(3.230.76.48) 您好!臺灣時間:2021/04/15 00:11
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果

詳目顯示:::

我願授權國圖
: 
twitterline
研究生:李亦宸
研究生(外文):Yi-chen Lee
論文名稱:科技產品的接受與抗拒 -以智慧型手機為例
指導教授:洪秀婉洪秀婉引用關係
指導教授(外文):Shiu-wan Hung
學位類別:碩士
校院名稱:國立中央大學
系所名稱:企業管理學系
學門:商業及管理學門
學類:企業管理學類
論文種類:學術論文
論文出版年:2013
畢業學年度:101
語文別:中文
論文頁數:95
中文關鍵詞:科技接受使用者抗拒智慧型手機因素分析
外文關鍵詞:Technology AcceptanceUser ResistanceSmart phoneFactor Analysis
相關次數:
  • 被引用被引用:4
  • 點閱點閱:440
  • 評分評分:系統版面圖檔系統版面圖檔系統版面圖檔系統版面圖檔系統版面圖檔
  • 下載下載:32
  • 收藏至我的研究室書目清單書目收藏:2
隨著科技不斷的發展,越來越多創新的科技產品出現在市場上,許多嶄新的功能都帶給人類生活方式重大的改變,其中,結合通訊、資訊傳輸以及娛樂等功能之智慧型手機可說是21世紀初最具代表性的科技產品之一,然而,創新的科技產品雖為人們帶來了許多方便以及提高其生活品質,但伴隨而來的風險以及更多成本的耗費導致目前仍有許多消費者對於智慧型手機使用持著保留態度。為了更加了解消費者對於智慧型手機的態度、使用意圖與使用行為,本研究以科技接受相關的文獻為主,加上使用者抗拒相關的文獻,整合成更完整的變數構面來探討科技產品之研究。
本研究以377份有效問卷進行因素分析與結構方程式歸納出影響使用者的接受面與抗拒面因素。結果顯示,在接受面因素中,使用智慧型手機帶來的臨場效益、操作自信及控制能力會正向影響使用者對於智慧型手機之使用態度;在抗拒面因素中,焦慮感以及需求僵固會降低使用者對於智慧型手機的使用態度,最後,本研究結果也期望可提供台灣智慧型手機製造商有用資訊,使其更能了解終端消費者對於智慧型手機產品的整體意圖,做為廠商對於顧客關係管理、行銷管理以及產品設計研發上參考的依據。

With the continuous development of technology, more and more innovative products with many new features on the market make an significant impact on human life, 「Smart phone」combined with communication, data transmission and entertainment is one of the most typical technological product, however, innovation product brings a lot of convenience into life, and makes life better, along with risks and cost ,as a result, lots of consumers are still unsure of using new smart phone.
In order to understand the adoption of smart phone, this study integrates technology acceptance literature and user resistance literature into an overall model, and collects 377 valid questionnaires. Factor analysis and Structural Equation Model (SEM)are applied to test the hypotheses of this study. The findings of this study indicates that Graphical Advantages, Operational Confidence, Perceived External Control and Perceived Risk have positive effect on attitude of smart phone; Computer Anxiety and Need Inertia have negative effect on attitude of smart phone.
This study expects to provide useful information to Taiwan smart phone manufacturing companies, helping them have better understanding of consumer need, and as reference of Customer Relationship Management, Marketing and R&D.

中文摘要 2
Abstract 3
誌謝辭 4
圖目錄 7
表目錄 8
第一章 緒論 1
1-1 研究背景與動機 1
1-2 研究目的 2
1-3 研究流程 3
第二章 文獻探討 4
2-1 科技接受相關文獻 4
2-2 使用者抗拒相關文獻 12
第三章 研究方法 19
3-1 研究步驟 19
3-2 研究關係與假說推論 32
3-3 研究變數定義與問卷設計 33
3-4 研究對象與資料蒐集 39
第四章、實證分析 40
4-1 敘述性統計 40
4-2 因素分析 44
4-3 信效度分析 50
4-4 結構方程式驗證 53
第五章、結論與建議 57
5-1 研究結論 57
5-2 實務意涵 62
5-3 研究限制與後續研究建議 64
附錄一、智慧型手機概況 65
附錄二、研究問卷 72
參考文獻 78

中文資料:
[1]. 資策會FIND:http://www.find.org.tw/find/home.aspx
[2]. 資策會MIC:http://mic.iii.org.tw/aisp/
[3]. 國際數據資訊IDC:http://www.idc.com.tw/
[4]. 洪新原, 梁定澎, et al. (2005). "科技接受模型之彙總研究." 資訊管理學報 12(4): 211-234.
