跳到主要內容

臺灣博碩士論文加值系統

(44.201.72.250) 您好!臺灣時間:2023/09/30 00:21
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

: 
twitterline
研究生:林佩姍
研究生(外文):Pei-Shan Lin
論文名稱:探討貨主採用貨櫃保安服務影響因素之研究
論文名稱(外文):A Study of Shippers’ Adoption of the Container Security Service
指導教授:趙時樑趙時樑引用關係
指導教授(外文):Shih-Liang Chao
學位類別:碩士
校院名稱:國立臺灣海洋大學
系所名稱:航運管理學系
學門:運輸服務學門
學類:運輸管理學類
論文種類:學術論文
論文出版年:2008
畢業學年度:96
語文別:中文
論文頁數:107
中文關鍵詞:貨櫃保安服務貨櫃運輸擴充型科技接受模型RFID
外文關鍵詞:CSScontainer transportationextended TAMRFID
相關次數:
  • 被引用被引用:4
  • 點閱點閱:307
  • 評分評分:
  • 下載下載:48
  • 收藏至我的研究室書目清單書目收藏:1
貨櫃保安服務(Container Security Service, CSS)是目前海運界最新導入的科技服務之一,由於其為主動式RFID的應用,故具備一次可讀取多筆資料、無線傳輸、自動偵測與安全性高等特性,可提高企業的營運效率、節省人力成本。在911事件後,美國國土保安部門推動了一系列反恐法案,法案中明文規定需利用運輸安全裝置(CSD)來篩檢高風險之貨櫃,以降低恐怖組織利用貨櫃攻擊美國本土之風險。由於科技日新月異的進步,目前全世界主要港口,有關CSS之軟硬體設備已日趨完善,因而促使CSS之產生。
本論文旨在建立一個海運業貨主對於CSS的採用模式,並加以驗證。本研究以科技接受模型(TAM)為基礎,加入符合CSS特色之因素,如「成本」、「安全性」與「主觀規範」等構面,並以結構方程模式(SEM)來驗證各構面之間的關係。
結論顯示,「安全性」與「知覺有用性」對於貨主的採用「態度」和「行為意圖」有重要的影響,另外「安全性」對於「知覺易用性」亦有顯著的正向影響,「主觀規範」對於「行為意圖」亦達顯著水準。然而「知覺易用性」對於「態度」的關係在本研究中未被顯著支持。最後則分別就理論與實務方面進行討論本研究成果之意涵。
Container Security Service (CSS) is one of the latest technical services in the maritime industry which is an application of active RFID. The characteristic of CSS including multiple data collection, wireless transmission, auto-detection and higher security which could enhance the efficiency of container status control and save the labor cost. After the 911 event, U.S. Customs and Border Protection has legislated a series of acts to act against terrorism. Some stipulations initiated to use conveyance security device (CSD) to sift the containers with high risk of terrorism attack. Because the improvement of technologies, the facility of the CSS are ready in major ports of the world that enhance the container security services.
The objective of this study was to develop and empirically test a model of Shippers’ adoption on CSS in shipping industry. Base on the theory of the Technology Acceptance Model (TAM), some correspondent constructs with CSS was add into TAM (e.g. cost, security and subjective norm). And a structural equation modeling (SEM) was conducted to test the relationships among constructs. The results indicate that security and perceived usefulness are important factors in explaining respondents’ attitudes towards the CSS. Furthermore security has a positive effect on perceived ease of use and the impact of subjective norm on behavioral intention is significant in this study. However, the effect of perceived ease of use on attitude toward the behavior was not supported in this study. Theoretical and practical implications of the research findings are discussed.
