(3.235.245.219) 您好!臺灣時間:2021/05/10 02:03
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果

詳目顯示:::

: 
twitterline
研究生:周詩婷
研究生(外文):Shin-Ting Chou
論文名稱:住家採用以雲端運算為基礎的安全監控系統之意願分析
論文名稱(外文):Toward understanding the households adoption intention of cloud computing-based surveillance systems
指導教授:吳崇光
指導教授(外文):Chorng-Guang Wu
學位類別:碩士
校院名稱:元智大學
系所名稱:企業管理與服務科學學程
學門:商業及管理學門
學類:企業管理學類
論文種類:學術論文
論文出版年:2011
畢業學年度:99
語文別:中文
論文頁數:77
中文關鍵詞:雲端運算視訊安全監控整合性科技接受模型 (UTAUT)住戶採用意願
外文關鍵詞:cloud computingvideo surveillanceunified theory of acceptance use of technologyhouseholdadoption intention
相關次數:
  • 被引用被引用:3
  • 點閱點閱:327
  • 評分評分:系統版面圖檔系統版面圖檔系統版面圖檔系統版面圖檔系統版面圖檔
  • 下載下載:3
  • 收藏至我的研究室書目清單書目收藏:2
「雲端運算」概念的出現,讓視訊監控產業有了新型態的服務,也就是影像監控即服務 (Video Surveillance as a Service, VSaaS),這樣的應用使得終端的處理負擔大幅降低,同時也減少設備的支出。而隨著民眾對於住家安全的重視提升,視訊安全監控廠商也紛紛開始注意到家庭這塊市場。因此,本研究想要探討一般住戶對於雲端視訊安全監控系統的採用意願,以及在選擇系統上會有什麼考量的因素。
本研究以整合性科技接受模型 (Unified theory of acceptance and use of technology, UTAUT) 作為預測一般住戶對於雲端視訊安全監控系統採用意願的基礎,同時也考慮到住戶的性別及所得是否會造成影響。之後透過網路及紙本問卷調查,蒐集156個家庭中有在工作的住戶之意見,再進行變異數與迴歸分析,來驗證假說是否成立。
研究結果顯示,整合科技接受模型中的績效預期、社會影響及促進條件,對住戶採用雲端視訊安全監控系統有正向且顯著的影響,而當中以績效預期的效果最強,其次為社會影響及促進條件。此外住戶的性別在績效預期與社會影響對行為意圖的關係上有干擾的效果,同樣住戶的所得在社會影響對行為意圖的關係有顯著的影響。

The technology of cloud computing has led the video surveillance industry to deploy an impressive application, which is Video Surveillance as a Service (VSaaS). As more and more households have been paying their attentions on home security, the industry attempts to grab the market share as best as they can. The purpose of this study is to understand the households’ adoption intention of cloud computing-based surveillance systems. By applying the unified theory of acceptance and use of technology (UTAUT), a research model is proposed. The model focuses on performance expectancy, effort expectancy, social influence and facilitating conditions as the primary predictors of adoption intention. Additionally, the moderating effect of householders’ gender and income are evaluated simultaneously. The research framework is empirically validated using data from a field survey of 156 families.
The findings suggest that performance expectancy is the strongest predictor of households’ adoption intention, followed by social influence and then facilitating conditions. Also, analysis provides a couple of moderate empirical supports for the research model related to householders’ gender and income.


摘要 i
ABSTRACT ii
致謝 iii
目次 iv
圖目錄 v
表目錄 vi
第一章 緒論 1
第一節 研究背景 1
第二節 研究動機 4
第三節 研究目的 6
第四節 研究流程 7
第二章 文獻回顧 8
第一節 雲端運算 8
第二節 視訊安全監控 19
第三節 視訊監控技術的新發展 27
第四節 整合性科技接受與使用模型31
第三章 研究方法 39
第一節 研究架構 39
第二節 研究假說 40
第三節 研究變數定義 42
第四節 問卷設計 44
第五節 資料蒐集 45
第四章 資料分析 46
第一節 敘述性統計 46
第二節 信度分析及相關性分析 50
第三節 假設檢定 52
第五章 結論與建議 59
第一節 研究結論 59
第二節 管理意涵 62
第三節 研究限制 64
第四節 後續研究建議 65
參考文獻 66
附錄:問卷內容 75