[5]. 陳冠廷 (2008). "智慧型手機作業系統之競合策略分析." 臺灣大學商學研究所學位論文(2008 年): 1-100.
[6]. 陳順宇,多變量分析,四版,華泰書局,2005

英文資料:
[1]. Agarwal, R., & Prasad, J. (1998). A conceptual and operational definition of personal innovativeness in the domain of information technology. Information Systems Research, 9(2), 204-215.
[2]. Ahuja, M. K., & Thatcher, J. B. (2005). Moving beyond intentions and toward the theory of trying: effects of work environment and gender on post-adoption information technology use. MIS quarterly, 29(3), 427-459.
[3]. Ajzen, I. (1985). From intentions to actions: A theory of planned behavior: Springer.
[4]. Al-Natour, S., Benbasat, I., & Cenfetelli, R. (2011). The adoption of online shopping assistants: perceived similarity as an antecedent to evaluative beliefs. Journal of the Association for Information Systems, 12(5), 2.
[5]. Al-Somali, S. A., Gholami, R., & Clegg, B. (2009). An investigation into the acceptance of online banking in Saudi Arabia. Technovation, 29(2), 130-141.
[6]. Anderson, J. C., & Gerbing, D. W. (1988). Structural equation modeling in practice: A review and recommended two-step approach. Psychological bulletin, 103(3), 411-423.
[7]. Anderson, J. E., Schwager, P. H., & Kerns, R. L. (2006). The drivers for acceptance of tablet PCs by faculty in a college of business. Journal of Information Systems Education, 17(4), 429.
[8]. Bandura, A. (1978). Self-efficacy: Toward a unifying theory of behavioral change. Advances in Behaviour Research and Therapy, 1(4), 139-161.
[9]. Barich, H., & Kotler, P. (1991). A framework for marketing image management. Sloan management review, 32(2), 94.
[10]. Beatty, S. E., Homer, P., & Kahle, L. R. (1988). The involvement—commitment model: Theory and implications. Journal of Business Research, 16(2), 149-167.
[11]. Benlian, A., Koufaris, M., & Hess, T. (2011). Service quality in software-as-a-service: developing the SaaS-Qual measure and examining its role in usage continuance. Journal of management information systems, 28(3), 85-126.
[12]. Bentler, P. M. (1983). Some contributions to efficient statistics in structural models: Specification and estimation of moment structures. Psychometrika, 48(4), 493-517.
[13]. Bentler, P. M., & Bonett, D. G. (1980). Significance tests and goodness of fit in the analysis of covariance structures. Psychological bulletin, 88(3), 588-606.
[14]. Best, J. (2006). Analysis: What is a smart phone. Good question. CBS Interactive.(accessed 23.11. 09).
[15]. Bhattacherjee, A. (2001). Understanding information systems continuance: an expectation-confirmation model. MIS quarterly, 25(3), 351-370.
[16]. Bhattacherjee, A., & Hikmet, N. (2007). Physicians' Resistance toward Healthcare Information Technologies: A Dual-Factor Model. Paper presented at the System Sciences, 2007. HICSS 2007. 40th Annual Hawaii International Conference on.
[17]. Booz, A. (1982). Hamilton, New product management for the 1980s. Booz, Allen and Hamilton, New York.
[18]. Brockner, J., Rubin, J. Z., Fine, J., Hamilton, T. P., Thomas, B., & Turetsky, B. (1982). Factors affecting entrapment in escalating conflicts: The importance of timing. Journal of Research in Personality, 16(2), 247-266.