謝辭................................................... i
摘要................................................... ii
Abstract............................................... iii
目錄................................................... iv
表目錄................................................. viii
圖目錄................................................. x
第一章 緒論.............................................. 1
1.1研究背景與動機........................................ 1
1.2研究目的............................................. 3
1.3研究範圍與限制 ........................................3
1.4研究流程與架構 ........................................5
第二章 貨櫃保安服務運作模式之探討........................... 6
2.1貨櫃保安服務之源起.................................... 6
2.1.1 911反恐效應....................................... 7
2.1.2 大型貨主本身對貨櫃保安之需求 ........................7
2.1.3 世界主要港口之軟硬體設施日趨完備......................9
2.2 CSD之辦識應用技術.................................... 9
2.2.1 電磁波之選擇....................................... 9
2.2.2 運輸安全裝置應用技術 ................................10
2.2.3 美國國土保安部門公告CSD之要求標準.................... 11
2.2.4 採用ZigBee技術之原因............................... 13
2.3 CSS之運作流程 ........................................14
2.3.1 準備階段.......................................... 16
2.3.2 運作階段.......................................... 16
2.3.3 回收階段.......................................... 17
2.4小結................................................. 17
第三章 文獻探討.......................................... 19
3.1歐美供應鏈保安之主要相關法規............................ 19
3.1.1貨櫃保安倡議 ........................................21
3.1.2大港倡議........................................... 24
3.1.3美國海關貿易夥伴反恐方案............................. 24
3.1.4智慧與安全貿易通道.................................. 26
3.1.5 24 小時提前貨物通報................................ 28
3.1.6 AMS 10+2......................................... 29
3.1.7港口安全法案 ........................................31
3.1.8安全貨運倡議 ........................................32
3.1.9小結............................................... 33
3.2 RFID在各產業之應用................................... 33
3.2.1 RFID之技術介紹..................................... 34
3.2.2 RFID應用之現況..................................... 37
3.3科技接受模式相關研究................................... 38
3.3.1 科技接受模型....................................... 39
3.3.2 安全性............................................ 41
3.3.3 理性行為理論....................................... 43
3.3.4 計畫行為理論....................................... 44
3.3.5 成本.............................................. 46
3.4小結................................................. 48
第四章 研究方法.......................................... 49
4.1研究模式............................................. 49
4.2 操作型定義........................................... 53
4.2.1 知覺有用性......................................... 53
4.2.2 知覺易用性......................................... 54
4.2.3 成本.............................................. 54
4.2.4 態度.............................................. 55
4.2.5 主觀規範.......................................... 56
4.2.6 安全性............................................ 56
4.2.7 行為意圖.......................................... 57
4.3 研究設計............................................ 57
4.3.1 問卷設計.......................................... 58
4.3.2 資料蒐集方法....................................... 59
4.4統計分析方法及應用..................................... 60
4.4.1 敘述性統計分析..................................... 60
4.4.2 獨立樣本T檢定...................................... 61
4.4.3 信效度分析......................................... 61
4.4.4 結構方程模式....................................... 62
4.5 小結 ................................................62
第五章 實證分析.......................................... 64
5.1 基本?述統計分析..................................... 64
5.2 信效度分析........................................... 70
5.2.1 信度分析.......................................... 70
5.2.2 效度分析.......................................... 72
5.3 整體結構模式分析..................................... 74
5.3.1 結構方程模式分析................................... 76
5.3.2 路徑相關分析....................................... 77
