跳到主要內容

臺灣博碩士論文加值系統

(3.237.38.244) 您好!臺灣時間:2021/07/26 08:54
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

: 
twitterline
研究生:雷壁瑩
研究生(外文):Lei, Pi-Ying
論文名稱:影響護理資訊系統使用因素之研究
論文名稱(外文):A Study of Factors Influencing Use of Nursing Information Systems
指導教授:阮金聲阮金聲引用關係
指導教授(外文):Roan, Jinsheng
口試委員:吳英隆林器弘
口試委員(外文):Wu, Ing-LongLin, Chihung
口試日期:2012-06-28
學位類別:碩士
校院名稱:國立中正大學
系所名稱:高階主管管理碩士在職專班
學門:商業及管理學門
學類:其他商業及管理學類
論文種類:學術論文
論文出版年:2012
畢業學年度:100
語文別:中文
論文頁數:103
中文關鍵詞:護理資訊系統科技接受模式認知威脅抗拒改變
外文關鍵詞:Nursing Information SystemTechnology Acceptance Model (TAM)Perceived ThreatResistance to Change
相關次數:
  • 被引用被引用:3
  • 點閱點閱:762
  • 評分評分:
  • 下載下載:45
  • 收藏至我的研究室書目清單書目收藏:0
護理資訊系統的使用以簡化護理工作流程,降低臨床護理人員的工作負荷,進而營造友善護理人員的執業環境。護理資訊系統繼醫療、醫務行政等資訊系統開發成熟後,逐漸成為醫療機構資訊科技發展的趨勢,醫院高階主管以此作為提昇競爭優勢的重要策略。本研究整合促進與抗拒使用行為之研究相關變數,以認知有用、認知易用、抗拒改變、認知威脅、使用意圖和使用行為六個構面,作為本研究之概念模式來探討影響護理資訊系統的因素,並經實證資料的驗證,來解釋為何使用者對護理資訊系統的相關行為。問卷發放以國內某醫療體系之不同層級與不同專科的臨床護理人員作為實證研究的對象,共發出480 份問卷,回收391 份。

研究結果顯示認知有用與認知易用會正向影響使用意圖;認知威脅會正向影響抗拒改變以及會負向影響使用意圖;而使用意圖會正向影響使用行為;但抗拒改變對於認知有用與使用意圖並沒有影響。顯示知覺有用與知覺易用將會提升臨床護理人員想要去使用護理資訊系統的可能性,但是讓護理人員感受到有威脅的時候,便會降低護理人員想要去使用的想法。所以本研究認為應該讓護理人員感受護理資訊系統對工作是有幫助的且容易使用的,並且降低護理人員對於工作威脅的感覺,才能增進護理資訊系統導入與使用更加順利。而本研究結果可提供產、官、學界,在學術研究及實務運用上的參考,同時最後也提出對管理者及後續研究者的建議。
A nursing information system (NIS) is designed to simplify nursing processes, to alleviate clinical nurses’ workload, and to build a friendly practice environment for nurses. After health and medical administrative systems had been matured, the nursing information system has also gradually become a trend for the development of information technology. Therefore, senior executives in hospitals consider it an important strategy for the enhancement of competitive advantages.

Integrating resistance into technology acceptance model, this study analyzed four factors, including perceived usefulness, perceived ease of use, resistance to change, and perceived threat, to explore their influences on the intention to use nursing information systems. 480 copies of questionnaires were distributed to clinical nurses of different levels and various specialties in a major medical institution system in Taiwan and 391 effective responses were received. Structural Equation Modeling was then employed to analyze the data and the results were as follows.
1. Perceived usefulness and perceived ease of use had positive influences on the intention to use NIS.
2. Perceived threat had a negative influence on the intention to use NIS and a positive influence on resistance to change.
3. Intention to use NIS had a positive effect on NIS use behavior.

