跳到主要內容

臺灣博碩士論文加值系統

(44.192.79.149) 您好!臺灣時間:2023/06/10 03:33
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

: 
twitterline
研究生:鍾文鑑
研究生(外文):Wen-Chien Chung
論文名稱:以科技接受模式探討消費者對光纖寬頻網路使用行為意向之影響因素
論文名稱(外文):Using Technology Acceptance Model to Explore the Antecedents of FTTB User’s Behavioral Intention
指導教授:胡凱傑胡凱傑引用關係
指導教授(外文):Kai-Chieh Hu
學位類別:碩士
校院名稱:開南大學
系所名稱:物流與航運管理系
學門:運輸服務學門
學類:運輸管理學類
論文種類:學術論文
論文出版年:2007
畢業學年度:96
語文別:中文
論文頁數:94
中文關鍵詞:科技接受模式系統品質電腦自我效能知覺有用性知覺意用性行為意向
外文關鍵詞:Technology Acceptance ModelSystem QualityComputer Self-EfficacyPerceived UsefulnessPerceived Ease of UseBehavioral Int
相關次數:
  • 被引用被引用:18
  • 點閱點閱:984
  • 評分評分:
  • 下載下載:314
  • 收藏至我的研究室書目清單書目收藏:5
本研究之目的在以科技接受模式來探討消費者對光纖寬頻網路使用行為意向之影響因素為何,並驗證「系統品質」及「電腦自我效能」的外部效果。本研究採結構方程式模式進行假設驗證並分析模式路徑關係。另一方面,亦針對已裝設與未裝設光纖寬頻網路的消費者做分群,以探討其對研究模式之差異。本研究以中華電信北區分公司的客戶為例,針對有使用寬頻網路的使用者進行問卷調查。經由結構方程模式進行驗證,結果發現本研究模式中的路徑關係均達統計顯著性,且系統品質與電腦自我效能對於科技接受模式有顯著正向的影響。因此,本研究認為科技接受模式確實能適用於解釋光纖寬頻使用者的行為意向。此外,分群後的模式驗證結果發現兩群樣本確實存在部份差異。最後依據研究結果,提出管理意涵與後續研究建議之討論。
The purpose of this research is to use technology acceptance model (TAM) to explore the antecedents of fiber to the building (FTTB) user’s behavioral intention. This study also tests the external effects of system quality and computer self-efficacy. We apply the structural equation model to test the hypotheses and the relationships in the research model. On the other hand, the difference between the two sample sets which were divided by using or not using FTTB is also explored. We took the Chunghwa Telecom Northern Taiwan Business Group as an example. The data was collected by questionnaires to CHT’s users who had the experience of useing broadband before. After model fitness testing by SEM.The results show that all relationships in the research model are statistical significant. It indicates that the system quality and computer self-efficacy have positive and significant influences on TAM. Thus, we think that TAM can be use to explain the FTTB user’s behavioral intention. Besides, there are some differences between two groups after making further model test and path analysis. Finally, this study discussed the managerial implications and offered suggestions for the future researches.