5.4結構方程模式假設檢定整理............................... 81
5.4.1 知覺易用性與知覺有用性與態度之關係.................... 81
5.4.2 安全性、知覺易用性、態度與行為意圖之關係.............. 82
5.4.3 主觀規範、態度與行為意圖之關係....................... 83
5.5 小結................................................ 85
第六章 結論與建議......................................... 87
6.1 研究結論............................................ 87
6.1.1 CSS在海運實務上之價值............................... 87
6.1.2 貨主對於CSS之需求及影響因素......................... 88
6.1.3 各影響因素與CSS接受程度之關係 ........................89
6.1.4 安全性、知覺易用性、態度與行意圖之關係................ 90
6.1.5 主觀規範、態度與行為意圖之關係....................... 91
6.2建議................................................. 92
6.2.1 對於CSS相關業者之建議............................... 92
6.2.2 對未來學術研究之建議................................ 93
參考文獻................................................ 95
一、中文部分............................................. 95
二、英文部分............................................. 96
附錄 問卷調查表.......................................... 102
一、中文部分
1.丁介棡 (2001),「高雄港電子商務市場區隔與服務滿意度之研究」,國立成功大學交通管理科學研究所碩士論文
2.田宜遜 (2004),「C-TPAT/SST先導系統推動計畫介紹」,機械工業雜誌261期,頁107-116。
3.吳明隆、涂金堂(2006),SPSS與統計應用分析(二版),台北市:五南出版社。
4.呂錦隆、凌珮娟 (2007),「航空旅客對自助報到服務之接受行為研究」,第五屆十校聯盟航運學術研討會論文集
5.李佳育 (2005),「導入無線射頻識別系統行為意圖之研究-以台灣物流業為例」,大同大學事業經營研究所碩士論文
6.李珮如(2003),「影響國內中小企業採用企業資源規劃系統之關鍵因素」,國立中正大學資訊管理學系碩士論文。
7.李敏正(2003),「延伸計劃行為理論以預測WWW持續使用之研究」,未出版之碩士論文,國立高雄第一科技大學資訊管理研究所。
8.林秋芬 (2007),「旅遊電子商務網站消費者使用意圖影響因素之研究」,國立東華大學企業管理研究所碩士論文
9.邱皓政(2006),量化研究與統計分析(三版)。台北市:五南出版社。
10.洪新原、梁定澎、張嘉銘 (2005),「科技接受模式之彙總研究」,資訊管理學報,第12卷,第4期,頁211-234
11.美國海關及邊境保衛局(Customs and Border Protection, CBP)網站 (http://www.cbp.org)。
12.陳李逸 (2001),「定期航商電子商務市場區隔與使用意願之研究」,國立成功大學交通管理科學研究所碩士論文
13.陳順宇(2004),多變量分析(3 版)。台北市:華泰。
14.陳順宇(2007),結構方程模式 Amos操作。台北市:心理出版社。
15.馮翊庭 (2005),「無線射頻辨識系統(RFID)接受模式之研究-從高科技製造觀點」,國立成功大學電信管理研究所碩士論文
16.黃芳銘(2003),結構方程模式理論與應用。台北市:五南。
17.黃俊英(2000),多變量分析(七版)。中國經濟企業管理研究所。
18.黃炳錫(1993),「企業採用EDI 系統及使用效益之研究-以報關行為例」,淡江大學資訊管理研究所碩士論文。
19.黃智強 (2000),「影響採用網路購物因素之研究-以網路書店為例」,國立中央大學資訊管理研究所碩士論文
20.溫嘉瑜 (2004),「射頻識別在台灣」,商品條碼報導,頁6-9。
21.經濟部工業技術研究院 (2007),「國際供應鏈安全準則與趨勢說明會」
22.經濟部商業司 (2005),「台灣物流年鑑」,工研院產經中心
23.葉陳輝,趙時樑 (2005),「RFID應用於海運貨櫃管理之探討」,第三屆十校聯盟航運學術研討會論文集,頁295-301
24.廖御超 (2006),「影響採用創新產品之相關因素探討-以3G手機為例」,國立東華大學企業管理研究所碩士論文
25.謝銘仁 (2005),「智慧型手機在物流業營業司機之接受度研究-以新竹貨運為例」,國立成功大學交通管理科學研究所碩士論文

二、英文部分
1.Agarwal, R., Prasad, J., (1998), “A conceptual and operational definition of personal innovativeness in the domain of information technology”,Information Systems Research, Vol. 9, No. 2, pp204–215.
2.Agarwal, R., Prasad, J., (1999), “Are individual differences germane to the acceptance of new information technologies?”, Decision Sciences, 30 pp361–391.
3.Ajzen, I., (1985), From intentions to actions: a theory of planned behavior, action-control: from cognition to behavior. Heidelerg: Springer.
4.Ajzen, I., Fishbein M., (1980), Understanding Attitudes and Predicting Social Behavior. Englewood Cliffs, NJ: Prentice-Hall.
5.Amin H., (2007), “An analysis of mobile credit card usage intentions”, Information Management & Computer Security, Vol. 15, No. 4 ,pp260-269.
6.Arbuckle, J.L., (1997), “Amos Users’ Guide Version 3.6. SmallWaters Corporation”, Chicago, IL.
7.Bergeron, F., Gingras, L., Hadaya, P., Caron, C., (2005), A framework for evaluating strategic location-based applications in business. In: Proceedings of the 38th Hawaii International Conference on System Sciences, pp. 1–8.
8.Bhuptani, M., Moradpour, S., (2005), RFID Field Guide: Deploying Radio Frequency Identification Systems. Sun Microsystems Press, NJ: Prentice Hall.
9.Bingi, P., Sharma, M.K. and Godla, J., (1999), “Critical issues affecting an ERP implementation”, Information Systems Management, pp7-14.
10.Brown I., Cajee Z., Davies D., Stroebel S., (2003), “Cell phone banking: predictors of adoption in South Africa-an exploratory study”, International Journal of Information Management, 23, pp381-394.
11.Brown I., Cajee Z., Davies D., Stroebel S., (2003), “Cell phone banking: predictors of adoption in South Africa—an exploratory study”, Information management, pp381–394.
