跳到主要內容

臺灣博碩士論文加值系統

(44.200.122.214) 您好!臺灣時間:2024/10/13 00:51
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

我願授權國圖
: 
twitterline
研究生:吳昇禧
研究生(外文):Sheng-shi Wu
論文名稱:即時通訊對於企業員工績效之影響
論文名稱(外文):The study of IM impact the enterprise employees’ performance
指導教授:唐順明唐順明引用關係
指導教授(外文):Shun-Ming Tang
學位類別:碩士
校院名稱:國立雲林科技大學
系所名稱:資訊管理系碩士班
學門:電算機學門
學類:電算機一般學類
論文種類:學術論文
論文出版年:2008
畢業學年度:96
語文別:英文
論文頁數:55
中文關鍵詞:電腦自我效能結構方程模式科技接受模式即時通訊軟體媒體豐富度
外文關鍵詞:Media RichnessComputer Self-EfficacyTechnology Acceptance ModelInstant MessagingStructural Equation Model
相關次數:
  • 被引用被引用:7
  • 點閱點閱:276
  • 評分評分:
  • 下載下載:0
  • 收藏至我的研究室書目清單書目收藏:1
隨著網路的發展各類因網路而興起的應用也蓬勃發展。即時通訊由於擁有廣大的使用族群而成為最熱門的應用之ㄧ。即時通訊除了傳送文字訊息以外更可以傳送檔案、進行語音交談、視訊會議等等。未來的發展更與搜尋引擎、部落格結合。本研究希望探討即時通除了個人的用途之外,對於企業員工工作績效的價值。

  本研究基於科技接受模式(TAM)並整合媒體豐富度、電腦自我效能、資訊安全等理論發展出本研究架構,採用問卷調查法收集資料,資料分析採用結構方程模式分析企業員工使用即時通訊對於工作績效的影響。研究結果發現即時通訊的認知有用性及認知易用性對於工作績效有影響,即時通訊的電腦自我效能與媒體豐富度對於認知有用性及認知易用性有影響,而即時通訊的資訊安全對於認知有用與認知易用性則未達顯著。顯示即時通訊是有用而容易使用的資訊系統,對於工作績效也會有幫助。最後根據研究發現提出討論與建議作為後續研究的參考。
As long as Internet becomes more and more popular, many Internet-related applications also develop rapidly. IM along with its huge users, become one of the most popular applications. Apart from text message exchange, IM also can transfer file, perform voice conversation, and even capable of video conference. IM’s future will combine with search engine and bolg. In this research we keen to explain how IM can support business level and gain users’ work performance.

Our research model based on the Technology Acceptance Model (TAM) combined with Media Richness (MR), Computer Self-Efficacy (CSE) and Information security. We use survey to collect the data and use Structural Equation Model (SEM) to analyze the data. Then we examined this research hypothesis and research model, and then discussed the findings of this research. The result of this research shows that the CSE and MR have significant impact on Perceived usefulness and Perceived ease of use; the Perceived usefulness and Perceived ease of use have significant impact on work performance, and the Information security have no significant affect on Perceived usefulness and Perceived ease of use. The result confirmed that IM is a useful and easy-to-use personal application, it also gain users work performance. Finally, we discuss our research findings and provide some suggestions for the research and direction in future.
Contents
摘要 i
Abstract ii
致謝 iii
1. Introduction 1
2. Theoretical background 5
  2.1 Technology Acceptance Model 5
2.1.1 Perceived Usefulness 6
2.1.2 Perceived ease of use 7
2.2 Computer self-efficacy 8
2.3 Media Richness 9
2.4 Information security 10
2.5 Work performance 12
3. Research model and Research method 14
3.1 Research framework 14
3.2 Operational definitions of research variables 16
3.3 Research design 17
3.3.1 Survey subjects 17
3.3.2 Questionnaires design 18
3.3.3 Data analysis methods 18
3.4 Structural Equation Model 19
4. Data analysis and result 21
4.1 Descriptive Statistical Analysis 21
4.1.1 IM related survey 21
4.2 Validity and Reliability 24
4.2.1 Reliability 24
4.2.2 Construct validity 25
4.2.3 Discriminant validity 27
4.3 SEM analysis 28
4.3.1 Model formulation 28
4.3.2 Overall model validation 29
4.3.3 Hypothesis tests 31
5. Discussion 35
5.1 Management implications 35
5.2 Conclusion and suggestion 36
5.3 Research Limitations and Future Work 37
References 39
Appendix. Questionnaire 44
References
Chinese reference
[1]林怡辰,2006,臺灣300大企業即時通訊使用政策大調查,2006,iThome周刊。http://www.ithome.com.tw/itadm/article.php?c=36226&s=1
[2]張鈞垣,2005,影響組織內工作者採用即時通訊軟體因素之研究,國立中
正大學資訊管理研究所碩士論文。
[3]蘇伯方,2004,即時傳訊軟體採用模式之研究,國立中山大學傳播管理研究
所碩士論文。

English reference
[1] Agarwal, R.A. and Prasad, J, 1999, “Are individual’s differences germane to the acceptance of new information technologies?”, Decision Sciences, Vol.30 no.2, p361-391.
