跳到主要內容

臺灣博碩士論文加值系統

(44.211.117.197) 您好!臺灣時間:2024/05/23 11:37
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

: 
twitterline
研究生:黃柏勛
研究生(外文):Po-Shiun Huang
論文名稱:影響智慧型手機使用者下載非法軟體行為之因素探討
論文名稱(外文):A Study on Factors Affecting Smart-phone Users to Download Illegal Software Acts
指導教授:曾繁絹曾繁絹引用關係黃筱雯黃筱雯引用關係
指導教授(外文):Fan-Chuan TsengHSIAO-WEN HUANG
口試委員:柯秀佳許瓊文
口試委員(外文):Hsiu-Chia KoChiung-Wen Hsu
口試日期:2013-01-18
學位類別:碩士
校院名稱:長榮大學
系所名稱:資訊管理學系碩士班
學門:電算機學門
學類:電算機一般學類
論文種類:學術論文
論文出版年:2013
畢業學年度:101
語文別:中文
論文頁數:87
中文關鍵詞:智慧型手機科技準備度軟體盜版模式科技接受模式消費者倫理
外文關鍵詞:Smartphone, , , ,Technology ReadinessSoftware Piracy ModelTechnology Acceptance ModelConsumer Ethics
相關次數:
  • 被引用被引用:1
  • 點閱點閱:355
  • 評分評分:
  • 下載下載:16
  • 收藏至我的研究室書目清單書目收藏:2
近年,智慧型手機的出現,帶來更多功能及便利性,加深人類對於手機的需求。智慧型手機軟體(俗稱App)帶來龐大的商機。免費App如同電腦軟體試用版,提供使用者簡易功能的試用,試用滿意後透過付費購買就可享有完整的功能。然而,部分智慧型手機使用者因為金錢方面或是朋友分享等因素,衍生出非法下載行為。這些行為對於消費者來說,本身不需要花費任何金錢就可以享受到付費App的服務,是有相當吸引力的,對於開發商來說這些行為危害自身利益,進而造成更多不肖業者或是駭客來進行非法及破解行為,造成App智慧財產權的危害。
本研究探討智慧型手機使用者採用非廠商正式提供免費或付費App軟體下載市場,而使用第三方市場抓取付費App的行為,並從資訊科技使用者的角度進行相關探討。本研究以科技接受模式中的認知有用性以及認知易用性兩構面,並結合消費者倫理、科技準備度、以及軟體盜版模式中的軟體成本與懲罰等構面,進一步探討造成智慧型手機使用者免費下載付費App違反倫理行為的可能因素。
本研究採用問卷調查法,研究對象以智慧型手機使用者為主,透過網路問卷和紙本問卷調查,共蒐集有效樣本201份,研究結果發現,認知有用性、認知易用性與消費者倫理對下載非法App有顯著影響。

In recent years, the emergence of smartphones, comes with more features and convenience and deepens the human demand for mobile phones. Smart phone software commonly known as App brings huge business opportunities. Free App trial version like computer software, provides users a simple function of the trial, after the trial satisfied through pay to enjoy the full functionality. However, some smart phone users because of economic constraints or friends’ sharing, spawned acts of illegal downloading. For consumers, these acts itself does not need to spend any money to enjoy the services of paid-for App; for developers, these acts against their own interests cause damage of intellectual property rights.
This study adopts the perspectives of perceived usefulness and perceived ease of use, combined with consumer ethics, technology readiness, as well as the mode of software piracy model such as cost and penalty, to explore the possible factors which influence the consumers’ intention to freely download the paid App.
In this study, survey method was conducted by questionnaire and the subject focused onsmart phone users A total of 201 subjects were collected and the results found that perceived usefulness, perceived ease of use and consumer ethics are significant factors influencing the downloading behavior of illegal App be significant.