The study concludes that, successful implementation and smooth use of the nursing information system should be achieved on the premises that nurses’ perceived threats are eliminated and the system is helpful and readily accessible to them. The results of the study can be a reference to further researches in academia and practical application in industries.
第一章 緒論 .................................................................... 1
第一節 研究背景和動機 ............................................................ 1
第二節 研究目的與問題 ............................................................ 6
第三節 研究流程 ................................................................. 8
第二章 文獻探討 ................................................................. 10
第一節 護理臨床實務與護理資訊系統 ................................................... 12
第二節 科技接受相關理論 ........................................................... 20
第三節 變革管理 .................................................................. 27
第三章 研究架構與方法 ............................................................. 31
第一節 研究架構 .................................................................. 31
第二節 研究假說 .................................................................. 33
第三節 變數之操作定義及衡量 ......................................................... 38
第四節 研究設計 ................................................................... 43
第五節 研究對象與方法 .............................................................. 44
第六節 資料分析方法 ............................................................... 45
第四章 資料分析方法 ............................................................... 46
第一節 問卷回收與樣本代表性 ......................................................... 47
第二節 樣本結構分析 ............................................................... 48
第三節 護理資訊系統使用描述 ......................................................... 51
第四節 研究量表信度與效度分析 ....................................................... 53
第五節 結構方程模式與路徑分析 ....................................................... 60
第五章 結論與建議 ................................................................. 70
第一節 研究結論 ................................................................... 70
第二節 研究貢獻 ................................................................... 78
第三節 研究限制 ................................................................... 83
第四節 後續建議 ................................................................... 86
參考文獻 ......................................................................... 91
附錄:問卷 ........................................................................ 98
一、中文文獻
1.黃興進、張怡秋 (2004)。 影響導入護理計劃系統關鍵因素之實證研究,行政院國家科學委員會。
2.行政院衛生署 (2011)。 衛生署委託台灣醫界聯盟於辦理「99年醫事人力需求推估論壇」期末成果報告,2011/1/28-31。
3.胡庭禎、陳智賢 (2008)。 資訊科技在臨床護理應用之現況及成效比較研究,行政院衛生署。
4.吳定、鄭勝分、李盈盈 (2005)。 組織發展應用技術,台北:智勝。
5.徐建業 (2005)。 電子病歷在醫院上的運用及功能.於行政院衛生主辦,制定及推動電子病歷內容及基本格式研討會.台中:台中榮民醫院。
6.張敏、林璟淑、張元玫、李亭亭 (2008)。 護理資訊應用介紹—某醫院護理資訊系統推行之經驗分享,護理雜誌,55(3),75-79。
7.馮容莊、林碧珠 (2010)。 探討護理人員延遲下班之相關因素,護理雜誌,27(1),10-19。
8.劉穎翰 (2002)。 民營化組織變革環境下之工會承諾模式研究,大業大學工業工程研究所 未出版 碩士論文。
9.廖淑儀 (2004)。 組織變革策略對台北市某地區醫院營運的衝擊,長庚大學醫務管理研究所 未出版 碩士論文。
10.洪新源 (2005)。 科技接受模式之彙總研究,資訊管理學報,12(4),211-234。
11.蕭如玲、黃興進 (2007),發展護理計劃系統之探索性研究,志為護理,6(1),80-89。
12.林東清、孫培真、徐景智 (2000)。 影響資訊系統使用者抗拒行為之原因:以計劃行為理論為基礎之整合研究,資訊管理研究, 2(2), 1-26。
13.許孟祥 (1998)。 影響電腦倫理行為因素之研究:以結構模式分析法來驗證其因果關係,國立中山大學資管所 未出版 博士論文。
14.陳順宇 (1998)。 迴歸分析,第二版,華泰書局。
15.祝國忠、蔡明諭、華之揚、陳冠華 (2009)。 護理資訊的現況與未來趨勢,台灣國際醫學資訊聯合研討會。