[2] Ajzen, I. & Fishbein, M., 1980, “Understanding attitudes and predicting social
Behavior”, NJ : Prentice-Hall, Inc.
[3] Ajzen, I., 1985, “From intentions to actions: A theory of planned behavior”, In J.-
Kuhl & J Beckmann (Eds.), Action Control: From Cognition to Behavior, 11–39.
New York: Springer.
[4] Ajzen, I., 1991, “The theory of planned behavior”, Organizational Behavior and
Human Decision Process, 50(2), 179-211.
[5] Albert H. Huang, Shin-Yuan Hung & David C. Yen, 2007, “An exploratory
Investigation of two internet-based communication modes”, Computer Standards
& Interfaces, Volume 29, Issue 2, 238-243.
[6] Anderson, J. C., and Gerbing, D. W., 1988, “Structural equation modeling in practice: A review and recommended two-step approach”, Psychological Bulletin, Vol.103, No.3, PP. 411-423.
[7] Baytos, K. and Kleiner, B. H., 1995, “New developments in job design”, Business Credit, 97 (2), pp.22-28.
[8] Beer, S., 2003, Instant mayhem, SMH, 18 February.
[9] Borman, W. C., and Motowidlo S. J., 1997, “Task performance and contextual
performance: The Meaning for Personnel Selection Research”, Human Performance 10 (2), pp.99-109.
[10] Bradbury, 2001, “Pigeon post for the 21st century”, Computer Weekly (October 18) 1 – 6.
[11] Byrd, T.A. and Turner, D.E., 2000, “Measuring the flexibility of information technology infrastructure”, Journal of Management Information Systems (17:1), pp. 167–208.
[12] Campbell, J., 1990, “Modeling the performance prediction problem in industrial and organizational psychology”, Chicago: Consulting Psychologists press.
[13] Campbell, J. P., Dunnette, M. D., Lawler, E. E., and Weick, K. E., 1970,
“Managerial behavior, performance, and effectiveness”, McGraw-Hill.
[14] Cameron, A. F., & Webster, J., 2005, “Unintended consequences of emerging
communication technologies: Instant messaging in the work place”, Computers in Human Behavior, 21(1), 85−103.
[15] Chakravarthy, B. S., 1986, “Measuring strategic performance”, Strategic
Management Journal, 7 (5) Sep-Oct, pp.437-458.
[16] Chen K., Yen D.C., Huang A.H., 2004, “Media selection to meet communications
contexts: comparing e-mail and instant messaging in an undergraduate population”, Communications of the Association for Information Systems 14, 387–405.
[17] Compeau, D., & Higgins, C. A., 1995, “Computer self-efficacy: Development of a measure and initial test”, MIS Quarterly, 19, 189-211.
[18] Compeau, D., Higgins, C. A. & Huff, S., 1999, “Social cognitive theory and
individual reactions to computing technology A longitudinal study”, MIS Quarterly,23(2), 145-158.
[19] Daft, R. L.,& Lengel, R. H., 1984, “Information richness: A new approach to
managerial behavior and organizational design”, Research in Organizational
Behavior, 6, 191–233.
[20] Daft, R. L.,& Lengel, R. H., 1986, “Organizational information requirements, media richness, and structural design”. Management Science, 32, 554–571.
[21] Davis, F.D., 1986, “A technology acceptance model for empirically testing new
end-user information system:Theory and results, doctoral dissertation”, MA: MIT Sloan School of Management Cambridge.