第一章、 緒論 1
1.1 研究背景 1
1.2 研究動機 3
1.3 研究目的 4
第二章、 文獻探討 6
2.1 智慧型手機 6
2.2 消費者倫理 9
2.3 科技接受模型 12
2.4 科技準備度 15
2.5 軟體盜版模式 18
第三章、 研究方法 21
3.1 研究假設 21
3.2 研究架構 28
3.3 研究對象與方式 29
3.4 問卷設計 30
3.5 資料分析的方法 35
第四章、 研究結果與分析 38
4.1 敘述統計分析 38
4.2 信度與效度分析 48
4.3 線性結構關係模式 67
第五章、 結論與建議 69
5.1 研究結果以及討論 69
5.2 討論 73
5.3 研究貢獻 74
5.4 研究限制與建議 75
第六章、 參考文獻 76
附錄 81
1.王尹軒(2004),什麼是智慧型手機?,IThome 2004,09,07,取自:http://www.ithome.com.tw/itadm/article.php?c=25920
2.祝劍禾(2011),天才少年駭客被蘋果公司招安 曾是"越獄"高手 ,京華時報2011,08,30,取自:http://big5.ce.cn/gate/big5/intl.ce.cn/qqss/201108/30/t20110830_22657646.shtml
3.科技產業資訊(2012),智慧裝置於2013年出貨量將可達12億台,科技產業資訊2012,11,12,取自: http://iknow.stpi.narl.org.tw/Post/Read.aspx?PostID=7553
4.國際數據資訊有限公司IDC(2006),智慧型手機的定義,IDC台灣-IT市場研究報告。
5.尤克熙(2002),「Smart Phone 發展現況與趨勢分析」,資策會MIC 報告
6.呂智忠,(2003),國家文化特質與消費倫理信念對消費者採購仿冒品行為之影響,國立東華大學國際企業研究所未出版碩士論文。
7.呂彥妮,(2003),消費者道德信念,個人/集體主義傾向與相依性對消費者購買仿冒商品行為之影響,國立東華大學國際企業研究所未出版碩士論文。
8.林惠琦(2004),「仿冒品購買意圖之研究-以台灣、香港、新加坡地區為例」,國立東華大學國際企業研究所 未出版碩士論文。
9.吳亞馨、朱素玥、方文昌(2008),「網路購物信任與科技接受模式之實證研究」,資訊管理學報,第 15 卷1 期,頁 123-152
10.吳穩男、林宜隆、張志汖,(2009),探討智慧型手機之數位證據鑑識作業程序與工具之研究
11.孫嘉祈、張世其、陳世良(2008),「如何提升顧客忠誠度-融合交易成本理論及科技接受模式觀點」,科技管理學刊,第 13 卷 1 期,頁 1-39
12.張意珮(2003),真的很smart的smartphone--談智慧型手機定義及未來趨勢,拓墣產業研究所 焦點報告,手機與行動通訊No.16,1-6
13.梁世安、余國瑋(2005),「以科技接受模式探討二輪式電動代步車消費者接受程度」,行銷評論,第 2 卷 2期,頁 135-148。
14.徐百欽(2006),以情境預防觀點探討台灣大學生軟體非法之意志與非意志控制研究,國立高雄大學經濟管理研究所碩士論文
15.陳順宇(2006) ,多變量分析(四 ed),華泰出版
16.陳冠名(2007)。智慧型行動電話裝置發展現況暨產品趨勢探索,資策會MIC
17.陳盈嘉(2007),影響智慧型行動電話第三方應用軟體廠商網絡連結對象決策之因素研究,國立中央大學企業管理學系研究所碩士論文。
18.楊銀濤(2009)。智慧型手機發展的趨勢研究。國立成功大學企業管理研究所,碩士論文。
19.蔡靜茹(2005),「消費者相依性特質對仿冒品侵權態度、消費倫理信念與購買仿冒品意向關係之影響研究」,國立東華大學國際企業研界所未出版碩士論文。
20.蕭銘雄、鄭曉平(2008),「以延伸式科技接受模型探討消費者線上投保人壽保險之意願」,電子商務學報,第 10 卷 1 期,頁 1-25。
21.蘇雅嵐,(2004),消費倫理與知覺風險對侵權產品消費行為之影響,國立中興大學行銷研究所未出版碩士論文。
22.Ajzen, I., and M. Fishbein (1980), Understanding Attitudes and Predicting Social Behavior, Prentice-Hall Press.
23.Al-Khatib, J., Vitell, S. J., and Rawwas, M. Y. A. (1997), “ Consumer Ethics: A Cross-cultural Investigation”, European Journal of Marketing, 31(11/12), 750-767
24.Albers-Miller, N. (1999), “Consumer Misbehavior: Why People Buy Illicit Goods”, Journal of Consumer Marketing, 16(3), 273-287
25.Ang, S. H., Cheng, P. S., Lin, E. A. C., and Tambyah, S. K. (2001), “Spot the Difference: Consumer Responses towards Counterfeits”, Journal of Consumer Marketing, 18(3), 219-235
26.Bagozzi, R.P. and Yi, Y.(1988), “On the Evaluation of Structural Equation Mdels,” Academy of Marking Science,16, 76-94
27.Bhattacharjee. S., Gopal, R. D. & Sanders, G. L. (2003). Digital Jmusic and Online Sharing:Software Piracy2.0?, Communications of the Acm, 46(7), 107–111.