誌 謝 I
中文摘要 II
英文摘要 III
圖目錄 VI
表目錄 VIII
第一章 緒論 1
1.1 研究背景與動機 1
1.2 研究目的 3
1.3 研究範圍 3
1.4 研究流程 3
第二章 文獻回顧 5
2.1 寬頻網路之現況與發展趨勢 5
2.1.1 寬頻網路接取方式 5
2.1.2 寬頻網路之現況 11
2.2 科技接受模式 13
2.2.1 科技接受模式的理論基礎 13
2.2.2 科技接受模式的基本假設 21
2.2.3 科技接受模式的相關研究 21
2.3 影響光纖寬頻接取網路的外部變項相關研究 29
第三章 研究方法 32
3.1 研究架構 32
3.2 研究假設 33
3.3 衡量變數與問卷設計 35
3.4 資料蒐集 38
3.5 結構方程式模式 39
3.5.1 基本概念 39
3.5.2 模式架構與理論 41
3.5.3 模式驗證之前提假設 43
3.5.4分析結果的評估 47
3.5.5適配指標之彙整 48
第四章 研究結果 51
4.1 樣本回收與敘述統計 51
4.1.1 樣本回收情況 51
4.1.2 樣本基本資料 51
4.1.3光纖寬頻使用意願調查結果 55
4.2 問卷信度分析 57
4.3 確認性因素分析(CFA) 57
4.3.1 衡量模式分析 58
4.3.2 衡量模式特性分析 65
4.4 路徑分析 66
4.4.1 模式確認 66
4.4.2 違犯估計 68
4.4.3 模式適配分析 70
4.4.4 假設驗證 71
4.5 分群路徑分析 73
4.5.1 已裝設光纖寬頻 73
4.5.2 未裝設光纖寬頻 76
4.5.3 總體樣本、已裝設及未裝設光纖寬頻之比較 79
第五章 結論與建議 82
5.1 結論 82
5.2 建議 83
5.2.1 管理意涵 83
5.2.2 後續研究建議 84
參考文獻 86
附錄一 93
1.于長禧,張秀珍,高春輝,2004。ADSL服務品質,顧客滿意度與購後行為意向之研究-以中華電信為例,中華民國品質學會第10屆全國品質管理研討會論文集,86-102。
2.中華電信公司(http://www.cht.com.tw).
3.中華電信公司企業網站(http://web.cht.com.tw).
4.台灣網路資訊中心(2007/06/01 viewed) (http://www.twnic.net.tw)
5.交通部電信總局(2007/04/01 viewed) (http://www.dgt.gov.tw/)
6.全球寬頻服務市場分析資料庫 (2007/06/01 viewed) (http://point-topic.com)
7.何文斌,2001,國小行政人員網路素養對行政網路資訊系統接受度之研究~以台南市為例,台南師院國民教育研究所碩士論文。
8.何丞世,2005,WDM光網路之動態保護與可存活性設計,臺灣大學電機工程學研究所博士論文。
9.余泰魁、楊淑裴,2005,線上學習系統使用意向之模式建構與比較分析研究,台灣管理學刊,第五卷,第二期,311-338。
10.吳明隆,2006,結構方程模式SIMPLIS的應用,五南圖書出版股份有限公司。
11.吳肇銘,1998,影響網站使用意向之因素研究— 以入門網站為例,國立中央大學資訊管理研究所博士論文。
12.李墾典,2004,消費者使用不動產銷售網站認知與態度之研究,逢甲大學土地管理所碩士論文。
13.周家慧、張善斌、范垂仁、顧為元,2004,綜合所得稅網路結算申報系統的接受度研究,電子商務研究,第二卷,第四期,359-380。
14.周素華,1993,電子通訊科技使用行為之研究,交通大學土木工程研究所碩士論文。
15.周景弘,1996,「網路銀行安全性對使用者知覺風險與使用意願之研究」,台灣大學會計研究所未出版碩士論文。
16.周鴻志,2004,科技接受模式在遠距教學網站之應用,政治大學資管所碩士論文。
17.林鈴玉,2001,“國內網路銀行現況發展及交易安全之研究”,碩士論文,國立交通大學。
18.林甘敏、陳年興,2001,網路大學學習問題探討,全球華人學習科技研討會論文集。
19.林師模、陳苑欽,2003,多變量分析,雙葉書廊有限公司。
20.林清山,1984,線性結構關係(LISREL)電腦程式的理論與應用,測驗年刊,第31輯,149-164。
21.洪明洲,1999,網路教學課程設計對學習成效的影響研究,遠距教學系統化教材設計國際研討會論文集。
22.紀雅惠,2003,影響使用網站因素之研究-以寬頻使用者為例,台灣科技大學資管所碩士論文。
23.胡凱傑,2003,應用服務品質量表與知覺價值模式探討旅客在消費意願之影響因素:以汽車客運業為例,交通大學運輸科技與管理學系博士論文。
24.耿慶瑞、黃增隆、汪志堅,2006,互動性對科技接受模式的影響-以政府入口網站為例,商管科技季刊,第七卷,第三期,509-530。
25.馬信行,1999,線性結構模式在教育上的應用及所遭遇之問題,教育與心理研究,第二十二卷,第一期, 1-13。
26.張淑敏,2005,從行為理論探討消費者對芳香精油之認知與行為模式,經營管理論叢,第一屆管理與決策2005年學術研討會特刊,149-163。
27.張朝旭 ,2003,寬頻衛星網際網路動態尋徑策略之研究,中央大學資訊工程研究所博士論文。
28.梁世安、余國瑋,2005,以科技接受模式探討二輪式電動代步車消費者接受程度,行銷評論,第二卷,第二期,135-148。
29.陳焜元,1996,行政管理資訊系統使用者參與效果之研究- - 技術接受性模式檢証,國立政治大學公共行政學系碩士論文。
30.陳雲龍,2003,中華電信股份公司電信訓練園地。
31.陳毓璋,1998,在有線電視系統上建立可保證品質的高頻寬網路 ,中山大學資訊工程研究所博士論文。
