(3.238.7.202) 您好!臺灣時間:2021/03/04 21:36
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果

詳目顯示:::

我願授權國圖
: 
twitterline
研究生:王信雄
研究生(外文):Hsin-Hsiung Wang
論文名稱:制度型信任機制與知覺風險影響企業資訊安全委外意願之研究
論文名稱(外文):The Effects of Institutional-Based Trust and Perceived Risk on Business Information Security Outsourcing Intention
指導教授:張俊陽張俊陽引用關係
指導教授(外文):Chun-Yang Chang
學位類別:碩士
校院名稱:國立高雄應用科技大學
系所名稱:資訊管理系碩士在職專班
學門:電算機學門
學類:電算機一般學類
論文種類:學術論文
論文出版年:2008
畢業學年度:96
語文別:中文
論文頁數:63
中文關鍵詞:制度型信任機制信任資訊安全委外知覺風險委外意願
外文關鍵詞:Institutional-based TrustTrustInformation Security OutsourcingPerceived RiskOutsourcing Intention
相關次數:
  • 被引用被引用:0
  • 點閱點閱:290
  • 評分評分:系統版面圖檔系統版面圖檔系統版面圖檔系統版面圖檔系統版面圖檔
  • 下載下載:45
  • 收藏至我的研究室書目清單書目收藏:4
本研究以制度型信任機制為前置變數,探討對資訊安全承包商的信任與企業知覺風險的關係,進而對企業資訊安全委外意圖之影響。
本研究以職專班學生以及其公司同仁,並且在公司內曾經直接參與過相關資訊系統委外業務的經驗者,採取郵寄問卷的方式,總共發出400份問卷,剔除填答不全及問卷回答完全一樣者,有效樣本為229份,有效問卷回收率為57.25﹪。問卷資料利用SPSS12.0與Visul PLS進行資料分析與假說驗證,研究結果發現:
1 制度型信任機制對資訊安全承包商的信任有正向顯著的影響。
2 制度型信任機制中的資訊安全認證機制與資訊安全委外交易機制對知覺風險有負向顯著的影響。
3 對資訊安全承包商的信任與企業知覺風險有負向顯著的影響。
4 對資訊安全承包商的信任與資訊安全委外意圖有正向顯著的影響。
5 企業知覺風險對資訊安全委外意圖有負向顯著的影響。
研究結果,在實務上,可以提供企業與資訊安全承包商擬定與修正策略的參考。在學術上,可以作為後續研究的理論基礎。
關鍵字:制度型信任機制、信任、資訊安全委外、知覺風險、委外意願
The purpose of the research is by Institutional-based Trust extinict cues to discuss the influence & relevance from trust of information security Contractor and Perceived risk of enterprise to Purchase Intention of Information Security Outsourcing.
This research is directly participated the service experience by the Students on the Job and its company colleague in information security outsourcing. To investigate the related information by mailed questionnaires. Totally 400 surveys were issued. Surveys with incomplete answers & with all the same answers were eliminated. The available samples are 229 copies. The retrieved percentage of available samples is 57.25%. According to the purpose of the research, we analyzed the proper statistics with the SPSS12.0 & Visul PLS. The research result reveals:
1. Institutional-Based Trust mechanism leads positive influence to the trust of information security Contractor.
2. The authentication, outsourcing transaction of information security Perceive Risk of enterprise leads significant influence to Institutional-Based Trust mechanism.
3. Reverse influence between Perceive Risk of enterprise & the trust of Information Security Contractor.
4. Significant influence between the trust of Information Security Contractor & the intension of Information Security Outsourcing.
5. Perceive Risk of enterprise leads significant influence to the intension of Information Security Outsourcing.
The result of the research, in conclusion, can be good references for the enterprise and the information security contractor to modify the strategies. In theory, it also takes the following research the rationale.
