(44.192.66.171) 您好!臺灣時間:2021/05/18 01:05
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果

詳目顯示:::

: 
twitterline
研究生:塗俊安
研究生(外文):CHUN AN,TU
論文名稱:智慧型手機使用者對社群APP使用機制之研究:信任與科技接受之整合觀點
論文名稱(外文):APP smartphone users to use the mechanisms of the research community on: trust and acceptance of technology integration perspective
指導教授:楊麗玲楊麗玲引用關係
口試委員:楊麗玲吳育昇羅鈺璇
口試委員(外文):YANG,LI-LINGWU,YU-SHENGLUO,YU-XUAN
口試日期:2014-05-07
學位類別:碩士
校院名稱:中華科技大學
系所名稱:連鎖加盟業服務創新產業碩士專班
學門:商業及管理學門
學類:其他商業及管理學類
論文種類:學術論文
論文出版年:2014
畢業學年度:102
語文別:中文
論文頁數:69
中文關鍵詞:信任,科技接受,使用意圖,智慧型手機
相關次數:
  • 被引用被引用:3
  • 點閱點閱:305
  • 評分評分:
  • 下載下載:8
  • 收藏至我的研究室書目清單書目收藏:1
現今的社會,隨著科技的發展,智慧型手機的APP在台灣經濟活動中的重要性亦日漸增加。Flurry 五周年研究報告:App 正在吞噬這個世界,台灣資策會FIND估計指出,2015年時,智慧型手機使用率將會高達52.5%,然與社群軟體Facebook、Flick、twitch、微博、所提供手機用戶之互動的盛行,越來越多使用者養成了隨時隨地訊息傳輸的習慣,並由社會現況得知,台灣使用社群軟體Line的情況為最多,本研究基於此條件下,針對社群APP-Line所提供的附加價值以及人群對此社群團體的評價,藉由發放問卷方法,了解使用者對於此App的態度和想法,並從中分析出使用者的真正需求,發展出本研究的主要架構,進而增加受測者人數,以數據量化的方法評估此App是否能促進使用者互動關係。在智慧型手機使用者對社群APP的使用機制之研究中,科技接受模式的探討架構是最重要的基礎架構之一,搭配信任的整合模式,也被證實能夠在社群APP的使用上具有良好的預測能力。然而考量我國在信任的形成機制上與西方有所差異,本研究從華人的關係主義出發,使用本土信任理論與人脈的網絡概念,以血親基礎、專業基礎和制度基礎做為我國智慧型手機使用者對社群APP建構信任的前因,並將其與科技接受模式進行整合,以對我國使用機制做出進一步的研究。本研究透過網路問卷的方式蒐集資料,共採用406個樣本,以多元迴歸以及結構方程模式來進行分析。結果發現,本研究所提出之信任形成機制較過去採用西方信任理論者,對我國智慧型手機使用者的預測力更佳;而本研究所提出之本土信任與科技接受之整合模式,在適配度與預測能力上都表現十分優良,能夠適切地解釋我國智慧型手機使用者對社群APP的使用行為。本研究為我國手機APP使用者的信任研究提供了不同的視野,找尋了一個合適的基礎框架。
The importance of the current social , with the rapid changes in technology , shop , smart phones in Taiwan's economic activity is also increasing. In the study mechanism of Community consumer APP past , the technology acceptance model is regarded as one of the most important infrastructure , and its integration with the trust framework , also confirmed that consumers can use on the Community APP have good predictive ability . However, considering the formation mechanism of consumer trust differ from the West, from the study of the relationship between the Chinese stance, the use of the local network of trusted network theory and concepts presented to blood -based , professional and institutional basis for the foundation of wisdom as mobile phone users on the Community APP construct trust antecedents , and integrate with the technology acceptance model to consumers on our site to make further use of the mechanism depicted . This study collected data over a network questionnaire , used a total of 394 samples to multiple regression and structural equation modeling to analyze . It was found that the trust formation mechanism proposed in this study than in the past by adopting Western theories of trust on our smartphone users better predictive power ; proposed integrated model of the local Institute of Technology Acceptance of trust and , in terms of fitness with the ability to predict the degree or have performed very well, able to appropriately interpret our community APP smartphone users to use behavior. Overall, the study of trust research network is to provide a different perspective, enrich the connotation of trust theory, and for the next Taiwanese society increasingly warm online consumer behavior , provides a suitable basis for the theoretical framework
摘要 .............................................. i
Abstract ............................................ ii
第一章 緒論 .......................................... 1
1.1研究背景與動機 ................................................ 1