[19]. Brown, S. A., Dennis, A. R., & Venkatesh, V. (2010). Predicting collaboration technology use: Integrating technology adoption and collaboration research. Journal of management information systems, 27(2), 9-54.
[20]. Brown, S. A., & Venkatesh, V. (2005). Model of adoption of technology in households: A baseline model test and extension incorporating household life cycle. MIS quarterly, 399-426.
[21]. Browne, M. W., Cudeck, R., Bollen, K. A., & Long, J. S. (1993). Alternative ways of assessing model fit. Sage Focus Editions, 154, 136-136.
[22]. Burnham, T. A., Frels, J. K., & Mahajan, V. (2003). Consumer switching costs: a typology, antecedents, and consequences. Journal of the Academy of Marketing Science, 31(2), 109-126.
[23]. Cenfetelli, R. T. (2004). Inhibitors and enablers as dual factor concepts in technology usage. Journal of the Association for Information Systems, 5(11), 3.
[24]. Chen, K., Chen, J. V., & Yen, D. C. (2011). Dimensions of self-efficacy in the study of smart phone acceptance. Computer Standards & Interfaces, 33(4), 422-431.
[25]. Chen, Z., & Dubinsky, A. J. (2003). A conceptual model of perceived customer value in e‐commerce: A preliminary investigation. Psychology & Marketing, 20(4), 323-347.
[26]. Cheng, Y. M. (2011). Antecedents and consequences of e‐learning acceptance. Information Systems Journal, 21(3), 269-299.
[27]. Compeau, D. R., & Higgins, C. A. (1995a). Application of social cognitive theory to training for computer skills. Information Systems Research, 6(2), 118-143.
[28]. Compeau, D. R., & Higgins, C. A. (1995b). Computer self-efficacy: Development of a measure and initial test. MIS quarterly, 189-211.
[29]. Cothran, T. (2011). Google Scholar acceptance and use among graduate students: A quantitative study. Library & Information Science Research, 33(4), 293-301.
[30]. Datta, P. (2011). A preliminary study of ecommerce adoption in developing countries. Information Systems Journal, 21(1), 3-32.
[31]. Davis, F. D. (1989). Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS quarterly, 319-340.
[32]. Delone, W. H. (2003). The DeLone and McLean model of information systems success: a ten-year update. Journal of management information systems, 19(4), 9-30.
[33]. Doney, P. M., & Cannon, J. P. (1997). An examination of the nature of trust in buyer-seller relationships. the Journal of Marketing, 35-51.
[34]. Douglass, D. W. M. (1997). Cyberself: The emergence of self in on-line chat. The Information Society, 13(4), 375-397.
[35]. Dowling, G. R., & Staelin, R. (1994). A model of perceived risk and intended risk-handling activity. Journal of consumer research, 119-134.
[36]. Economides, N. (1996). The economics of networks. International journal of industrial organization, 14(6), 673-699.
[37]. El-Gayar, O., Moran, M., & Hawkes, M. (2011). Students’ acceptance of tablet PCs and implications for educational institutions. Journal of Educational Technology & Society, 14(2), 58-70.
[38]. Elie-Dit-Cosaque, C., Pallud, J., & Kalika, M. (2011). The Influence of Individual, Contextual, and Social Factors on Perceived Behavioral Control of Information Technology: A Field Theory Approach. Journal of management information systems, 28(3), 201-234.
[39]. Fishbein, M., & Ajzen, I. (1975). Belief, attitude, intention and behavior: An introduction to theory and research.
[40]. Fornell, C., & Larcker, D. F. (1981). Structural equation models with unobservable variables and measurement error: Algebra and statistics. Journal of Marketing Research, 382-388.
[41]. Goodhue, D. L., & Thompson, R. L. (1995). Task-technology fit and individual performance. MIS quarterly, 213-236.
[42]. Grönroos, C., Heinonen, F., Isoniemi, K., & Lindholm, M. (2000). The NetOffer model: a case example from the virtual marketspace. Management Decision, 38(4), 243-252.