32.焦金強,1997,非同步傳輸模式網路上資源規劃及控制架構之設計與分析 ,中正大學電機工程學系博士論文。
33.黃宇寰,劉忠陽,2004。應用科技接受模型對行動上網服務使用者行為之研究,傳播管理學刊,第五卷,第二期,96-109。
34.楊玉霜,2003,非同步模式網路最佳化及模糊適應預估之流量控制,交通大學電信工程系博士論文。
35.資策會網站(2007/04/01 viewed) (http://www.find.org.tw)
36.劉台順,2004,,醫院網路掛號接受度之研究—以某醫學中心為例,銘傳大學資管系碩士論文。
37.Agarwal, R. and Prasad, J. (1999) “Are individual differences germane to the acceptance of new information technologies?” Decision Sciences, 30(2), 361-391.
38.Agarwal, R., Sambamurthy, V., and Stair, R. M. (2000) “Research report: The evolving relationship between general and specific computer self-efficacy – An empirical assessment,” Information Systems Research, 11(4), 418–430.
39.Ajzen, I. (1985) “From intention to actions: A theory of planned behavior,” In J. Kuhland J. Beckmann (Eds), Action control: From cognition to behavior, Berlin Heidelberg Springer-Verlag , 11-39.
40.Ajzen, I. and Madden , T. J. (1986) “Prediction of goal–directed behavior: attitudes,intention and perceived behavioral control,” Journal of Experimental Social Psychology, 22 , 453-474.
41.Anderson, J. C. and Gerbing, D. W. (1988) “Structural equation modeling in practice: A review and recommende, Two-Step Approach,” Psychological Bulletin, 103(3), 411-423.
42.Bandura, A. (1986) Social Fundations of Thought and Action: A Social Cognitive Theory, Englewood, Cliffs NJ: Prentice-Hall.
43.Bandura, A. (1982) “Self-efficacy mechanism in human agency,” American Psychologist, 37(2), 122-147.
44.Benveniste, J. (2000) “IP technology clearinghouse: Feeding the VoIP frenzy,” Telecommunications, 34(11), 95-96.
45.Busselle, R., Reagan, J., Pinkleton, B., and Jackson, K. (1999) “Factors affecting internet use in a saturated-access population,” Telematics and Informatics, 16, 45-58.
46.Chau, P. Y. K. and Hu, P. J. (2002) “Examining a model of information technology acceptance by individual professionals: An exploratory study,” Journal of Management Information Systems, 18(4), 191-229.
47.Collins, D. (2001) Carrier Grade Voice over IP, McGraw-Hill.
48.Compeau, D. R. and Higgins C.A. (1995a) “Application of social cognitive theory to training for computer skill,” Information Systems Research, 6(2), 118-143.
49.Compeau, D. R., and Higgins, C. A. (1995b) “Computer self-efficacy: development of a measure and initial test,” MIS Quarterly, 19, 189-211.
50.Compeau, D. R., Higgins, C. A. and Huff, S. (1999) “Social cognitive theory and individual reactions to computing technology: A longitudinal study,” MIS Quarterly, 23(2), 145-158.