Key words:Institutional-based Trust, Trust, Information Security Outsourcing, Perceived Risk, Outsourcing Intention
中文摘要 -------------------------------------------------------------------------- i
英文摘要 -------------------------------------------------------------------------- ii
誌謝 -------------------------------------------------------------------------- iii
目錄 -------------------------------------------------------------------------- iv
表目錄 -------------------------------------------------------------------------- v
圖目錄 -------------------------------------------------------------------------- vi
第一章、 緒論-------------------------------------------------------------------- 1
1.1 研究背景與動機----------------------------------------------------- 1
1.2 研究目的-------------------------------------------------------------- 3
1.3 研究流程-------------------------------------------------------------- 4
第二章、 文獻探討-------------------------------------------------------------- 5
2.1 資訊安全委外意願之定義----------------------------------------- 5
2.2 知覺風險之定義----------------------------------------------------- 6
2.3 對資訊安全承包商的信任之定義--------------------------------- 7
2.4 制度型信任------------------------------------------------------------ 9
2.4.1 制度型信任的定義--------------------------------------------------- 9
2.4.2 制度型信任的機制--------------------------------------------------- 10
第三章、 研究方法-------------------------------------------------------------- 11
3.1 研究模式-------------------------------------------------------------- 11
3.2 各構念間之關係及假設推論-------------------------------------- 12
3.2.1 對資訊安全承包商的信任與資訊安全委外意願之間的關係--------------------------------------------------------------------------- 12
3.2.2 知覺風險與資訊安全委外意願之間的關係--------------------- 12
3.2.3 知覺風險與對資訊安全承包商的信任之關係------------------ 12
3.2.4 制度型信任機制、對資訊安全承包商的信任及知覺風險之間的關係--------------------------------------------------------------- 12
3.3 研究假說彙整--------------------------------------------------------- 14
3.4 研究對象--------------------------------------------------------------- 15
3.5 量表之發展------------------------------------------------------------ 15
3.5.1 操作性定義、衡量構面及問卷設計------------------------------ 15
3.6 問卷設計--------------------------------------------------------------- 25
3.6.1 初稿設計-------------------------------------------------------------- 25
3.6.2 前測--------------------------------------------------------------------- 25
3.6.3 試測--------------------------------------------------------------------- 25
3.6.4 資料蒐集--------------------------------------------------------------- 26
3.6.5 資料分析方法--------------------------------------------------------- 26
第四章、 資料分析資料分析與發現------------------------------------------ 28
4.1 樣本資料敘述性統計分析----------------------------------------- 28
4.2 研究架構之信效度分析-------------------------------------------- 30
4.3 研究假說暨結構模型檢定----------------------------------------- 31
第五章、 結論與建議----------------------------------------------------------- 35
5.1 研究結論-------------------------------------------------------------- 35
5.2 管理意涵與實務建議----------------------------------------------- 36
5.2.1 管理意涵-------------------------------------------------------------- 36
5.2.2 實務建議-------------------------------------------------------------- 37
5.3 研究限制與後續研究建議----------------------------------------- 38
參考文獻 英文文獻-------------------------------------------------------------- 40
附錄一 初稿問卷--------------------------------------------------------------- 48
附錄二 問卷初稿專家審查名單--------------------------------------------- 52
附錄三 專家問卷審查建議與處理結果------------------------------------ 53
附錄四 試測問卷--------------------------------------------------------------- 55
附錄五 正式問卷--------------------------------------------------------------- 59
附錄六 統計操作資料-------------------------------------------------------- 63