[22] Davis, F.D., 1989, “Perceived usefulness, perceived ease of use, and user
acceptance of information technology”. MIS Quarterly, 13(3), 319-339.
[23] Davis, F.D., Bagozzi, R. P., & Warshaw, P. R., 1989, “User acceptance of computer technology: A comparison of two theoretical model”, Management Science, 5(8):982-1003
[24] Dishaw, Mark T. & D.M. Strong, 1999, “Extending the technology acceptance
model with task-technology fit construct''s”, Information & Management, 36, 9-21.
[25] Donal Casey, 2007, “Building a secure instant messaging environment”, Network security, January.
[26] Downs, T. M., 1992, “Superior and subordinate perceptions of communication
during performance appraisal interviews”, Communication Research Reports, 9
(2), 147-158.
[27] Ellingson, L. L. and Buzzanell, P. M, 1999, “Listening to women’s narratives
of breast cancer treatment: A feminist approach to patient satisfaction with
physician patient communication”, Health Communication, 11, 347-351.
[28] Erlend B., Per H., Eva H. &Thomas S., 2007, “Risk analysis of information security in a mobile instant messaging and presence system for healthcare”, International Journal of Medical Informatics, Volume 76, Issue 9,677-687.
[29] Fishbein, M. & Ajzen, I., 1975, “Belief, attitude, intention and behavior: An
introduction to theory and research”, MA: Addison-Wesle.
[30] Fornell. C., and Larcker, F., 1981, “Evaluating structural equation models with unobservable variables and measurement error”, Journal of Marketing Research, PP. 39-50.
[31] Gerald Faulhaber, 2002, “Network effects and merger analysis: instant messaging and the AOL–Time Warner case”, Telecommunications Policy, Volume 26, Issues 5-6, 311-333.
[32] Goldsborough, R., 2001, “Instant messaging for instant communications”, Link-Up, 18(May–June), 7.
[33] Grinter, R. & Palen, L., 2002, “Instant Messaging in teen Life”, Proceedings of
CSCW ‘02, New Orleans, LA.
[34] Hair, Joseph F.,JR, Rolph E. Anderson, Ronald L. Tatham, William C. Black ,1988, Multivariate data analysis, Prentice Hall.
[35] Igbaria, M., & Iivari, J., 1995, “The effects of self-efficacy on computer usage”,
Omega, 23(6), 587-605.
[36] Igbaria, M., Zinatelli, P., & Cragg, N.; Cavaye, A., 1997, “Personal computing acceptance factors in small firms: A structural equation model”, MIS Quarterly, 21(3):279-306
[37] Isaacs, E. A., Walendowski, A., Whittaker, S., Schiano, D. J., & Kamm, C., 2002, “The character, functions, and styles of instant messaging in the workplace”, Computer supported cooperative work, New Orleans, LA.
[38] Kessler, M., 2002, “Instant messaging at work can open door to hackers”, USA Today, Retrieved June 21, 2002 from http://www.usatoday.com/money/tech/2002-05-29-im-security.htm
[39] Koufteros, X.A., and Vonderembse, M.A., and Doll, W.J., 2002, “Examining the
competitive capabilities of manufacturing firms”, Structural equation modeling,
(9:2), pp. 256-282
[40] Lim, K.H., Benbasat, I., & Ward, L.M., 2000, “The role of multimedia in
changing first impression bias”, Information Systems Research (11:2), 115-136.
[41] Langa, 2001, “More Instant-Messaging security holes”, Information Week, TechWeb, http://www.informationweek.com/story/IWK20010927S0021
[42] Mark Brenda L., Hy Sockel, 2001, “A confirmatory factor analysis of IS employee motivation and retention”, Information & Management, 38(5), PP.265-276.
[43] Mathieson, K., 1991, “Predicting User Intentions: Comparing the technology
acceptance model with the theory of planned behavior”, Information Systems
Research, 2(3), pp. 173-191.
[44] Michael McClea, David C. Yen & Albert Huang, 2004, “An analytical study
towards the development of a standardized IM application”, Computer Standards
& Interfaces, Volume 26, Issue 4.
[45] Microsoft (2007) Microsoft Security Bulletin MS07-054 http://www.microsoft.com/technet/security/bulletin/MS07-054.mspx
[46] Mingail, S., 2001, “Instant Messaging: Next best thing since e-mail? “ Retrieved January 22, 2003. Available:http://www.canadalawbook.ca/headline128_ar.html.