一、中文文獻
1.A&S安全與自動化雜誌《台灣版》,香港商法蘭克福新時代傳媒有限公司台灣分公司(雜誌)。
2.內政部建築研究所 (2007),"智慧化居住空間安全監控系統整合應用計畫"。
3.內政部建築研究所 (2009),"智慧化居住空間發展重點回顧"。
4.王政欽 (2007),網際網路使用者對網路電話接受度之研究。
5.李進農 (2007),視訊監控技術與發展趨勢,「社區安全e化聯防機制」研討會論文集。
6.林心慧, 張雲豪 (2009),"以UTAUT為基礎之消費者電子折價劵使用行為之預測模式: 直接與干擾效果",中華管理評論國際學報。
7.林震岩 (2007),多變量分析-SPSS的操作及應用。
8.拓墣產業研究所 (2007),安全產業發展現況與趨勢剖析。
9.財團法人資訊工業策進會 (2009),宅經濟賺很大-智慧家庭寬頻應用新商機。
10.曹金成 (2008),物業管理系統使用行為之研究-UTAUT模型之應用。
11.張乘維 (2007/07),全球IP監控產業發展趨勢分析,拓墣產業研究所。
12.張乘維 (2007/08),網路攝影機市場現況分析,拓墣產業研究所。
13.張乘維 (2008),安全監控錄影下一個主流商品-網路影像錄影機,拓墣產業研究所。
14.康琇華 (2010),探討使用者對創新香品的採用因素-以UTAUT模式為基礎。
15.商業週刊 (2009),雲端運算為何改變10億人?,第1146期。
16.陳瀅 (2010),雲端策略, 天下雜誌。
17.經濟部 (2010),"雲端運算產業發展方案"。
18.蕭世暉 (2007),部落格使用者付費購買加值服務行為之研究。