1.2研究目的 ...................................................... 4
1.3研究流程 ...................................................... 5
1.4研究範圍 ...................................................... 6
1.5論文架構 ...................................................... 6
第二章 文獻回顧 ...................................... 7
2.1智慧型手機 .................................................... 7
2.2科技接受模式 .................................................. 7
2.2.1理性行為理論(Theory of Reasoned Action, TRA) ............ 7
2.2.2科技接受模式 .............................................. 8
2.2.3信任與科技接受模式 ....................................... 11
2.3社群APP之信任形成機制 ....................................... 13
2.3.1智慧型手機使用者知覺信任 ................................. 13
2.3.2本土信任之形成機制 ....................................... 15
第三章 研究方法 ................................... 22
3.1研究架構 ..................................................... 22
3.2問卷設計 ..................................................... 24
3.3問卷之信度與效度 ............................................. 25
3.4資料蒐集 ..................................................... 25
4.1變項說明與信效度分析 ......................................... 27
4.1.1變項說明與信度分析 ....................................... 27
4.1.2效度分析 ................................................. 29
4.2結構方程模式分析 ............................................. 31
4.2.1整體模式分析 ............................................. 31
4.2.2測量模式分析 ............................................. 34
4.2.3結構模式分析 ............................................. 37
第五章 結論與建議 ................................... 39
5.1研究結論 ..................................................... 39
5.2研究討論與理論貢獻 ........................................... 39
5.3未來研究方向 ................................................. 41
參考文獻 ............................................ 43
附錄一:前測問卷 ..................................... 50
附錄二:正式問卷 .................................... 56
中文部份
[1]王怡文、陳亮全、黃光國,2006,<華人社會中的信任策略>。《本土心理學研究》25: 199-241。
[2]王怡文,2007,《本土社會信任理論模型的建構:環境決策過程中的社會信任分析》。發表地點:國立臺灣大學建築與城鄉研究所,博士論文。
[3]王熙哲、丁耀民,2008,<人際關係網路對虛擬社群使用意願的影響>。《資訊管理學報》 15(1): 53-72。
[4]台灣網路資訊中心,2010,台灣寬頻網路使用調查。http://www.twnic.net.tw/。取用日期:2010年9月15日。
[5]吳亞馨、朱素玥、方文昌,2008,<網路購物信任與科技接受模式之實證研究>。《資訊管理學報》15(1): 123-152。
[6]吳玲玲、李藍瑜、蘇席儀,2008,<消費前資訊搜尋之網站接受度>。《資訊管理學報》15(3): 227-250。
[7]黃俊英,《多變量分析》,2007。台北:中國經濟企業研究所。
[8]資策會,2009。https://www.find.org.tw, 取用日期:2009年12月19日。
[9]羅家德、葉勇助,《中國人的信任遊戲》,2007。北京:社會科學文獻出版社。
[10]科技報橘(2011),研究:智慧型手機如何幫助使用者購物,線上檢索日期:2011年,網址:http//techorange.com/2011/04/30/how-people-use-smartphones-to-purchase-products/
[11]中國時報。2011,網址:http://www.teamsourcing.com.tw/news/2011/1030/article_12.html
[12]Flurry。2013,網址:http://www.inside.com.tw/2013/04/08/flurry-five-year-report-it-s-an-app-world-the-just-web-lives-in-it
英文部份
[1]Agarwal, R. and Karahanna, E. (2000) “Time Flies When You´re Having Fun: Cognitive Absorption and Beliefs About Information Technology Usage.” MIS Quarterly 24(4): 665-694.
[2]Ba, S. and Pavlou, P.A. (2002) “Evidence of the effect of trust building technology in electronic markets: price premium and buyer behavior." MIS Quarterly 26(3):243-268.
[3]Bagozzi, R. P. and Youjae Yi. (1988) “On the Evaluation of Structural Equation Models.” Journal of the Academy of Marketing Science 16: 74-94.
[4]Bian, Y. & S. Ang. (1997) “Guanxi Networks and Job Mobility in China and Singapore.” Social Forces 75: 981-1006.