12.Chau, Y.K., (1996), “An empirical assessment of a modified technology acceptance model”, Journal of Management Information Systems, 13, pp185-204.
13.Cheng, C.H., Cheung, W., Chang, M.K., (2002), “The use of the Internet in Hong Kong: Manufacturing vs. service”, International Journal of Production Economics, 75, pp33–45.
14.Churchill GA., (1979), “A paradigm for developing better measures of marketing constructs”, Journal of Marketing Research ,Vol. 25, No.1, pp170-84.
15.Cunningham, L.F., Gerlach, J.H., Harper, M.D., Young, C.E., (2005), “Perceived risk and the consumer buying process: internet airline reservations”, International Journal of Service Industry Management, Vol. 16, No.4, pp357-372.
16.Curran F.M., Meuter Matthew L., (2005), “Self-service technology adoption: comparing three technologies”, Journal of Services Marketing, Vol. 19, No.2, pp103-113.
17.Davis Fred D., (1989), “Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology”, MIS Quarterly, Vol.13, No.3, pp319-340.
18.Davis, F.D., Venkatesh, V., (1996), “A critical assessment of potential measurement biases in the technology acceptance model: three experiments”, International Journal of Human-Computer Studies, 45, pp19–45.
19.DeLone, W. H., (1988). “Determinants of success for computer usage in small business”, MIS Quarterly, Vol. 12, No.1, pp51-61.
20.Doerr, K.H., Gates, W.R., Mutty, J.E., (2006). “A hybrid approach to the valuation of RFID/MEMS technology applied to ordnance inventory”, International Journal of Production Economics, 103, pp726–741.
21.Dowling, G. R., Staelin, R., (1994), “A model of perceived risk and intended risk-handling activity”, Journal of Consumer Research, Vol. 21, No.1, pp119-134.
22.Eastin Matthew S., (2002), “Diffusion of e-commerce: an analysis of the adoption of four e-commerce activities”, Telematics and Informatics, 19, pp251–267.
23.Fano, A., Gershman, A., (2002), “The future of business services in the age of ubiquitous computing”, Communications of the ACM, Vol. 45 No.12, pp83–87.
24.Featherman, M.S., Pavlou, P. A., (2003), “Predicting e-services adoption: a perceived risk facets perspective”, International Journal of Human-Computer Studies, Vol. 59, No.4, pp451-475.
25.Fink, D., (1998), “Guidelines for the successful adoption of information technology in small and medium enterprises”, International Journal of Information Management, Vol. 18, No.4, pp243-253.
26.Fishbein, M. and Ajzen, I., (1975), Belief, Attitude, Intention, and Behavior: An Introduction to Theory and Research, MA: Addison-Wesley.
27.Fornell, C., Larcker, D.F., (1981b), “Evaluating structural equation models with unoberservable variables and measurement error”, Journal of Marketing Research, 18, pp186–192.
28.Grandon, E.E., Pearson, J.M., (2004), “Electronic commerce adoption: An empirical study of small and medium US businesses”, Information & Management, Vol. 42, No.1, pp197–216.
29.Grover, V. and Goslar, M.D., (1993), “The initiation, adoption and implementation of telecommunications theory in US rrganizations”, Journal of Management Information Systems, Vol. 10, No.1, pp 141-163.
30.Hair, J., Anderson, R., Tatham, R., Black, W., (1998), Multivariate Data Analysis with Readings, fifth ed. Prentice Hall International, NJ: Upper Saddle River.
31.Hsu M.H., Chiu C.M., (2004), “Predicting electronic service continuance with a decomposed theory of planned behavior”, Behaviour & Information Technology, Vol. 23, No. 5, pp359–373.
32.Hsu, C.L., and H.P., Lu, (2004), “Why do people play on-line games? An extended TAM with social influences and flow experience”, Information & Management, 41, pp853-868.
33.Igbaria, M., Zinatelli, N., Cragg, P., Cavaye, A.L.M., (1997), “Personal computing acceptance factors in small firms: A structural equation model”, MIS Quarterly, Vol. 21, No.3, pp279–305.
34.Joglekar, N., Rosenthal, S., (2005), “Experimentation with RFID usage in supply chains”, POMS Chronicle, Vol. 12, No.1, pp10–11.
35.Joreskog, K.G., Sorbom, D., (1993), LISREL8: Structural equation modeling with the SIMPLIS command language. Hillsdale, NJ: Erlbaum.