表 目 錄
表2-1 資訊安全委外定義彙整表------------------------------------------------- 5
表2-2 知覺風險定義彙整---------------------------------------------------------- 6
表2-3 信任定義彙整表------------------------------------------------------------- 8
表2-4 制度型信任定義彙整表---------------------------------------------------- 10
表3-1 本研究假說彙整表---------------------------------------------------------- 14
表3-2 制度型信任機制衡量構面文獻彙整表---------------------------------- 15
表3-3 對資訊仲介商的信任衡量問項表---------------------------------------- 17
表3-4 資訊安全認証標章衡量問項表------------------------------------------- 18
表3-5 資訊安全委外交易契約機制衡量問項表------------------------------- 18
表3-6 資訊安全委外的衡量構面------------------------------------------------- 19
表3-7 資訊安全委外意願衡量問項表------------------------------------------- 20
表3-8 信任衡量問項表------------------------------------------------------------- 21
表3-9 知覺風險之衡量構面彙整表---------------------------------------------- 22
表3-10 知覺風險衡量問項表------------------------------------------------------- 23
表3-11 各變數之操作化參考來源衡量問項彙整表---------------------------- 24
表3-12 前測各構面之信度表------------------------------------------------------- 26
表4-1 樣本資料表------------------------------------------------------------------- 28
表4-2 企業基本資料表------------------------------------------------------------- 29
表4-3 各變數之信度分析與平均變異萃取量表------------------------------- 30
表4-4 各變數之相關係數與平均變異萃取量平方根------------------------- 31
表4-5 各構念因素之整合模式研究假設檢定結果彙總表------------------- 32

圖 目 錄
圖1 本研究程序------------------------------------------------------------------- 4
圖2 本研究模式圖---------------------------------------------------------------- 11
圖3 研究模式假說檢定結果---------------------------------------------------- 32
1.Abdul-Rahman, A., and Hailes, S., “Supporting Trust in Virtual Communities”. In the Proceedings of 33th Hawaii International Conference on System Sciences, Maui, Hawaii, 2000.
2.Anderson, J.C. and Narus, J.A., “A model of Distributor Firm and Manufacturer Firm Working Partnerships”, Journal of Marketing,Vol. 54,1990 , pp.42-58.
3.Bagozzi, R.P., “Attitudes, Intentions, and Behavior: A Test of Some Key Hypotheses”, Journal of Personality and Social Psychology,Vol. 41 ,1981 , pp.607-627.
4.Bakos, J.Y., “The emerging role of electronic marketplaces on the internet.” Communications of The ACM, Vol. 41, No. 8, pp.25-54, 1998.
5.Barthelemy, J., “The Hidden Costs of IT Outsourcing”, MIT Sloan Management Review,2001 ,pp. 60-69.
6.Bauer, R.A., “Consumer Behavior As Risk-Taking”, In Dynamic Marketing for A Changing World, Chicago: America Marketing Association,1960 , pp.389-398.
7.Benamati, J. and Rajkumar, T.M., “The application development outsourcing decision: an application of the technology acceptance model”, The Journal of Computer Information System, Vol. 42, No. 4,2002 , pp.35-43.
8.Benoit, A. Aubert, Suzanne, Rivard and Patry Michel, “A transaction cost model of IT outsourcing”, Information and Management, Vol 41, 2004, pp. 921-932.
9.Blau, P.M., “Exchange and Power in Social Life”, New York: John Wiley and Sons, 1964.
10.Boon, S.D.and Holmes, J.G. “The Dynamics of Interpersonal Trust:Resolving Uncertainty in the Face of Risk”, in Robert A. Hinde and Jo Groebel(eds.), Cooperation and Personal Behavior, New York: Cambridge University ,1985 , pp:190-211.
11.Colette, F., R. Shooter, and K. Allan, “IT Security Outsourcing - How Safe is your Security?” Computer Law and Security Report, Vol. 18, No. 2 ,2002 , pp.109-111.
12.Corritore, C.L., Kracher. B and Wiedenbeck, S., “On-Line Trust Concepts, Evolving Theme, A Model,” International Journal of Human-Computer Studies, Vol. 58 ,2003 , pp.737-758.
13.Cox, D.F., “Risk Handling In Consumer Behavior: An Interactive Study Of Two Cases”, Risk Taking And Information Handling In Consumer Behavior, Boston: Harvard University Press ,1967 , pp.34-81.
