( 您好!臺灣時間:2021/05/15 16:19
字體大小: 字級放大   字級縮小   預設字形  


研究生(外文):Yuan-Yu Shih
論文名稱(外文):Exploring the Consumer’s Intention of Using Mobile Payment Service – An Example of NFC
指導教授(外文):Chuan-Chuan Lin
外文關鍵詞:mobile paymentNear Field Communication technologyinnovation diffusion theoryperceived riskperceived security
  • 被引用被引用:20
  • 點閱點閱:2037
  • 評分評分:
  • 下載下載:60
  • 收藏至我的研究室書目清單書目收藏:3
自2012年開始,在產業環境日漸成熟之下,行動支付技術相較於先前獲得了更多的關注。其中,以近場通訊技術(Near Field Communication, NFC)為基礎的行動支付方案成為熱烈討論的話題。隨著智慧型手機的普及化,行動支付的模式是否有機會繼網路銀行後成為下一個消費者常用的付款方式,將取決於消費者採用的意願。因此,本研究目的在探討以近場通訊技術為基礎的行動支付服務下,創新擴散因子及知覺安全因子是否對消費者採用行動支付的態度產生正面的影響;此外,在科技散佈的過程中,除了正面因素對提升消費者採納的影響,負面因素同時會降低消費者採納意願,本研究將探討知覺風險中的績效風險,財務風險及隱私風險,是否會妨礙消費者採用行動支付服務的意願。
With the maturation of the mobile payment technology after 2012, the applications of Near Field Communication technology (NFC) as smart phone embedded mobile payment has gained more attention in public. However, little is known about what factors influence users’ acceptance of such a payment method. This study aims to investigate the acceptance of the mobile payment service using NFC technology, A model based on the innovation diffusion theory and the perceived security as positive influential factors on consumer’s attitudes in their daily payment and perceived risks, such as performance risk , financial risk , and privacy risks, as the negative factors were proposed and tested.
273 samples were collected via the online questionnaire survey. The results showed that relative advantage, trialability and perceived security had significant positive effects on consumer’s attitude of using NFC payment service. This indicates that consumers would use NFC mobile payment services as long as it has the ability to provide the relative advantages in life and secured payments. In addition, customers will be willing to try out the service before they accept them. However, the performance risk attitudes showed a significant negative effect on using NFC mobile phone payments. Mobile communication carriers who are interested in promoting NFC related payment services might take these results as references in promoting their financial services.
第一章、緒論 10
第一節、研究背景與動機 10
一、行動支付推展現況 11
二、研究架構簡介 12
第二節、研究目的 13
第三節、研究流程 14
第四節、研究架構 15
第二章、文獻探討 16
第一節、行動支付以及近場通訊技術的發展與應用 16
第二節、台灣行動支付推展現況 18
第三節、創新擴散理論 20
第四節、知覺風險 23
第五節、知覺安全 26
第六節、使用態度 27
第七節、使用意圖 27
第三章、研究方法 28
第一節、研究架構與假設 28
第二節、研究變數定義與衡量問項 33
第三節、問卷設計 37
第四節、資料蒐集與分析方法 39
一、研究對象 39
二、資料分析方法與工具 39
第四章、研究結果 42
第一節、敘述性統計分析 42
第二節、樣本統計分析 44
第三節、非常態分配檢定 47
第四節、構面因素分析 48
第五節、信效度分析 50
第六節、結構模式分析 53
一、徑路分析 54
二、假設檢定 55
第五章、結論 56
第一節、研究結果意涵 56
一、創新擴散屬性 56
二、知覺風險屬性 57
三、知覺安全屬性 58
第二節、研究貢獻 58
第三節、研究限制與未來研究方向 59
第六章、參考文獻 61
附件一、本研究問卷 67

1.Agarwal, S. and R. K. Teas (2001). "Perceived value: mediating role of perceived risk." Journal of Marketing Theory and Practice: 1-14.
2.Franz-J Batza, Willem Janssenb and Kurt J Petersc, (2003). "Predicting technology adoption to improve research priority—setting." Agricultural Economics 28(2): 151-164.