51.Cronbach, L. J. (1951) “Coefficient alpha and the internal structure of tests,” Psychometrika, 16, 297-334.
52.Davies, F., Goode, M., Mazance, J. and Moutinho, L. (1999) “LISREL and neural network modeling: Two comparison studies,” Journal of Retailing and Consumer Services, 6(4), 249-261.
53.Davis, F. D. (1989) “Perceived usefulness, perceived ease of use, and user acceptance of information technology,” MIS Quarterly, 13(3), 319-340.
54.Davis, F. D., Bagozzi, R. P. and Warshaw, P. R. (1989) “User acceptance of computer technology: A comparison of two theoretical models,” Management Science, 35(8), 982-1002.
55.Davis, F. D., Bagozzi, R. P. and Warshaw P. R. (1992) “Extrinsic and intrinsic motivation to use computers in the workplace,” Journal of Applied Social Psychology, 22, 1111-1132.
56.Delone, W. H. and McLean, E. R. (2003) “The DeLone and McLean model of information system success: A ten-year update”, Journal of Management Information System, 19(4), 9-30.
57.DeLone, W. H. and McLean, E. R. (1992) “Information systems success: The quest for the dependent variable, information systems requirements, media richness and structural design,” Management Science, 3(1), 60-95.
58.Dishaw, T. and Strong, M. (1999) “Extending the technology acceptance model withtask-technology fit constructs,” Information and Management, 36, 9-21.
59.Dratva, R. (1995) “WWW-based home banking services in Switzerland: A case study,” Computer Networks and ISDN System, 28, 199-208.
60.Fishbein, M. and Ajzen, I. (1975) Belief, Attitude, Intention and Behavior: An Introduction to Theory and Research, Addsion-Wesley, Reading MA..
61.FTTx & PLC產業交流會(2007/04/01 viewed) (http://www.fttx.org.tw)
62.Gefen, D., Karahanna, E. and Straub, D.W. (2003) “Trust and TAM in online shopping: An integrated model,” MIS Quarterly, 27(1), 51-90.
63.Gist, M., Schwoerer, C. and Rosen, B. (1989) “Effects of alternative training methods on self-efficacy and performance in computer software training,” Journal of Applied Psychology, 74(6), 884–891.
64.Hair Jr., J. F., Anderson, R. E., Tatham, R. L. and Black, W. C. (1998) Multivariate Data Analysis, 5th ed., Prentice Hall College Div.
65.Hatcher, L. (1998) A Step-by-Step Approach to Using the SAS System for Factor Analysis and Structural Equation Modeling, 3rd Printing, SAS Institute Inc.
66.Hartwick, J. and Barki, H. (1994) “Explaining the role of user participation in information system use,” Management Science, 40(4), 440-465.
67.Hoffman, D. L. and Novak, T. P. (1996) “Marketing in hypermedia computer-mediated environments: Conceptual foundations,” Journal of Marketing, 60(7), 50-68.
68.Hoffman, D. L., Novak, T. P. and Peralta, M. (1999) “Building consumer trust online,” Communication of the ACM, 42(4), 80-85
69.Hollenbeck, J. R., O’Leary, A. M., Klein, H. J., and Patrick, M. W. (1989) “Investigation of the construct validity of a self-report measure of goal commitment,” Journal of Applied Psychology, 74(6), 951-956.
70.Hoyle, R. H. (1995) Structural Equation Modeling: Concepts, Issues, and Applications, Newbury Park: Stage.
71.Hu, P. J., Chau, P. Y. K., Sheng, O. R. L. and Tam, K. Y. (1999) “Examining the technology acceptance model using physician acceptance of telemedicine technology,” Journal of Management Information Systems, 16(2), 91-112.
72.Igbaria, M., Guimaraes, T. and Davis G. B. (1995) “Testing the determinants of microcomputer usage via a structural equation model,” Journal of Management Information Systems, 11(4), 87-114.
73.Igbaria, M. and Iivari, J. (1995) “The Effects of Self-Efficacy on Computer Usage,” Omega, 23(6), 587-605.