14.Crosby, L.A., Evans, K.R. and Cowles, D., “Relationship Quality in Service Selling:An Interpersonal Influence perspective”, Journal of Marketing, Vol. 54, July ,1990 , pp.68-81.
15.Cunningham, S.M., “The Major Dimensions Of Perceived Risk”, In Donald, F. Cox (Eds), Risk Taking And Information Handling In Consumer Behavior, Boston : Harvard University Press,1967 , pp.82-108.
16.Cyr, D. and Bonanni, C., “Gender and website design in e-business”, International Journal of Electronic Business, Vol. 3, No. 6 ,2005 , pp.565-582.
17.Das, T.K and Teng, B., “Between Trust and Control: Developing Confidence In Partner Cooperation in Alliances”, Academy of Management Review, Vol. 23, No. 3, 1998 , pp.491-512.
18.Debar, H. and Viinikks, J., “Security information management as an outsourced service”, Information Management and Computer Security, Vol. 14, No. 5 ,2006 , pp.416-434.
19.Deutsch, M., “The effect of motivational orientation upon trust and suspicion”, Human Relations, Vol. 13 ,1960 , pp.123-139.
20.Dirks, K.T., “The effects of interpersonal trust on work group performance”, Journal of Applied Psychology, Vol. 84, No. 3, 1999, pp.445-455.
21.Doney, P.M. and Cannon, J.P., “An examination of the nature of trust in buyer-seller relationships”, Journal of Marketing, Vol. 61 ,1997 , pp.25-61.
22.Dowling, G.R. and Stalin, R., “A Model of Perceived Risk and Intended risk-handling activity”, Journal of Consumer Research, Vol. 21 , 994 , pp.119-134.
23.Due, R.T., “The Real Costs of Outsourcing”, Information System Management, 1992 , pp.78-81.
24.Emerson, R.M., “Power-Dependence Relations”, American Sociological Review, Vol. 27 ,1962 , pp.31-41.
25.Engel, J.F., Blackwell, R.D., and Minard, P.W., “Consumer Behavior (8th ed.)”. Chicago: Dryden, 1995.
26.Eloff, M.M. and Von Solms, S.H., “Information Security Management: A Hierarchical Framework for Various Approaches”, Computers and Security , Vol. 19, No. 3 ,2000 , pp.243-256.
27.Elmuti, D. and Kathawala, Y., “The effects of global outsourcing strategies on participants’ attitude and organizational effectiveness”, International Journal of Manpower, Vol. 21, No. 2, 2000, pp. 112-128.
28.Endorf, C., “Outsourcing security: the need, the risks, the providers, and the process”, Information Systems Security, Vol. 12, No. 6, 2004, pp.17-23.
29.Featherman, M., “Is perceived risk germane to technology acceptance research?” Paper Presented at AMCIS Proceedings, Boston, MA, 2001.
30.Featherman, M.S. and Pavlou, P.A., “Predicting e-services adoption: a perceived risk perspective”, International Journal of Human-computer Study, Vol. 59, No. 4, 2003, pp.451-474.
31.Finne, T., “Information systems risk management: key concepts and business processes”, Computers and Security, Vol. 19, No. 3, 2000, pp.234-242.
32.Fukuyama, F., “Trust: The Social Virtues and the Creation of Prosperity, The Free Press”, New York, 1995, pp.213-237.
33.Fung, A.R.W., Farn, K.J. and Lin, A.C., “Paper: a study on the certification of the information security management systems”, Computer Standards and Interfaces, Vol. 25, 2003, pp.447-461.
34.Gefen, D., “E-commerce: the role of familiarity and trust”. Omega, Vol. 28, No. 6, 2000, pp.725-37.
35.Gefen, D., “Customer loyalty in e-commerce”, Journal of the Association for Information Systems, Vol. 3, 2002, pp.27-51.