28.Conner, K. R. and Rumelt, R. P. (1991), "Software piracy: An analysis of protection strategies,"Management Science, 37(2), 136-137.
29.Chin, W.W. (1998), The Partial Least Squares Approach to Structural Equation Modeling, in Modern Methods for Business Research, G. A. Marcoulides (ed.), Lawrence Erlbaum Associates, Mahwah, NJ, 295-336
30.Davis, F. D. (1986). A technology acceptance model for empirically testing new-user information system: Theory and results. Unpublished doctoral dissertation thsis, Sloan School of Management, MIT.
31.Davis, F.D. (1989). Perceived usefulness, perceived ease of use, and user acceptanceof information technology. MIS Quarterly, 14, 319-340.
32.Davis, F.D., R.P. Bagozzi, and P.R. Warshaw (1989), “User acceptance of computer technology,”Management Science, 35(8),982-1003.
33.Dodge, H.R., Edwards, E.A., and Fullerton, S. (1996), “Consumer Transgression in the Marketplace: Consumers’ Perspectives”, Psychology & Marketing, 13(8), 821-835
34. Eining, M.M. and Christensen A.L.( 1991), A Psycho-Social Model of Software Piracy: The Development and Test of a Model , Ethical Issues in Information Systems , 182-188
35.Fishbein, Martin , & Isek Ajzen (1975) , Belief , Attitude , Intention , and Behavior :An Introduction to Theory and Research , MA: Addison-Wesley
36.Fullerton, S., Kerch, K. B., and Dodge H. R. (1996), “Consumer Ethics: An Assessment of Individual Behavior in the Market Place”, Journal of Business Ethics, 15(7), 805-814
37.Freestone, O. & Mitchell, V.(2004), “Generation Y Attitudes Towards E-ethics and Internet-related Misbehaviours”, Journal of Business Ethics , 54(2), 121-128.
38.Gopal, R. D. and Sanders, G. L. (1997), "Preventive and deterrent controls for software piracy," Journal of Management Information Systems, 13(4), 29-47.
39.Gefen, D., Straub, D. W. and Boudreau, M. C.(2000), "Structural equation modeling andregression: Guidelines for research practice,"Communications of AIS, 4(7),1-80.
40.Gefen, D., Karahanna, E., & Straub, D. W. (2003), “Trust and TAM in online shopping: an integrated model”, MIS Quarterly, 27(1), 51-90
41.Hu, P.J., Chau, P.Y.K., Sheng, O.R.L. & Tam, K.Y. (1999), “Examining the technology acceptance model using physician acceptance of telemedicine technology”, Journal of Management Information Systems, 16, 91-112.
42.Kim et al.(2003),”The effect of consumer-based brand equity on firms’ financialperformance”,Journal of Consumer Marketing, 20(4-5) , 335-351
43.Kwong, K. K., Yau, O. H. M., Lee, J. S. Y., Sin, L. Y. M., and Tse, A. C. B. (2003), “The Effects of Attitudinal and Demographic Factors on Intention to Buy Pirated CDs: The Case of Chinese Consumers”, Journal of Business Ethics, 47(3) , 223-235.
44.Kleijnen, M. H. P., J. C. de Ruyter and M. G. M. Wetzels (2004). “Consumer Adoption of Wireless Services: Discovering the Rules, While playing the Game,” Journal of Interactive Marketing, 18(2) , 51-61.
45.Logsdon, J. M, Thompson, J. K., Reid, and Richard, A. (1994), “Software Piracy: Is It Related to Level of Moral Judgment?”, Journal of Business Ethics, 13(11) , 849-857
46.Liao, S., Shao, Y. P., Wang, H. & Chen, A. (1999), “The adoption of virtual banking: an empirical study”, Internation of Journal of Information Management, 19, 63-74.
47.Lai, K., Y. Kay, and J. L. Zaichkowsky, (1999) “Brand Imitation: Do the Chinese Have Different Views?” Asia Pacific Journal of Management, 16(2) , 179-192.
48.Lin, J. C. C. & Lu, H. (2000), “Towards an understanding of the behavioral intention to use a web site”, International Journal of Information Management,20, 197-208.