二、英文文獻
1.Aiken, H. L. (1990). Charting the future of hospital nursing. Image. Journal of Nursing Scholarship, 22(2), 72-78.
2.Ajzen, I. (1991). The Theory of planned behavior. Organizational Behavior and Human Decision Processes, 50(2), 179-211.
3.Ajzen, I., & Fishbein, M. (1980). Understanding attitudes and predicting social behavior. Prentice-Hall, Englewood Cliffs, NJ.
4.Ajzen, I., (1985). From intention to actions: A Theory of planned behavior. In J. Kuhl, & J. Bechmann (eds), Action-Control: From Cognition to Behavior, Springer, Heidelberg, 11-39.
5.Ajzen, I., (1989). Attitude structure and behavior. In A. R. Pratkanis, S. J. Breckler, & A. G. Greenwald (eds), Attitude structure and function, lawrence erlbaum associates. Hillsdale, NJ, 241-274.
6.Akesson, K. M., Saveman, B. I., and Nilsson, G. (2007). Health care consumers’ experiences of information communication technology - A summary of literature. International. Journal of Medical Informatics, 76(9), 633-645.
7.American Nurses Association Council on Computers in Nursing. (1995). Report on the designation of nursing informatics as a specialty Congress of Nursing Practice unpublished report. In V. Saba and K. McCormick, Essentials of Computers for Nursing (2nd ed., 222-226). New York :McGraw-Hill.
8.Davis, F. D. (1989) Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS Quarterly, 13(3), 319-340.
9.Davis, F. D., and Venkatesh, V. (2004). Toward preprototype user acceptance testing of new information systems Implications for software project management. IEEE Transactions on Engineering Management, 51(1), 31-46
10.Davis, F. D., Bagozzi, R. P., & Warshaw, P. R. (1989). User acceptance of computer technology: A Comparison of two theoretical models. Management Science. 35(8) 982-1003.
11.Fishbein, M., & Ajzen, I. (1975). Belief, attitude, intention and behavior: An Introduction to theory and research. Addison-Wesley, Reading, MA.
12.Hackman, J. R. and Oldham, G. R. (1976), Motivation through the design of work-test of a theory. Organizational Behavior and Human Decision Processes, 16(2), 250.
13.Hair, J. F., Anderson, R.E., Tatham, R. L., (2006) Multivariate data analysis (6th ed.).Pearson Education, Inc. New Jersey.
14.Hoffman, H. (1989). A nurse retention program. Nursing Economics, 7(2), 94-96.
15.Karahanna, E., Agarwal, R., and Angst, C. M. (2006). Reconceptualizing compatibility beliefs in technology acceptance research. MIS Quarterly, 30(4), 781-804.
16.Lin, C. (2011). Mediated moderation of the intention and behavior relation: an example of a nursing information system. National Chung Cheng University, Dissertation.
17.Lin, C., Lin, I.C., and Roan, J. (2012). Barriers to physicians’ adoption of healthcare information technology: an empirical study on multiple hospitals. Journal of Medical Systems, 36(3), 1965-1977.
18.Mathieson, K. (1991). Predicting user intentions: comparing the technology acceptance model with the theory of planned behavior. Information Systems Research, 2(3), 173-191.
19.Menon, N. M., Lee, B., and Eldenburg, L. (2000). Productivity of information systems in the healthcare industry. Information Systems Research, 11(1), 83-92.
20.Mohiyeddini, C., Pauli, R., and Bauer, S. (2009). The role of emotion in bridging the intention–behaviour gap: The case of sports participation. Psychology of Sport and Exercise, 10(2), 226-234.
21.Moon, M. J., and Bretschneider, S. (1997). Can state government actions affect innovation and its diffusion?: an extended communication model and empirical test. Technological Forecasting and Social Change, 54, 57-77.
22.Premkumarm, G., and Potter, M. (1995). Adoption of computer aided software engineering (CASE) technology: an innovation adoption perspective. Data Base Advances, 26, 105-124.