[5]Boon, S.D. and Holmes, J.G., (1985) “The Dynamics of Interpersonal Trust:Resolving Uncertainty in the Face of Risk," in Robert A. Hinde & Jo Groebel (eds.), Cooperation and Personal Behavior, New York: Cambridge University, 190-211
[6]Burnett, B., Tsang, S., Studer, S., Hills, P., & Welford, R. (2008) “Measuring trust in Government: a Hong Kong.” International Public Management Review 9(2): 107-126.
[7]Davis, F.D. (1986) “A Technology Acceptance Model for Empirically Testing New End-User Information Systems: Theory and Results."Doctoral Dissertation, MIT Sloan School of Management, Cambridge, MA.
[8]Davis, F. D. (1989) “Perceived Usefulness, Perceived Ease of Use and User Acceptance of Information Technology.” MIS Quarterly 13(3): 319-340.
[9]Davis, F.D., Bagozzi, R.P. and Warshaw, P.R. (1989) “User acceptance of computer technology: A comparison of two theoretical models.” Management Science 35(8): 982-1003.
[10]Davis, F.D., Bagozzi, R.P. and Warshaw, P.R. (1992) “Extrinsic and Intrinsic Motivation to Use Computers in the Workplace.” Journal of Applied Social Psychology 22(14): 1111-1132.
[11]Deutsch, M. (1960) “The effect of motivational orientation upon trust and suspicion."HumanRelations 13: 123-139.
[12]Dirks, K.T. (1999) “The effects of interpersonal trust on work group performance,"Journal of Applied Psychology 84(3): 445-455.
[13]Doney, P.M. and Cannon, J.P. (1997) “An Examination of the Nature of Trust in Buyer-Seller Relationships.” Journal of Marketing 61: 35-51.
[14]Driscoll, J. W. (1978) “Trust and participation in organizational decision making as predictors of satisfaction.” Academy of Management Journal 21(1): 44-58.
[15]Fishbein, M., and I. Ajzen. (1975) Belief, attitude, intention and behavior: An introduction to theory and research. Reading, MA: Addison-Wesley.
[16]Garbarino, E. and Johnson, M. S. (1999) “The different roles of satisfaction, trust, and commitment in customer relationships.” Journal of Marketing 63: 70-87.
[17]Gefen, D. (2000) “E-Commerce: The Role of Familiarity and Trust" Omega 28(6): 725-737.
[18]Gefen, David, Karahanna, E. and Straub, D. W., (2003) “Trust and TAM in Online Shopping: An Integrated Model.” MIS Quarterly 27(1): 51-90.
[19]Gefen, David, Karahanna, E. and Straub, D. W. (2003) “Inexperience and Experience With Online Stores: The Importance of TAM and Trust.” IEEE Transactions on Engineering Management 50(3): 307-321.
[20]Gefen, D., and Straub, D. W. (2000) “The Relative Importance of Perceived Ease-of-Use in IS Adoption: A Study of E-Commerce Adoption.” Journal of the Association for Information System 1(8): 1-30.
[21]Gefen, D., and Straub, D. W. (2004) "Consumer Trust in B2C e-Commerce and the Importance of Social Presence: Experiments in e-Products and e- Services." Omega: The International Journal of Management Science 32(6): 407-424.
[22]Granovetter, M. (1985) “Economic action and social structure: A theory of embeddeness.” American Journal of Sociology 91: 481-510.
[23]Ho, D. Y. F., Peng, S. Q., Lai, A. C. & Chan, S. F. F. (2001) “Indigenization and Beyond: Methodological Relationalism in the Study of Personality Across Cultural Traditions.” Journal of Personality 69(6): 925-953.
[24]Hosmer. L, T. (1995) "Trust: the Connecting Link between Organizational Theory and Philosophical Ethics." Academy of Management Review 20(2): 379-403.
[25]Jarvenpaa, S.L., Knoll, K., and Leidner, D.E. (1998) “Is Anybody Out There? Antecedents of Trust in Global Virtual Teams."Journal of Management Information Systems 14(4): 29-64.
[26]Jarvenpaa, S.L., and Tractinsky. N. (1999) “Consumer trust in an internet store: A cross-cultural validation."Journal Comput. Mediated Commun. 5(2): 1-35.
[27]Jarvenpaa, S.L., Tractinsky, N., and Vitale, M. (2000) “Consumer Trust in and Internet Store." Information Technology and Management 1:45-71.