3.Bauer, R. A. (1960). "Consumer behavior as risk taking." Dynamic Marketing for a Changing World, Proceedings of the 43rd Conference of the American Marketing Association, American Marketing Association, Chicago, 389-398
4.Bhatnagar, A., Sanjog Misra and H Raghav Rao (2000). "On risk, convenience, and Internet shopping behavior." Communications of the ACM 43(11): 98-105.
5.Boer, R. and T. de Boer (2009). Mobile payments 2010: Market Analysis and overview, Technical report
6.Bourreau & Verdier (2010), “Cooperation for innovation in payment systems: The case of mobile payments,” Communications & Strategies 79(3): 95-113.
7.Busselle, R., Reagan, J., Pinkleton, B. and Jackson, K. (1999). "Factors affecting Internet use in a saturated-access population." Telematics and Informatics 16(1): 45-58.
8.Cases, A. S. (2002). "Perceived risk and risk-reduction strategies in Internet shopping." The International Review of Retail, Distribution and Consumer Research 12(4): 375-394.
9.Cooper, R. (1998). "Benchmarking new product performance: results of the best practices study." European Management Journal 16(1): 1-17.
10.Cox, D. F. (1967). Risk taking and information handling in consumer behavior, Division of Research, Graduate School of Business Administration, Harvard University Boston.
11.Cunningham, S. M. (1967). "The major dimensions of perceived risk." Risk taking and information handling in consumer behavior. Boston: Harvard University Press: 82-108.
12.Davis, F. D., Bagozzi, R. P.and Warshaw, P. R. (1989). "User acceptance of computer technology: a comparison of two theoretical models." Management science 35(8): 982-1003.
13.Dhebar, A. (1996). "Speeding high-tech producer, meet the balking customer." Sloan Management Review 37(2): 37-49.
14.Duffy, J. (2000). "Knowledge management: what every information professional should know." Information Management Journal 34(3): 10-17.
15.Featherman, M. S. and P. A. Pavlou (2003). "Predicting e-services adoption: a perceived risk facets perspective." International Journal of Human-Computer Studies 59(4): 451-474.
16.Fishbein, M. and I. Ajzen (1975). "Belief, attitude, intention and behavior: An introduction to theory and research." MA: Addison-Wesley.
17.Fishbein, M. and I. Ajzen (1980). "Understanding attitudes and predicting social behavior." Englewood Cliffs, NJ: Prentice-Hall
18.Fischer, R. J. and Green, G.(2004). “Introduction to Security”,7th edition. Butterworth-Heinemann.
19.Grewal, D., Gotlieb, J and Marmorstein, H. (1994). "The moderating effects of message framing and source credibility on the price-perceived risk relationship." Journal of Consumer Research 21(1): 145-153.
20.Hofacker, C. F. (1998). Internet Marketing 3rd edition
21.Hsu, C. L., Wang, C. F. and Lin, C.C. (2011). “Investigating customer adoption behaviors in Mobile Financial Services” International Journal of Mobile Communications 9(5): 477-494.
22.Jackson, B. A. (2001). "Technology acquisition by terrorist groups: threat assessment informed by lessons from private sector technology adoption." Studies in Conflict and Terrorism 24(3): 183-213.
23.Jacoby, J. and L. B. Kaplan (1972). "The components of perceived risk." Advances in consumer research 3(3): 382-383.
24.Jensen, R. (2003). "Innovative leadership: First-mover advantages in new product adoption." Economic Theory 21(1): 97-116.
25.Karahanna, E., Agarwal, R. and Angst, C. M. (2006). "Reconceptualizing Compatibility Beliefs in Technology Acceptance Research." MIS Quarterly 30(4): 781-804.
26.Kim, D. J., Ferrin, D. L. and Rao, H. R. (2007). "A trust-based consumer decision-making model in electronic commerce: The role of trust, perceived risk, and their antecedents." Decision support systems 44(2): 544-564.
27.Kotler, P. (1979). "Strategies for introducing marketing into nonprofit organizations." Journal of Marketing: 37-44.
28.Lederer, A. L., Maupin, D. J., Sena, M. P. and Zhuang, Y. (2000). "The technology acceptance model and the World Wide Web." Decision support systems 29(3): 269-282.