74.Jackson, C. M., Chow, S. and Leitch, R, A. (1997) “Toward an understanding of the behavioral intention to use an information system,” Decision Sciences, 28(2), 357-389.
75.Janda, S., Trocchia, P. J. and Gwinner, K. P. (2002) “Consumer perceptions of Internetretail service quality,” International Journal of Service Industry Management, 13(5), 412-431.
76.Jöreskog, K. G. and Sörbom, D. (1993) LISREL8: User’s Reference Guide, Chicago, IL: Scientific Software Internationl.
77.Kuppam, A. R., Pendyala, R. M. (2001) “A structural equation analysis of commuters’ activity and travel patterns,” Transportation, 28(1), 33-54.
78.Lanford, D. (1996) “Ethics and the internet: Appropriate behavior in electronic communication,” Ethics & Behavior, 6, 91-106.
79.Lederer, A. L., Maupin, D. J., Sena, M. P. and Zhuang, Y. (2000) “The technology acceptance model and the world wide web,” Decision Support Systems, 29(3), 269-282.
80.Lin, J. C. C. and Lu, H. (2000) “Towards an understanding of the behavioural intention to use a web site,” International Journal of Information Management, 20, 197-208.
81.Locke, E. A., Fredrick, E., Bobko, P. and Lee, C. (1984) “Effect of self-efficacy, goals, and task strategies on task performances,” Journal of Applied Psychology, 69, 241-251.
82.Loh, L. and Ong, Y. (1998) “The adoption of internet-based stock trading: a conceptual framework and empirical results,” Journal of Information Technology, 13, 81-94.
83.Marakas, M. M., Yi, M. Y. and Johnson, R. D. (1998) “The multilevel and multifaceted character of computer self-efficacy: Toward clarification of the construct and an intergrative framework of research,” Information Systems Research, 9(2), 126-163.
84.Mathieson, K. (1991) “Predicting user intensions: Comparing the technology acceptance model with the theory of planned behavior,” Information Systems Research, 2(3), 173-191.
85.Miyazaki, A. D. and Fernandez, A. (2001) “Consumer perceptions of privacy and security risks foronline shopping,” The journal of Consumer Affairs, 35(1), 27-44.
86.Moore, G. C. and Benbasat, I. (1991) “Development of an instrument to measure the perceptions of adopting an information technology innovation,” Information Systems Research, 2(3), 192-222.
87.Padmanabhan, V. N. and Mogul, J. C. (1996) “Using predictive prefetching to improve world wide web latency,” ACM SIGCOMM Computer Communication Review Archive, 26(3), 22-36.
88.Petrus, G. and Nelson, O. N. (2006) “Borneo online banking: evaluating customer perceptions and behavioural intention,” Management Research News, 29(1/2), 6-15.
89.Rogers, E. M. (1983) Diffusion of Innovations, 3rd, New York Free Press.
90.Ron, T., Deborah, C. and Chris, H. (2006) “Intentions to use information technologies: An integrative model,” Journal of Organizational and End User Computing, 18(3), 25-46.
91.Seddon, P. B. and Kiew, M. Y. (1994) “A partial test and development of DeLone and McLean’s model of IS success,” Proceedings of the International Conference on Information Systems, Vancouver, Canada (ICIS 94), 99-110.
92.Steven John Simon and David Paper (2007) “User acceptance of voice recognition technology: An empirical extension of the technology acceptance model,” Journal of Organizational and End User Computing, 19(1), 24-50.
93.Szajna, B. (1996) “Empirical evaluation of the revised technology acceptance model,” Management Science, 42(1), 85-92.
94.Tabachnick, B. G. and Fidell, L. S. (1996) Using m ultivariate statistics, 3rd ed., New York, NY: HarperCollins.
95.Tanaka, J. S. and Huba, G. J. (1984) “Confirmatory hierarchical factor analysis of psychological distress measures,” Journal of Personality and Social Psychology, 46, 621-635
96.Taylor, S. and Todd, P. A. (1995) “Assessing IT usage: The role of prior experience,” MIS Quarterly, 19(4), 561-570.