二、英文文獻
1.Ajzen, I. (1991). "The Theory of Planned Behavior." Organizational Beahavior and Human Decision Processes 50(2), PP. 179-211.
2.Allard, T., Banin, B., and Chebat, J. (2009). "When Income Matters: Customers Evaluation of Shopping Malls'' Hedonic and Utilitarian Orientation." Journal of Retailing and Consumer Services 16(1), pp. 40-49.
3.Armbrust, M., Fox, A., Griffith, R., Joseph, A. D., Katz, R., Konwinski, A., Lee, G., Patterson, D.A., Rabkin, A., Stoica, I., and Zaharia, M. (2010). "A View of Cloud Computing." Communications of the ACM 53(4), pp. 50-58.
4.Bandura, A. (1986) Social Foundation of Thought and Action: A Social Cognitive Theory, Prentice Hall, Englewood Cliffs, NJ."
5.Chang, R-I, Wang, T-C, Wang, C-H, Liu, J-C, and Ho, J-M (2010). "Effective Distributed Service Architecture for Ubiquitous Video Surveillance." Information Systems Frontiers, Published online 14, pp. 1-17.
6.Compeau, D.R., and Higgins, C. A. (1995) "Application of Social Cognitive Theory to Traning for Computer Skills." Information Systems Research 6(2), pp. 118-143.
7.Coudert, F. (2009). "Toward a New Generation of CCTV Networks: Erosion of Data Protection Safeguards?" Computer Law & Security Review 25, pp. 145-154.
8.Cronbach, L. J. (1951). " Coefficient Alpha and the Internal Structure of Tests." Psychometrika 16, pp. 297-334.
9.Davis, F. D. (1989). "Perceiced Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology." MIS Quarterly 13(3), pp.319-339
10.Davis, F. D., Bagozzi, R. P., and Wardhaw, P. R. (1992). "Extrinsic and Intrinsic Motivation to Use Computers in the Workplace." Journal of Applied Socail Psychology 22(14), pp.1111-1132
11.Durkee, D. (2010). "Why Cloud Computing Will Never Be Free." Communications of the ACM 53(5), pp. 62-69.
12.European Commission (2010). The Future of Cloud Computing-Opportunities for European Cloud Computing Beyond 2010.
13.Fishbein, M., and Ajzen, I. (1975). Belief, Attitude, Intention, and Behavior: An introduction to Theory and Research. Reading, MA Addison-Wesley.
14.Garfield, M. J. (2005). "Acceptance of Ubiquitous Computing." Information Systems Management 22(4), pp. 24-31.
15.Gay, L. R. (1992). "Educational Research Competencies for Analysis and Application." Macmillan.
16.Hall, D., and Mansfield, R. (1995). "Relationships of Age and Seniority with Career Variables of Engineers and Scientists." Journal of Applied Psychology 60(2), pp. 201-210.
17.Hayes, B. (2008). "Cloud conputing." Communications of the ACM 51(7), pp. 9-11.
18.Iyer, B., and Henderson, J. C. (2010). "Preparing for the Future: Understanding the Seven Capabilities of Cloud Computing." MIS Quarterly Executive 9(2), pp. 117-132.
19.Jefkowitz, J. (1994). "Sex-Related Differences in Job Attitudes and Dispositional Variables - Now You See Them,..." Academy of Management Journal 37(2), pp. 323-350.
20.Kristaly, D. M., Sisak, F., Grigorescu, C. M., and Caraman, M. C. (2009). Designing the Architecture of a Scalable Video Surveillance System. Danube Adria Association for Automation and Manufacturing International. Vienna. 20, pp. 1677-1678.
21.Leny, J. A. (1988). "Intersections of Gender and Aging." The Sociological Quarterly 29(4), pp.479-486.
22.Moore, G. C., and Benbasat, I. (1991). "Development of an Instrument to Measure the Perceptions of Adopting an Information Technology Innovation." Information Systems Research 2(3), pp. 192-222.
23.Morris, M. G., and Venkatesh,V. (2000). "Age Differences in Technology Adoption Decisions: Implications for a Changing Work Force." Personnel Psychology 53(2), pp. 375-403.
24.National Institute of Standards and Technology (2011). "The NIST Definition of Cloud Computing (Draft).", pp.1-7.
25.Okazaki, S. (2006). "What Do We Know about Mobile Internet Adopters: A Cluster Analysis." Information & Management 43, pp. 127-142.
26.Pishva, D., and Takeda, K. (2006), "A product-Based Security Model for Smart Home Appliances.", Carnahan Conferences Security Technology, Proceedings 2006 40th Annual IEEE International, pp. 234-242.
27.Rogers, E. (1995) "Diffusion of Innovations." Free Press, New York.
28.Serenko, K., Turel, O., and Yol, S. (2006). "Moderating Roles of User Demographics in the American Customer Satisfaction Model within the Context of Mobile Services." Journal of Information Technology Management 17(4), pp. 20-32.
29.Shin, D-H (2009). "Towards an Understanding of the Consumer Acceptance of Mobile Wallet." Computers in Human Behavior 25, pp. 1343-1354.
30.Taylor, S., and Todd, P. A. (1995a) "Assessing IT Usage: The Role of Prior Experience." MIS Quarterly 19(2), pp. 561-570.
31.Thompson, R. L., Higgins, C. A., and Howell, J. M. (1991) "Personal Computing: Toward a Conceptual Model of Utilization." MIS Quarterly Executive 15(1), pp. 124-143.
32.Vaquero, L., Rodero-Merino, L., Caceres, J., and Lindner, M. (2009). "A Break in the Clouds: Towards a Cloud Definition." ACM Sigcomm Computer Communication Review 39(1), pp. 50-55.
33.Venkatesh, V., and Morris, M.G. (2000). "Why Don''t Men Ever Stop Ask For Directions? Gender, Social Influence, and Their Role in Techonology Acceptance and Usage Behavior." MIS Quarterly Executive 21(1), pp. 115-139.
34.Venkatesh, V., Morris, M.G., and Ackerman, P.L. (2000). "A Longitudinal Field Investigation of Gender Differences in Individual Technology Adoption Decision-Making Processes." Organizational Behavior and Human Decision Processes 83(1), pp.33-60.
35.Venkatesh, V., Morris, M.G., Davis, G. B., and Davis, F. D. (2003). "User Acceptance of Information Technology: Toward a Unified View." MIS Quarterly Executive 27(3), pp. 425-478.
36.Wright, D., Friedewald, M., Gutwirth, S., Langheinrich, M., Mordini, E., Bellanova, R., De Hert, P., Wadhwa, K., and Bigo, D. (2010). "Sorting out Smart Surveillance." Computer Law & Security Review 26(4), pp. 343-354.
37.Wu, Y-L, Tao, Y-H, and Yang, P-C (2007). "Using UTAUT to explore the behavior of 3G mobile communication users." In Proceedings of The International Conference on Industrial Engineering and Engineering Management (IEEM), pp.119-203.
38.Yang, L., Yang, S-H, and Fang, Y. (2006). "Safety and Security of Remote Monitoring and Control of Intelligent Home Enviroments." IEEE International Conference on Systems, Man, and Cybernetics, pp. 1149-1153.