29.Lowry, G. (2002). "Modelling user acceptance of building management systems." Automation in Construction 11(6): 695-705.
30.Mallat, N. (2007). "Exploring consumer adoption of mobile payments–a qualitative study." The Journal of Strategic Information Systems 16(4): 413-432.
31.McCrie, R. (2007). “Security Operations Management” 2nd. Butterworth-Heinemann.
32.McDade, S. R., Oliva, T. A. and Pirsch, J. A. (2002). "The organizational adoption of high-technology products “for use”: Effects of size, preferences, and radicalness of impact." Industrial Marketing Management 31(5): 441-456.
33.Mitchell, V.-W. and M. Greatorex (1993). "Risk perception and reduction in the purchase of consumer services." Service Industries Journal 13(4): 179-200.
34.Murray, K. B. and J. L. Schlacter (1990). "The impact of services versus goods on consumers’ assessment of perceived risk and variability." Journal of the Academy of Marketing Science 18(1): 51-65.
35.Premkumar, G. and M. Roberts (1999). "Adoption of new information technologies in rural small businesses." Omega 27(4): 467-484.
36.Rogers, E. M. (1995). Diffusion of innovations (4th ED.). NEW YORK : THE Free press.
37.Shin, D. H. (2010). “Ubiquitous Computing Acceptance Model: end user concern about security, privacy and risk” International Journal of Mobile Communications 8(2): 169-186.
38.Stone, R. N. and K. Grønhaug (1993). "Perceived risk: further considerations for the marketing discipline." European Journal of marketing 27(3): 39-50.
39.Swaminathan, V., White, E. L. and Rao, B. P. (1999). "Browsers or buyers in cyberspace? An investigation of factors influencing electronic exchange." Journal of Computer‐Mediated Communication 5(2)
40.Tang, S.M. (2000). "An impact factor model of Intranet adoption: an exploratory and empirical research." Journal of Systems and Software 51(3): 157-173.
41.Teng, J. T., Grover, V. and Guttler, W (2002). "Information technology innovations: general diffusion patterns and its relationships to innovation characteristics." Engineering Management, IEEE Transactions on 49(1): 13-27.
42.Tushman, M. L. and W. L. Moore (1982). Readings in the Management of Innovation, Pitman Boston, MA
43.Van den Poel, D. and J. Leunis (1999). "Consumer Acceptance of the Internet as a Channel of Distribution." Journal of Business Research 45(3): 249-256.
44.Van Slyke, C., Lou, H. and Day, J. (2002). "The impact of perceived innovation characteristics on intention to use groupware." Information Resources Management Journal 15(1): 1-12.
45.Vijayasarath, L. R. (2004). “Predicting consumer intentions to use on-line shopping: the case for an augmented technology acceptance model.” Information & Management 41(6): 747-762.
46.Vishwanath, A. and G. M. Goldhaber (2003). "An examination of the factors contributing to adoption decisions among late-diffused technology products." New Media & Society 5(4): 547-572.
47.Yang, S., Lu, Y., Gupta, S., Cao, Y. and Zhang, R. (2012). "Mobile payment services adoption across time: An empirical study of the effects of behavioral beliefs, social influences, and personal traits." Computers in Human Behavior 28(1): 129-142.
49.邱金蘭(2013)「手機信用卡 國泰世華拔頭籌」,聯合新聞網,http://udn.com/NEWS/FINANCE/FIN4/7887452.shtml
50.司徒達賢、李仁芳及吳思華(1985). 企業概論, 教育部空中大學教學委員會
52.周逸衡(1988). 「企業之結構性管理作為與創新之關係」,管理科學,華泰書局,台北
53.梁定澎(2012). 資訊管理理論, 前程, 台北
54.陳勳慧 (2004). 「國軍人員信用卡功能偏好,知覺風險與信用卡使用行為關係之研究」,國防管理學院國防財務資源研究所碩士論文
55.楊雅婷 (2009). 「以理性行為理論和科技接受模型來探討消費者對創新科技智慧型手機的購買意願行為之研究.」,南華大學企管所碩士論文
57.廖珮君(2011). 「NFC行動支付上路 安全比方便更重要」,資安人科技網

第一頁 上一頁 下一頁 最後一頁 top