36.Gefen, D., Karahanna, E. and Straub, D. W., “Trust and ATM in online shopping:An integrated model”, MIS Quarterly, Vol. 27, No. 1, 2003, pp.31-120.
37.Giffin, K., “The contribution of studies of source credibility to a theory of interpersonal trust in the communication process”, Psychological Bulletin, Vol. 68, 1967, pp.104-120.
38.Grover, V., Cheon, M.J. and J. Teng, “The Effect of Service Quality and Partnership on the Outsourcing of Information System Functions”, Journal of Management Information Systems, Vol. 12, No. 4, 1996, pp.89-116.
39.Gupta, A. and Hammond, R., “Information systems security issues and decisions for small businesses An empirical examination”, Information management and Computer Security, Vol. 13 No. 4, 2005, pp.297-310.
40.Heshmati, A., “Productivity Growth, Efficiency and Outsourcing in Manufacturing and Service Industries”, Journal of Economic Surveys, Vol. 17, No. 1, 2003, pp.80-112.
41.Huang, S.M., Chang, S.I. and Su, K.H., “Critical Success Factors for Implementing BS7799 Information Security Management System-Based on Petrochemical Industry”, Journal of Information Management, Vol. 13, No. 2, 2006, pp.171-192.
42.Hurley, M. and Schaumann, F., “KPMG survey: the IT outsourcing decision”, Information Management and Computer Security, Vol. 5, No. 4, 1997, pp. 126-132.
43.Jarvenpaa, S.L., Tractinsky, N. and Vitale, M., “Consumer trust in an internet store”, Information Technology and Management, 2000, pp.145-171.
44.Karyda, M., Mitrou, E. and Quirchmayr, G., “A framework for outsourcing IS/IT security services”, Information Management and Computer Security, Vol. 14, No. 5, 2006, pp. 402-415.
45.Keil, M., Cule, P.E., Lyytinen, K., and Schmidt, R.C., “A framework for identifying software project risks”, Communications of the ACM, vol. 41, No. 11, 1998, pp. 76-83.
46.Keil, M., Cule, P. E., Lyytinen, K., and Schmidt, R. C., “A framework for identifying software project risks,” Communications of the ACM, vol.41, No.11, 1998, pp. 76-83.
47.Ketler, K. and Walstrom, J., “The Outsourcing Decision”, International Journal of Information Management, Vol. 13, No. 6, 1993, pp.449-459.
48.Khalfan, Abdulwahed. Mo., “Information Security Considerations in IS/IT Outsourcing Projects: A Descriptive Case Study of Two Sectors”, International Journal of Information Management, Vol. 24, 2004, pp.29-42.
49.Kini, A. and Choobineh, J., “Trust in electronic commerce: Definition and theoretical considerations”, IEEE, 1998, pp.32-120.
50.Korsgaard, M.A., Schweiger, D.M. and Sapienza, H.J., “Building Commitment, Attachment, and Trust in Strategic Decision-Making Teams: The Role of Procedural Justice”, Academy of Management Journal, Vol. 38, No. 1, 1995., pp.60-84
51.Kumar, N., “The Power of Trust in Manufacturer-Retailer Relationships”, Havard Business Review, Vol. 74, No. 6, 1996, pp.93-106.
52.Laabs, J.J., “Successful Outsourcing Depends on Critical Factors”, Personal Journal, 1993, pp.14-50.
53.Lee, J.N. and Y.G. Kim, “Effect of Partnership Quality on IS Outsourcing Success: Conceptual Framework and Empirical Validation”, Journal of Management Information Systems, Vol. 15, No. 4, 1999, pp. 29-61.
54.Lee, M., “IT Outsourcing Contracts : Practical Issues for Management, Working”, Information Systems Department, City University of Hong Kong, Vol.95, No.5, 1995.
55.Lewicki, J.R., Mcallister, J.D. and Bies, R.J., “Trust and Distrust: New Relationships and Realities”, Academy of Management Review, Vol. 23, No. 3, 1998, pp.438-458.