[47] Moon, J.W. & Kim, Y.G., 2001, “Extending the TAM for a world-wide-web
Context”, Information & Management, 38(4), 217-230.
[48] Murphy, C. A., Coover, D., & Owen, S. V., 1989, “Development and validation
of the computer self-efficacy scale”, Educational and Psychological Measurement, 49, 893-899.
[49] Nardi, B., Whittaker, S., Bradner, E., 2000, “Interaction and Outeraction: Instant
Messaging in Action”, Proc. CSCW’00, 79-88.
[50] Nunnally, 1978, J.L., Psychometric Theory 2th, New York: McGraw Hill Publishers.
[51] Pfeffer, J., 1982, Organizations and organization theory. Boston, MA: Pitman
[52] Pitt, L.F., Watson, R.T. & Kavan, C.B, 1995, “Service quality: A measure of
information systems effectiveness”, MIS Quarterly, 19(2), 173-187.
[53] Radicati Group, Instant Messaging Market 2005-2009, Available:
http://www.radicati.com/reports/single.asp#18
[54] Robey, Daniel, 1979, “User attitudes and management information system use”,
Academy of Management Journal, Vol.22, No.3.
[55] Robbins, S. P., 2001, Organizational Behavior, Upper saddle river, New
Jersey: Prentice Hall Inc.
[56] Rohlfs, J., 1974, “A theory of interdependent demand for a communications service”, Bell Journal of Economics and Management Science, 5(1), 16–37.
[57] Scott Nicholson, 2002, “Socialization in the "Virtual Hallway": Instant Messaging in the asynchronous Web-Based distance education classroom”, Internet and Higher Education, v5 n4 p363-72 2002
[58] Schein, E.H., 1980, Organizational psychology. Englewood Cliffs, NJ:
Prentice-Hall Inc.
[59] Segerstad, Y. H., & Ljungstrand, P., 2002, “Instant messaging with WebWho”,
International Journal of Human–Computer Studies, 56, 147–171.
[60] Shin-Yuan Hung, Albert H. Huang, David C. Yen and Chia-Ming Chang, 2007,
“Comparing the task effectiveness of instant messaging and electronic mail for
geographically dispersed teams in Taiwan”, Computer Standards & Interfaces,
Volume 29, Issue 6, September 2007, Pages 626-634
[61] Siegel, L. and Lane, I. M., 1982, Personnel and Organizational Psychology,
Richard D .Irwin .INC
[62] Soe, L.L. & Markus, M.L., 1993, “Technological or social utility? Unraveling
explanations of e-mail, v-mail, and fax use”, The Information Society, 9, 213–236.
[63] Stone, J. and Merrion, S., 2004, “Features: Instant messaging or Instant headache? ” ACM Queue, 2(2), April.
[64] Szajna, B., 1996, “Empirical evaluation of the revised technology acceptance model”, Management Science, 42(1), 85-99.
[65] Teo, C., Dornhoffer, J., Hanna, E., & Bower, C., 1999, “Application of skill base techniques to pediatric neurosurgery”, Child Nervous System, 15: 103-109
[66] “Top Five Security Risks for Instant Messaging in 2005”, IMlogic, 2005,
http://www.imlogic.com/pdf/Top5IMSecurity2005.pdf .
[67] Torkzadeh, G., & Koufteros, X., 1994, “Factorial validity of a computer self-
efficacy scale and the impact of computer training”, Educational and
Psychological Measurement, 54(3), 813-821.
[68] Trevino, L. K., Lengel, R. H., & Daft, R. L., 1987, “Media symbolism, media
richness, and media choice in organizations: A symbolic interactionist
perspective”, Communication Research, 14, 553–574.
[69] Venkatraman, N. and Ramanujam, V., 1986, “Measurement of business performance on strategy research: A comparison of approach”, Academy of Management Review, 11 (4), pp.801-814.
[70] Venkatesh, V. & F. D. Davis, 1994, “Modeling the determinants of perceived
ease of use”, Proceedings of International Conference on Information System,
213-227, Vancouver, Canada, 227.
[71] Vroom, V.H., 1964, “Work and motivation”, New York, NY: Wiley.
[72] Wallén, J., 2004, “Tva miljoner svenskar chattar”, Computer Sweden, 8.
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top
無相關期刊