三、網路文獻
1.Apptis, Inc.,http://www.apptis.com/
2.BT Group,http://www.btplc.com/
3.GKB,http://www.gkbsecurity.com/。
4.J.P. Freeman,http://www.jpfreeman.com/
5.Salesforce.com,http://www.salesforce.com/tw/
6.SecurityStation,http://www.securitystation.com/how-vsaas-works.php
7.The Washington post,Federal government picks 11 cloud-computing vendors,http://www.washingtonpost.com/wp-dyn/content/article/2010/10/22/AR2010102205932.html?sub=AR
8.王元凱 (2010),"VSaaS: Video Surveillance as a Service",http://blog.ykwang.tw/2010/10/vsaas-video-surveillance-as-service.html
9.周秉誼 (2009),"雲端運算平台-Hadoop",http://www.cc.ntu.edu.tw/chinese/epaper/0011/20091220_1106.htm
10.莊也慧 (2011),"雲端新世代專欄─安全監控雲端化 創造無限商機",http://met.asia-info.net/met_InfoBlog_Detail.aspx?id=2723
11.康和證劵 (2008),安全監控產業發展與展望,MoneyDJ 理財網,http://www.moneydj.com/kmdj/report/reportviewer.aspx?a=0b56bec6-4b51-4ae0-ae1d-75c331c5181e
12.黃東榮 (2006),"我國安全產業的發展現況及願景",「工安環保報導」,http://www.ftis.org.tw/cpe/download/she/Issue31/current31_04.htm
13.幀速率,http://hi3d.tw/3dsmax7_w/frame_rate_glossary.html
14.凱基證券 (2007),"安全監控產業值得留意- DVR及網路攝影機兩大成長動能",http://money.hinet.net/z/zd/zdc/zdcz/zdcz_66EB4F34-5A29-45ED-93AA-AE7DEF846D91.djhtm
15.資策會FIND (2008),"2008年光纖上網應用服務需求調查",「電信平台整合資通訊應用推動計畫」,http://www.find.org.tw/find/home.aspx?page=many&id=200
16.資策會FIND (2010),"光纖寬頻應用服務之需求─付費程度分析",http://www.find.org.tw/find/home.aspx?page=many&id=254
17.資策會FIND (2011),"2010年我國家庭寬頻現況與需求調查─家戶篇",
http://www.find.org.tw/find/home.aspx?page=many&id=280
18.維基百科,"雲端運算",http://zh.wikipedia.org/wiki/%E4%BA%91%E8%AE%A1%E7%AE%97
19.聯合新聞網 (2010),中國駭客入侵Google「蓋亞」密碼系統,http://mag.udn.com/mag/digital/storypage.jsp?f_ART_ID=244832
20.環球監控網,畫面處理器,http://www.ekuga.com/cctv_8_5.htm
21.藍眼科技有限公司,http://www.blueeyes.com.tw/

QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top
系統版面圖檔 系統版面圖檔