56.Lewis, J.D., and Weigert, A., “Trust as a Social Reality”, Social Force, Vol. 63, No. 4, 1995, pp.917-985.
57.Liston, P., Byrne, P.J., and Heavey, C., “An evaluation of simulation to support contract costing”, Computers and Operations Research, Vol. 34, No. 12, 2007, pp.3652-3665.
58.Loh, L. and Venkatraman, N., “Determinants of information technology outsourcing: a cross-sectional analysis”, Journal of Management Information Systems, Vol. 9, No. 1, 1992b, pp.7-18.
59.Lu, H.P., Hsu, C.L. and Hsu, H.Y., “An empirical study of the effect of perceived risk upon intention to use online applications”, Information Management and Computer Security, Vol. 13, No. 2, 2005, pp.106-120.
60.Luhmann, N. “Trust and Power”. Chichester, UK: Wiley., 1979
61.Marshall, D., McIvor, R., and Lamming, R., “Influences and outcomes of outsourcing: Insights from the telecommunications industry”, Journal of Purchasing and Supply Management, In Press, Corrected Proof, Available online 1, 2007.
62.Mayer, R.C., Davis, J.H. and Schoorman, F.D., “An integrative Model of Organizational Trust”, Academy of Management Review, Vol. 20, No. 3, 1995, pp.709-734.
63.Mcfarlan, E.W. and R.L. Nolan, “How to Manage an IT Outsourcing Alliance”, Sloan Management Review, 1995, pp.9-23.
64.McKnight, D.H., Cummings, L.L., and Chervany, N.L., “Initial trust formation in new organizational relationships”, Academy of Management Review, Vol. 23, No. 3, 1998, pp.472-490.
65.McKnight, D.H., and Chervany, N.L., “What trust means in e-commerce customer relationships: an interdisciplinary conceptual typology”. International Journal of Electronic Commerce, Vol. 6, No. 2, Winter 2001-2002, pp.33-57.
66.Milliman, R.E. and Fugate, D.L., “Using trust-transference as a persuasion technique: an empirical field investigation”, Journal of Personal Selling and Sales Management, Vol.1, No.7, 1988.
67.Minoli, D., “Analyzing Outsourcing”, Reengineering Information and Communication System, New York, NY: Mcgraw-Hill, 1995.
68.Mojsilović, A., Ray, B., Lawrence. R. and Takriti, S., “A logistic regression framework for information technology outsourcing lifecycle management”, Computers and Operations Research, Vol. 34, No. 12, 2007, pp.3609-3627.
69.Morgan, R.M., and Hunt, S.D., “The Commitment-trust: Theory of Relationship Marketing”, Journal of Marketing, Vol. 58, 1994, pp.20-38.
70.Navarro, L., “Information Security Risks and Managed Security Service”, Information Security Technical Report, Vol. 6, No. 3, 2001, pp.28-36.
71.Ngwenyama, O.K. and Bryson, N., “Making the Information Systems Outsourcing Decision: A Transaction Cost Approach to Analyzing Outsourcing Decision Problems”, European Journal of Operational Research, Vol. 115, 1999, pp.351-367.
72.Nunnally, J.C., “Psychometric Theory”, NY: McGraw-Hill, 1978.
73.Pavlou, P.A. and Gefen, D., “Building effective online marketplaces with institution-based trust”, Information Systems Research, Vol. 15, No. 1, 2004, pp.24-53.
74.Quelin, B., and Francois, D., “Bringing Together Strategic Outsourcing and Corporate Strategy: Outsourcing Motives and Risks”, European Management Journal, Vol. 21, No. 5, 2003, pp.234-453.
75.Quinn, J.B. and Hilmer, F.G., “Strategic Outsourcing”, Sloan Management Review, 1994, pp.43-55.
76.Radding, A., “Outsourcing”, Bank Management, Vol. 66, No. 5, May 1990, pp.56-61.