23.Prestwich, A., Perugini M., and Hurling, R. (2008). Goal desires moderate intention-behaviour relations. British Journal of Social Psychology, 47, 49-71.
24.Rhodes, R., and Courneya, K. (2003). Self-efficacy, controllability and intention in the theory of planned behavior: measurement redundancy or causal independence. Psychology and Health, 18(1), 79-91.
25.Sandberg, T., and Conner, M. (2011). Using self-generated validity to promote exercise behaviour. British Journal of Social Psychology, 50(4), 769-783.
26.Sheeran, P. (2002). Intention-behavior relations: A conceptual and empirical review. European Review of Social Psychology, 12, 1-36.
27.Sheeran, P., and Abraham, C. (2003). Mediator of Moderators: Temporal stability of intention and the intention-behavior relation, Personality and Social Psychology Bulletin, 29(2), 205-215.
28.Sheppard, B. H., Hartwick, J., and Warshaw, P. R. (1988). The Theory of reasoned action: A Meta-analysis of past research with recommendations for modifications and future research. Journal of Consumer Research, 15(3), 325-343.
29.Simpson, R. L., and Weaver, C. A. (2006). Administrative application of information technology for nursing managers. In V. K. Saba and K. A. McCormick, Essentials of nursing informatics (4th ed. 445-456). Boston: McGraw Hill.
30.Smith, D S., Rogers, S.H., Hood, E.R., and Phillips, D.M. (1998). Overtime reduction with the press of a button: An Unexpected outcome of computerized documentation. Nursing Case Management, 3(6), 266-270.
31.Sniehotta, F.F., Schwarzer, R., Scholz, U., and Schüz, B. (2005). Action planning and coping planning for long-term lifestyle change: theory and assessment. European Journal of Social Psychology, 35, 565-576.
32.Soliman, K. S., and Janz, B. D. (2004). An exploratory study to identify the critical factors affecting the decision to establish Internet-based interorganizational information systems. Information and Management, 41, 697-706.
33.Song J. and Zahedi, F. (2005). A Theoretical approach to web design in e-commerce: a belief reinforcement model. Management Science, 51(8), 1219-1235.
34.Taylor, S., and Todd, P. A. (1995a). Assessing it usage: the role of prior experience. MIS Quarterly, 19(4), 561-570.
35.Taylor, S., and Todd, P. A. (1995b). Understanding information technology usage: A Test of competing models. Information Systems Research, 6(2), 144-176.
36.Thompson, R. L., Higgins, C. A., and Howell, J. M. (1991). Personal computing: toward a conceptual model of utilization. MIS Quarterly 15(1), 125-143.
37.Thong, J. Y. L., and Yap, C. S. (1995). CEO Characteristics, organizational characteristics and information technology adoption in small businesses, Omega, 23, 429-442.
38.Torkzadeh, G., and Koufteros, X. (1994). Factorial validity of a computer self-efficacy scale and the impact of computer training. Educational and Psychological Measurement, 54(3), 813-821.
39.Turchik, J. A., and Gidycz, C. A. (2012). Exploring the intention-behavior relationship in the prediction of sexual risk behaviors: Can it be strengthened? Journal of Sex Research, 49(1), 50-60.
40.Venkatesh, V., and Davis, F. D. (2000). A theoretical extension of the technology acceptance model: Four longitudinal field studies. Management Sciences. 46(2) 186-204.
41.Venkatesh, V., Morris, M. G., and Ackerman, P. L. (2000). A Longitudinal field investigation of gender differences in individual technology adoption decision-making processes. Organizational Behavior and Human Decision Processes, 83(1), 33-60.
42.Venkatesh, V., Morris, M. G., Davis, G. B., and Davis, F. D. (2003). User acceptance of information technology: toward a unified view, MIS Quarterly, 27(3), 425-478.
43.Viswanath, V. and Bala, H. (2008). Technology acceptance model 3 and a research agenda on interventions, Decision Sciences, 39(2), 273-315.

QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top