[43]. Hardgrave, B. C., Davis, F. D., & Riemenschneider, C. K. (2003). Investigating determinants of software developers' intentions to follow methodologies. Journal of management information systems, 20(1), 123-152.
[44]. Heerink, M., Ben, K., Evers, V., & Wielinga, B. (2008). The influence of social presence on acceptance of a companion robot by older people. Journal of Physical Agents, 2(2), 33-40.
[45]. Hoffman, L. R., & Kleinman, G. B. (1994). Individual and Group in Group Problem Solving The Valence Model Redressed. Human Communication Research, 21(1), 36-59.
[46]. Hsu, C.-L., & Lin, J. C.-C. (2008). Acceptance of blog usage: The roles of technology acceptance, social influence and knowledge sharing motivation. Information & Management, 45(1), 65-74.
[47]. Huang, T. C.-K., Liu, C.-C., & Chang, D.-C. (2012). An empirical investigation of factors influencing the adoption of data mining tools. International Journal of Information Management, 32(3), 257-270.
[48]. Im, I., Hong, S., & Kang, M. S. (2011). An international comparison of technology adoption: Testing the UTAUT model. Information & Management, 48(1), 1-8.
[49]. Jahng, J., Jain, H., & Ramamurthy, K. (2007). Effects of interaction richness on consumer attitudes and behavioral intentions in e-commerce: some experimental results. European Journal of Information Systems, 16(3), 254-269.
[50]. Jain, H., Ramamurthy, K., Ryu, H.-S., & Yasai-Ardekani, M. (1998). Success of data resource management in distributed environments: an empirical investigation. MIS quarterly, 1-29.
[51]. Jarvenpaa, S. L., Tractinsky, N., & Saarinen, L. (1999). Consumer Trust in an Internet Store: A Cross‐Cultural Validation. Journal of Computer‐Mediated Communication, 5(2), 0-0.
[52]. Jones, M. A., Mothersbaugh, D. L., & Beatty, S. E. (2002). Why customers stay: measuring the underlying dimensions of services switching costs and managing their differential strategic outcomes. Journal of Business Research, 55(6), 441-450.
[53]. Joshi, K. (1991). A model of users' perspective on change: the case of information systems technology implementation. MIS quarterly, 229-242.
[54]. Joshi, K., & Lauer, T. W. (1999). Transition and change during the implementation of a computer-based manufacturing process planning system: An analysis using the equity implementation model. Engineering Management, IEEE Transactions on, 46(4), 407-416.
[55]. Judd, B. R., & Weissenberger, S. (1982). A systematic approach to nuclear safeguards decision-making. Management Science, 28(3), 289-302.
[56]. Karahanna, E., & Straub, D. W. (1999). The psychological origins of perceived usefulness and ease-of-use. Information & Management, 35(4), 237-250.
[57]. Kauffman, R. J., McAndrews, J., & Wang, Y.-M. (2000). Opening the “black box” of network externalities in network adoption. Information Systems Research, 11(1), 61-82.
[58]. Kim, B., & Han, I. (2009). What drives the adoption of mobile data services? An approach from a value perspective. Journal of Information Technology, 24(1), 35-45.
[59]. Kim, H.-W. (2011). The effects of switching costs on user resistance to enterprise systems implementation. Engineering Management, IEEE Transactions on, 58(3), 471-482.
[60]. Kim, H.-W., & Kankanhalli, A. (2009). Investigating user resistance to information systems implementation: A status quo bias perspective. MIS quarterly, 33(3), 567-582.
[61]. Kim, H. W., & Gupta, S. (2012). Investigating Customer Resistance to Change in Transaction Relationship with an Internet Vendor. Psychology & Marketing, 29(4), 257-269.
[62]. Kim, J. (2006). Toward an understanding of Web‐based subscription database acceptance. Journal of the American Society for Information Science and Technology, 57(13), 1715-1728.
[63]. Kim, S., & Garrison, G. (2010). Understanding users’ behaviors regarding supply chain technology: Determinants impacting the adoption and implementation of RFID technology in South Korea. International Journal of Information Management, 30(5), 388-398.