97.Thompson, R. L., Higgins, C. A. and Howell, J. M. (1991) “Personal computing: Toward a conceptual model of utilization,” MIS Quarterly, 15(1), 124-143.
98.Venkatesh, V. (2000) “Determinants of perceived ease of use: Integrating control, intrinsic motivation and emotion into the technology acceptance model,” Information Systems Research, 11(4), 342–365.
99.Venkatesh, V. and Davis, F. D. (1996) “A model of the antecedents of perceived ease of use: Development and test,” Decision Sciences, 27(3), 451–482.
100.Venkatesh, V., Morris, M. G., Davis, G. B. and Davis, F. D. (2003) “User acceptance of information technology: Toward a unified view,” MIS Quarterly, 27(3), 425-478.
101.Vessey, I. and Galletta, D. (1991) “Cognitive fit: An empirical study of information acquisition,” Information Systems Research, 2(1), 63-86.
102.Wang, H., Lee, M. K. O. and Wang, C. (1998) “Consumer privacy concerns about internet marketing,” Communication of the ACM, 41(3), 63-70.
103.Wendy, A. R., Kristen, G. and Elizabeth, F. (1997) “An analysis of automaticteller machine usage by older adults: A structured interview approach,” Applied Ergonomics, 28, 173-180.
104.Wilinsky, C. and Sylvester, J. (1992) “Privacy in the telecommunication age,” Communication of the Acm, 35(2), 23-25.
105.Wood, R. and Bandura, A. (1989a) “Impact of conceptions of ability on self-regulatory mechanisms and complex decision making,” Journal of Personality and Social Psychology, 56(3), 407-415.
106.Wood, R. and Bandura, A. (1989b) “Social Cognitive Theory of Organizational Management,” Academy of Management Review, 14(3), 361-384.
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top
1. 25. 馬信行,1999,線性結構模式在教育上的應用及所遭遇之問題,教育與心理研究,第二十二卷,第一期, 1-13。
2. 24. 耿慶瑞、黃增隆、汪志堅,2006,互動性對科技接受模式的影響-以政府入口網站為例,商管科技季刊,第七卷,第三期,509-530。
3. 20. 林清山,1984,線性結構關係(LISREL)電腦程式的理論與應用,測驗年刊,第31輯,149-164。
4. 13. 周家慧、張善斌、范垂仁、顧為元,2004,綜合所得稅網路結算申報系統的接受度研究,電子商務研究,第二卷,第四期,359-380。
5. 26. 張淑敏,2005,從行為理論探討消費者對芳香精油之認知與行為模式,經營管理論叢,第一屆管理與決策2005年學術研討會特刊,149-163。
6. 28. 梁世安、余國瑋,2005,以科技接受模式探討二輪式電動代步車消費者接受程度,行銷評論,第二卷,第二期,135-148。
7. 33. 黃宇寰,劉忠陽,2004。應用科技接受模型對行動上網服務使用者行為之研究,傳播管理學刊,第五卷,第二期,96-109。
8. 王靜如 (2001):小學教師科學本質概念及教學之研究。科學教育學刊, 9(2), 197-217。
9. 王靜如、周金燕和蔡瑞芬 (2006):國小教師科學教學基準系列報導(二)科學本質與科學探究。屏東教大科學教育, 23, 3-17。
10. 巫俊明 (1997):歷史導向物理課程對學生科學本質的了解、科學態度、及物理學科成績之影響。物理教育, 1(2), 64-84。
11. 林陳涌 (1996):「了解科學本質量表」之發展與效化。科學教育學刊, 4(1), 31-58。
12. 洪振方 (2003): 探究式教學的歷史回顧與創造性探究模式之初探。高雄師大學報, 15, 641-662。
13. 高慧蓮 (2006):九年一貫課程提升學生科學本質能力指標表現可行教學模組之開發研究。科學教育學刊, 14(4), 401-425。
14. 莊嘉坤 (1999):從認同的觀點分析學童對科學本質的了解與科學生涯的知覺。科學教育學刊, 7(4), 343-366。
15. 郭重吉 (1992):從建構主義的觀點探討改進中小學數理教學的改進。科學發展月刊, 20(5), 548-570。