[28]Karahanna, E. and Straub, D. W. (1999) “The psychological origins of perceived usefulness and perceived ease-of-use.” Information Management 35: 237-250.
[29]Karahanna, E., Straub, D.W. ,and Chervany, N.L. (1999) “Information technology adoption across time: A cross-sectional comparison of pre-adoption and post-adoption beliefs.” MIS Quarterly 23(2): 183-213.
[30]Kasperson, R. E., Golding, D., & Tuler, S. (1992) “Social distrust as a factor in siting hazardous facilities and communicating risks.” Journal of Social Issues, 48(4): 161-187.
[31]Kitayama, S. (2002) “Culture and Basic Psychological Processes-Toward a System View of Culture: Comment on Oyserman et al.” Psychological Bulletin 128(1): 89-96.
[32]Kline, R.B. (1998) Principles and Practice of Structural Equation Modeling, The Guilford Press, New York.
[33]Koufaris, M. (2002) “Applying Technology Acceptance Model and Flow Theory to Online Consumer Behavior."Information Systems Research 13(2): 205-223.
[34]Kumar, N. (1996) “The Power of Trust in Manufacturer-Retailer Relationships." Havard Business Review 74(6):93-106
[35]Lederer, A. L., Maupin, D. J., Sena, M. P., and Zhuang, Y. (2000) “The Technology Acceptance Model and the World Wide Web.” Decision Support Systems 29(3): 269-282.
[36]Lee, D., Park, J., and Ahn, J. (2001) On the Expanation of Factors Affecting E-Commerce Adoption. Preceedings of the 22nd International Conference on Information Systems, V. Storey, S. Sarket, and J.I. DeGross(eds.), New Orleans, Louisiana, 109-120.
[37]McLain, D.L. and Hackman, K. (1999) “Trust, Risk, and Decision making in Organizational Change."Public Administration Quarterly 23(2): 152-176.
[38]Miniwatts Marketing Group. (2010) “Internet Usage Statistics-World Internet Usage and Population Statistics.”, http://www.internetworldstats.com (Date visited: Oct. 15, 2009.)
[39]Moon, Ji-Won and Kim , Young-Gul. (2001) “Extending the TAM for a Word-Wide-Web Context."Information & Management 38: 217-230.
[40]Morgan, R.M., and Hunt, S.D. (1994) “The Commitment-trust Theory of Relationship Marketing." Journal of Marketing 58:20-38.
[41]Morrman, C., Deshpande, R., & Zaltman, G. (1993) “Factors affecting trust in market research relationships.” Journal of Marketing 57: 81-101.
[42]Peters, R. G., Covello, V. T., & McCallum, D. B. (1997) “The determinants of trust and credibility in environmental risk communication: an empirical study.” Risk Analysis 17(1): 43-54.
[43]Reichheld, F.F., and Schefter, P. (2000) “E-loyalty: Your secret weapon on the web." Havard Business Review 78(4): 105-113.
[44]Ring, P.S., and Van de Ven, A. H. (1992) “Structuring Cooperative Relationships between Organizations." Strategic Management Journal 13: 483-498.
[45]Rose, G., and Straub, D. W. (1998) “Predicting General IT Use:Applying TAM to the Arabic World.” Journal of Global Information Management 6(3): 39-46.
[46]Rotter, J.B. (1980) “Interpersonal Trust, Trustworthiness and Qullibility."American Psychology 35: 1-7.
[47]Rousseau, S. B., Sitkin, S. B., Burt, R. S., & Camerer, C. (1998) “Not so different after all: A cross-disciplineview of trust.” Academy of Management Review 23(3): 393-404.
[48]Siegrist, M. and Gutscher, H. (2005) “Perception of risk: the influence of general trust, and general confidence.” Journal of Risk Research 8(2): 145-156.
[49]Sjazna, B. (1994) “Software Evaluation and Choice:Predictive Validation of the Technology Acceptance Instrument” MIS Quarterly 17(3): 319-324.
[50]Straub, D.W., Keil, M., and Brennan, W. (1997) “Testing the Technology Acceptance Model across Cultures: A Three Country Study."Information & Management 33: 1-11.
[51]Tan, K.C. (2001) “A Structural Equation Model of New Product Design and Development." Decision Sciences 32(2): 195-226.
[52]Zucker, L. G. (1986) “Production of trust: institutional sources of economic structure.” Research in Organizational Behavior 8: 53-111.

QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top