[64]. Kline, R. (1998). Principles and practice of structural equation modeling: A very readable introduction to the subject, with good coverage of assumptions and SEM's relation to underlying regression, factor, and other techniques: NY: Guilford Press.
[65]. Koufaris, M., & Hampton-Sosa, W. (2002). Customer trust online: examining the role of the experience with the Web-site. Department of Statistics and Computer Information Systems Working Paper Series, Zicklin School of Business, Baruch College, New York.
[66]. Lapointe, L., & Rivard, S. (2005). A multilevel model of resistance to information technology implementation. MIS quarterly, 461-491.
[67]. Lauer, T. W., Joshi, K., & Browdy, T. (2000). Use of the Equity Implementation Model to Review Clinical System Implementation Efforts A Case Report. Journal of the American Medical Informatics Association, 7(1), 91-102.
[68]. Levitt, T. (1966). Innovative imitation. Harvard Business Review, 44(5), 63-70.
[69]. Lewin, K. (1947). Frontiers in group dynamics: concept, method and reality in social science; social equilibria and social change. Human relations.
[70]. Lin, C.-P., & Ding, C. G. (2005). Opening the black box: assessing the mediating mechanism of relationship quality and the moderating effects of prior experience in ISP service. International Journal of Service Industry Management, 16(1), 55-80.
[71]. Loiacono, E. T., Watson, R. T., & Goodhue, D. L. (2007). WebQual: an instrument for consumer evaluation of web sites. International Journal of Electronic Commerce, 11(3), 51-87.
[72]. Lou, H., Luo, W., & Strong, D. (2000). Perceived critical mass effect on groupware acceptance. European Journal of Information Systems, 9(2), 91-103.
[73]. Lu, Y., Deng, Z., & Wang, B. (2010). Exploring factors affecting Chinese consumers' usage of short message service for personal communication. Information Systems Journal, 20(2), 183-208.
[74]. Lynne, G. D., Franklin Casey, C., Hodges, A., & Rahmani, M. (1995). Conservation technology adoption decisions and the theory of planned behavior. Journal of economic psychology, 16(4), 581-598.
[75]. Madsen, M., & Gregor, S. (2000). Measuring human-computer trust. Paper presented at the Proceedings of Eleventh Australasian Conference on Information Systems.
[76]. Marakas, G. M., & Hornik, S. (1996). Passive resistance misuse: overt support and covert recalcitrance in IS implementation. European Journal of Information Systems, 5(3), 208-219.
[77]. Markus, M. L. (1983). Power, politics, and MIS implementation. Communications of the ACM, 26(6), 430-444.
[78]. Martinko, M. J., Zmud, R. W., & Henry, J. W. (1996). An attributional explanation of individual resistance to the introduction of information technologies in the workplace. Behaviour & Information Technology, 15(5), 313-330.
[79]. Mason, P. (1986). Brood parasitism in a host generalist, the shiny cowbird: II. Host selection. The Auk, 61-69.
[80]. Mathieson, K. (1991). Predicting user intentions: comparing the technology acceptance model with the theory of planned behavior. Information Systems Research, 2(3), 173-191.
[81]. Mayer, R. C., Davis, J. H., & Schoorman, F. D. (1995). An integrative model of organizational trust. Academy of management review, 709-734.
[82]. McGrath, J. E., Kelly, J. R., & Machatka, D. E. (1984). The social psychology of time: Entrainment of behavior in social and organizational settings. Applied social psychology annual.
[83]. Moore, G. C., & Benbasat, I. (1991). Development of an instrument to measure the perceptions of adopting an information technology innovation. Information Systems Research, 2(3), 192-222.
[84]. Mullin, B.-A., & Hogg, M. A. (1999). Motivations for group membership: The role of subjective importance and uncertainty reduction. Basic and Applied Social Psychology, 21(2), 91-102.
[85]. Nysveen, H., Pedersen, P. E., & Thorbjørnsen, H. (2005). Explaining intention to use mobile chat services: moderating effects of gender. Journal of Consumer Marketing, 22(5), 247-256.