36.Knospe, H., Pohl, H., (2004), “RFID security”, Information Security Technical Report, Vol. 9, No.4, pp39–50.
37.Koufteros, X.A., (1999), “Testing a model of pull production: A paradigm for manufacturing research using structural equation modeling”, Journal of Operations Management, 17, pp467–488.
38.Lee Lorraine S., Fiedler Kirk D. and Smith Jeffery S., (2008), “Radio frequency identification (RFID) implementation in the service sector: A customer-facing diffusion model”, International Journal of Production Economics, 112, pp587-600.
39.Lees, J.D., (1987). “Successful development of small business information systems”, Journal of Systems Management, Vol. 38, No.8, pp32-39.
40.Lim, N., (2003), “Consumers’ perceived risk: sources versus consequences”, Electronic Commerce Research & Applications, Vol. 2, No.3, pp216-228.
41.Lu C.S., Lai K.H., Cheng T.C.E., (2007), “Application of structural equation modeling to evaluate the intention of shippers to use Internet services in liner shipping”, European Journal of Operational Research, 180, pp845-867.
42.Lu J., Yao J.E., Yu C.S., (2005), “Personal innovativeness, social influences and adoption of wireless Internet services via mobile technology”, Journal of Strategic Information Systems, 14 , pp245–268.
43.Lu, H.P. and Gustafson, D.H., (1994), “An empirical study of perceived usefulness and perceived ease of use on computerized support system use over time”, International Journal of Information Management, 14, pp317-329.
44.Mattila, A., (2001), “The impact of product category risk on service satisfaction evaluations”, International Journal of Hospitality Management, Vol. 20, No.1, pp 29-43
45.Moon J.W., and Kim Y.G., (2001), “Extending the TAM for a World-Wide-Web context”, Information & Management, 38, pp217-230.
46.Ngai E.W.T., Moon K.K.L., Riggins F.J. and Yi C.Y., (2008). “RFID research: An academic literature review (1995–2005) and future research directions”, International Journal of Production Economics . 112, pp510-520.
47.Nunnally, J.C., (1978), Psychometric Theory, 2nd ed. McGraw-Hill, NY: New York.
48.Olson J.R. and Boyer K.K., (2003), “Factors influencing the utilization of Internet purchasing in small organizations”, Journal of Operations Management, 21, pp225-245.
49.Premkumar G. and Roberts M., (1999), “Adoption of new information technologies in rural small businesses”, The International Journal of Management Science, 27, pp467-484.
50.Premkumar, G. Ramamurthy, K., and Nilakanta, S., 1994, “Implementation of electronic data interchange: an innovation”, Journal of Management Information Systems, Vol. 11, No.2, pp157-186.
51.Roca J.C., Chiu C.M. and Martinez F.J., (2006), “Understanding e-learning continuance intention: An extension of the Technology Acceptance Model”, International Journal of Human-Computer Studies, 64, pp683-696.
52.Taylor S. and Todd P., (1995), “Assessing IT Usage: The Role of Prior Experience”, MIS Quarterly, Vol.19, No.4, pp561-570.
53.Thong J.Y.L, (1999), “An integrated model of information systems adoption in small businesses”, Journal of Management Information Systems, Vol. 15, No.4, pp187-214.
54.Tornatzky, L.G. and K.J. Klein (1982), “Innovation Characteristics and Innovation Adoption- Implementation: A Meta-Analysis of Findings.” IEEE Transactions on Engineering Management, 29, pp.28-45.
55.Tzeng S.F., Chen W.H. and Pai F.Y., (2008), “Evaluating the business value of RFID: Evidence from five case studies”, International Journal of Production Economics, 112, pp601-613.
56.Venkatesh V. and Davis F.D., (2000), “A Theoretical Extension of the Technology Acceptance Model: Four Longitudinal Field Studies”, Management Science, Vol.46, No.2, pp186-204.
57.Vijayasarathey L.R., (2004), “Prediction consumer intentions to use on-line shopping: the case for an augmented technology acceptance model”, Information & Management, 41, pp747-762.
58.Yap, C.S., Soh, C.P.P., and Raman, K.S. (1992), “Information systems success factors in small business,” International Journal of Information Management, Vol.20, No.5, pp.597-609.
59.Yi Y., Wu Z. & Tung L.L., (2005), “How Individual Differences Influence Technology Usage Behavior? Toward an Integrated Framework”, The Journal of Computer Information System, Vol. 46, No.2, pp52-63.
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top