49.Lin, J.C. and Hsieh, P.L. (2006), “The role of technology readiness in customers,perception and adoption of self-service technologies”, International Journal of Service Industry Management, 17(5), 497-517
50.Liljander, V., Gillberg, F., Gummerus, J. and van Riel, A. (2006), “Technology readiness and the evaluation and adoption of self-service technologies”, Journal of Retailing and Consumer Services, 13(3), 177-91
51.Lin, C. H., Shih, H. Y., and Sher, P. J.(2007), “Integrating technology readiness into technology acceptance: the TRAM model,” Psychology and Marketing, 641-657.
52.Lin, C. J. S. and Hsieh, P. L. (2007), “The Influence of Technology Readiness on Satisfaction and BehavioralIntentions toward Self-Service Technologies,” Computers in Human Behavior, 23(3), 1597-1615
53.Muncy, J. A. and. Vitell, S. J. (1992), “Consumer Ethics: An Investigation of the Ethical Beliefs of the Final Consumer”, Journal of Business Research, 24(4) , 297-311.
54.Muncy, J. A. and Eastman, J. K. (1998), “Materialism and Consumer Ethics: An Exploratory Study”, Journal of Business Ethics, 171(2) , 137-145
55.Mathieson, K., Peacock, E. & Chin, W. W. (2001), “Extending the TAM: the influence of perceived user resources”, The DATA BASE for Advances in Information Systems, 32(3), 86-112.
56.Moon, J. W. & Kim, Y. G. (2001), “Extending the TAM for a world-wide-web context”, Information & Management, 38(4), 217-230
57.Parasuraman (2000), "Technology Readiness Index: A Multiple-ItemScale to Measure Readiness to Embrace New Technologies", Journal of Service Research, 2(4), 307-320.
58.Peace, A. G., Galletta, D. F. and Thong, J. Y. L., (2003). Software Piracy in the Workplace:20 A Model and Empirical Test, Journal of Management Information Systems, 20(1) , 153-177.
59.Robinson, J. P., haver, P. R., & Wrightsman, L.S. (1991). Measures of personality and social psychological attitudes. Volume 1: Measures of social psychological attitudes. San Diego, CA: Academic Press.
60.Rawwas, M. Y. A., Patzer, G. L. and Klassen, M. L. (1995), “Consumer EthicsCross-cultural Settings Entrepreneurial Implications”, European Journal of Marketing, 29(7) , 62-78
61.Swinyard, W. R., Rinne, H., and Kau, A. K. (1990), “The Morality of Software Piracy: A Cross-Cultural Analysis”, Journal of Business Ethics, 9(8) , 655-664.
62.Simpson, P. M., Banerjee, D., and Simpsom, Jr, C. L. (1994), “Softling: A Model Of Motivating Factors”, Journal of Business Ethics, 13(6) , 431-438
63.Strutton, D., Vitell, S. J., and Pelton L. E. (1994), “How Consumers May JustifyInAppropriate Behavior in Market Settings: An Application on the Techniques ofNeutralization”, Journal of Business Research, 30(3) , 253-260
64.Taylor, S., & Todd, P. A. (1995). Understanding information technology usage: A test of competing models. Information Systems Research, 6(2) , pp. 145-176
65.Thong, J. Y. L. and Yap Chee-Sing (1998), “Testing An Ethical Decision-Making Theory: The Case of Softlifting”, Journal of Management Information Systems, 15(1) , 213-237
66.Taylor, S. L. (2004), “Music Piracy-Differences in the Ethical Perceptions ofBusiness Majors and Music Business Majors”, Journal of Education for Business,79(5) , 306-310
67.Venkatesh, V. & Davis, F. D. (2000), “a theoretical extension of the technology acceptance model: four longitudinal field studies ”, Management Science, 46(20), 168-204
68.Vitell, S. J., Singhapakdi, A., and Thomas, J. (2001), “Consumer Ethics: An Application and Empirical Testing of Hunt-Vitell Theory of Ethics”, Journal of Consumer Marketing, 18(2) , 153-178
69.Vitell, S. J. (2003), “Consumer Ethics Research: Review, Synthesis and Suggestions for the Future”, Journal of Business Ethics, 43(1/2) , 33-47
70.Wangner, S. C. and G. L. Sanders, (2001) ―Consideration in Ethical Decision-Making andSoftware Piracy, Journal of Business Ethics, 29(1/2), 161-167.

QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top