[86]. Parasuraman, A. (2000). Technology Readiness Index (TRI) a multiple-item scale to measure readiness to embrace new technologies. Journal of Service Research, 2(4), 307-320.
[87]. Park, N., Roman, R., Lee, S., & Chung, J. E. (2009). User acceptance of a digital library system in developing countries: An application of the Technology Acceptance Model. International Journal of Information Management, 29(3), 196-209.
[88]. Pavlou, P. A., Liang, H., & Xue, Y. (2007). Understanding and mitigating uncertainty in online exchange relationships: A principal-agent perspective. MIS quarterly, 31(1), 105-136.
[89]. Ping, R. A. (1993). The effects of satisfaction and structural constraints on retailer exiting, voice, loyalty, opportunism, and neglect. Journal of retailing, 69(3), 320-352.
[90]. Polites, G. L., & Karahanna, E. (2012). Shackled to the status quo: the inhibiting effects of incumbent system habit, switching costs, and inertia on new system acceptance. MIS quarterly, 36(1), 21-42.
[91]. Polites, G. L., & Watson, R. T. (2009). Using social network analysis to analyze relationships among IS journals. Journal of the Association for Information Systems, 10(8), 595-636.
[92]. Pura, M. (2005). Linking perceived value and loyalty in location-based mobile services. Managing Service Quality, 15(6), 509-538.
[93]. Ram, S., & Sheth, J. N. (1989). Consumer resistance to innovations: the marketing problem and its solutions. Journal of Consumer Marketing, 6(2), 5-14.
[94]. Rice, R. E. (1987). Computer‐mediated communication and organizational innovation. Journal of Communication, 37(4), 65-94.
[95]. Ring, P. S., & Van de Ven, A. H. (1994). Developmental processes of cooperative interorganizational relationships. Academy of management review, 90-118.
[96]. Rogers, E. M. (1995). Diffusion of Innovation. 4th: New York: Free Press.
[97]. Ronald, T., & Howell, H. (1991). Personal Computing: Toward a Conceptual Model of Utilization. Management Information System Quarterly, 21(3).
[98]. Rosenstock, I. M. (1974). The health belief model and preventive health behavior. Health Education & Behavior, 2(4), 354-386.
[99]. Samuelson, W., & Zeckhauser, R. (1988). Status quo bias in decision making. Journal of risk and uncertainty, 1(1), 7-59.
[100]. Sarker, S., Valacich, J. S., & Sarker, S. (2005). Technology adoption by groups: A valence perspective. Journal of the Association for Information Systems, 6(2), 3.
[101]. Shin, D.-H. (2007). User acceptance of mobile Internet: Implication for convergence technologies. Interacting with Computers, 19(4), 472-483.
[102]. Shin, D.-H. (2012). What makes consumers use VoIP over mobile phones? Free riding or consumerization of new service. Telecommunications Policy, 36(4), 311-323.
[103]. Shin, D. H. (2009). Determinants of customer acceptance of multi-service network: An implication for IP-based technologies. Information & Management, 46(1), 16-22.
[104]. Short, J., Williams, E., & Christie, B. (1976). The social psychology of telecommunications.
[105]. Speier, C., & Venkatesh, V. (2002). The hidden minefields in the adoption of sales force automation technologies. the Journal of Marketing, 98-111.
[106]. Spreng, R. A., MacKenzie, S. B., & Olshavsky, R. W. (1996). A reexamination of the determinants of consumer satisfaction. the Journal of Marketing, 15-32.
[107]. Sweeney, J. C., & Soutar, G. N. (2001). Consumer perceived value: the development of a multiple item scale. Journal of retailing, 77(2), 203-220.
[108]. Taylor, S., & Todd, P. (1995). Assessing IT usage: The role of prior experience. MIS quarterly, 561-570.
[109]. Taylor, S., & Todd, P. A. (1995). Understanding information technology usage: A test of competing models. Information Systems Research, 6(2), 144-176.
[110]. Teng, W., Lu, H.-P., & Yu, H. (2009). Exploring the mass adoption of third-generation (3G) mobile phones in Taiwan. Telecommunications Policy, 33(10), 628-641.