77.Richmond, W., A. Seidmann and A. Whinston, “Incomplete Contracting Issues in Information Systems Development Outsourcing”, Decision Support Systems , Vol. 8, 1992, pp.459-477.
78.Ring, P.S. and Van de Ven, A.H., “Structuring Cooperative Relationships between Organizations”, Strategic Management Journal, Vol. 13, 1992, pp.483-498.
79.Rotter, J. B., “A New Scale for the Measurement of Interpersona Trust”, Journal of Personality, Vol. 35,No. 4, 1967, pp.651-665.
80.Rousseau, D.M., Sitkin, S.B., Burt, R.S. and Camerer, C., “Not so different after all: A cross-discipline view of trust”, Academy of Management Review, Vol. 23, No. 3, 1998, pp.303-390.
81.Rusell, D. and Gangemi, G.T., “Computer security basics”, Paper presented at California, U.S.A, O’Reilly and Associates Inc, 1992.
82.Schultz, E. E., Proctor, R. W., Lien, M. C., and Salvendy, G., “Usability and Security An Appraisal of Usability Issues in Information Security Methods”, Computers and Security, Vol. 20, No. 7, 2001, pp.620-634.
83.Shapiro, S. P., 1987, “The social control of impersonal trust”, American Journal of Sociology, Vol. 93, No. 3 ,623-658 , pp.
84.Shimp, T.A. and Kavas, A., “The Theory of Reasoned Action Applied to Coupon Usage”, Journal of Consumer Research, Vol. 11, 1984, pp.795-809.
85.Smith, J.B. and Barclay, D.W., “The effects of organizational differences and trust of the effectiveness of selling partner relationships”, Journal of Marketing, Vol. 61, 1997, pp.3-21.
86.Smith, M.A., S. Mitra, and S. Narasimhan., “Information Systems Outsourcing: A Study of Pre-event Firm Characteristics”, Journal of Management Information Systems, Vol. 15, No. 2, 1998, pp.61-93.
87.Sporleder, T.L. and Goldsmith, P.D., “Alternative firm strategies for signaling quality in the food system”, working paper, Department of Agricultural, Environmental, and Development Economics, The Ohio State University, 2002.
88.Takac, P.F., “Outsourcing: A Key to Controlling Escalating IT Costs?”, Int. J. Techology Management, Vol. 9, No. 2, 1994, pp. 139-155.
89.Taylor, S. and Todd, P.A., “Decomposition and crossover effects in the theory of planned behavior: A study of consumer adoption intentions”, International Journal of Research in Marketing, Vol. 12, 1995a, pp.137-155.
90.Venkatesh, V. and Davis, F.D., “A Theoretical Extension of the Technology Acceptance Model: Four Longitudinal Field Studies”, Management Science, Vol. 46, No. 2, 2000, pp.186-204.
91.Vermeulen, C. and von Solms, R., “The information security management toolbox-taking the pain out of security management,” Information Management and Computer Security, Vol.10, No.3, 2002, pp. 119-125.
92.Von Solms, S.H., “Information Security Governance– Compliance management vs operational management”, Computers and Security, Vol. 24, No. 6, 2005, pp.443-447.
93.Von Solms, B., “Information security- The fourth wave”, Computers and Security, Vol. 25, No. 3, 2006, pp.165-168.
94.Williamson, O.E., “Calculativeness trust and economic organization”, Journal of Law and Economics, Vol. 36, 1993, pp.427-486.
95.Yeh, Q.J. and Chang, J.T., “Threats and countermeasures for information system security: A cross - industry study”, Information and Management, Vol. 44, No. 5, 2007, pp.4880-491.
96.Zucker, L.G., “Production of trust: Institutional sources of economic structure”, Research in Organizational Behavior, Vol. 8, No. 1, 1986, pp.73-101.
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top
無相關期刊
 
系統版面圖檔 系統版面圖檔