. 65-105.
[65]Raymond Bauer, “Consumer Behavior as Risk-Taking,” in Donald F. Cox, ed., Risk Taking and Information Handling in Consumer Behavior, 1960, pp. 23-33.
[66]Rudy I A., “A critical review of research on electronic mail”, European Journal of Information Systems, Vol.4, 1996, pp.198-213.
[67]Sproull Lee. and Kiesler Sara, “Reducing social context clues: electronic mail in organizational communication”, Management Science Vol.32, No.11, 1986, pp.1492-1512.
[68]Sproull R. F., “A Lesson in Electronic Mail on Connection”, Camgridge, MA: The MIT Press, 1991, pp.177-184.
[69]Walster, R., G. Walster, and E. Berschied, Equity: Theory and Research, 1978, Allyn and Bacon, Needham Heights, MA.
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top