[111]. Tornatzky, L. G., & Klein, K. J. (1982). Innovation characteristics and innovation adoption-implementation: A meta-analysis of findings. Engineering Management, IEEE Transactions on(1), 28-45.
[112]. Toto, R., Lim, K. Y., Nguyen, H., Zappe, S., & Litzinger, T. (2008). Acceptance of Tablet PC technology by engineering faculty. Paper presented at the Frontiers in Education Conference, 2008. FIE 2008. 38th Annual.
[113]. Tseng, F.-M., & Lo, H.-Y. (2011). Antecedents of consumers’ intentions to upgrade their mobile phones. Telecommunications Policy, 35(1), 74-86.
[114]. Turel, O., Serenko, A., & Bontis, N. (2010). User acceptance of hedonic digital artifacts: A theory of consumption values perspective. Information & Management, 47(1), 53-59.
[115]. Vallerand, R. J. (1997). Toward a hierarchical model of intrinsic and extrinsic motivation. Advances in experimental social psychology, 29, 271-360.
[116]. Van der Heijden, H., Verhagen, T., & Creemers, M. (2003). Understanding online purchase intentions: contributions from technology and trust perspectives. European Journal of Information Systems, 12(1), 41-48.
[117]. Venkatesh, V. (2000). Determinants of perceived ease of use: Integrating control, intrinsic motivation, and emotion into the technology acceptance model. Information Systems Research, 11(4), 342-365.
[118]. Venkatesh, V., Morris, M. G., Davis, G. B., & Davis, F. D. (2003). User acceptance of information technology: Toward a unified view. MIS quarterly, 425-478.
[119]. Venkatesh, V., & Speier, C. (1999). Computer technology training in the workplace: A longitudinal investigation of the effect of mood. Organizational behavior and human decision processes, 79(1), 1-28.
[120]. Venkatesh, V., Speier, C., & Morris, M. G. (2002). User acceptance enablers in individual decision making about technology: Toward an integrated model. Decision Sciences, 33(2), 297-316.
[121]. Venkatesh, V., Thong, J., & Xu, X. (2012). Consumer acceptance and use of information technology: extending the unified theory of acceptance and use of technology. MIS quarterly, 36(1), 157-178.
[122]. Verkasalo, H. T. (2008). Empirical Modelling of the Mobile VoIP Demand. Paper presented at the Proceedings of the International MultiConference of Engineers and Computer Scientists.
[123]. Voss, G. B., Parasuraman, A., & Grewal, D. (1998). The roles of price, performance, and expectations in determining satisfaction in service exchanges. the Journal of Marketing, 46-61.
[124]. Walster, E., & Traupmann, J. (1978). Equity and extramarital sexuality. Archives of Sexual Behavior, 7(2), 127-142.
[125]. Warshaw, P. R. (1980). A new model for predicting behavioral intentions: An alternative to Fishbein. Journal of Marketing Research, 153-172.
[126]. Xue, Y. (2009). AVOIDANCE OF INFORMATION TECHNOLOGY THREATS: ATheoretical PERSPECTIVE. MIS quarterly, 33(1), 71-90.
[127]. Yoon, H. S., & Barker Steege, L. M. (2012). Development of a quantitative model of the impact of customers’ personality and perceptions on Internet banking use. Computers in Human Behavior.
[128]. Yousafzai, S. Y., Foxall, G. R., & Pallister, J. G. (2010). Explaining internet banking behavior: theory of reasoned action, theory of planned behavior, or technology acceptance model? Journal of Applied Social Psychology, 40(5), 1172-1202.
[129]. Zaltman, G., Duncan, R., & Holbek, J. (1973). Innovations and organizations (Vol. 1973): Wiley New York.
[130]. Zucker, L. G. (1986). Production of trust: Institutional sources of economic structure, 1840–1920. Research in organizational behavior.

連結至畢業學校之論文網頁點我開啟連結
註: 此連結為研究生畢業學校所提供,不一定有電子全文可供下載,若連結有誤,請點選上方之〝勘誤回報〞功能,我們會盡快修正,謝謝!
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top
系統版面圖檔 系統版面圖檔