帳號:guest(3.145.79.114)          離開系統
字體大小: 字級放大   字級縮小   預設字形  

詳目顯示

以作者查詢圖書館館藏以作者查詢臺灣博碩士論文系統以作者查詢全國書目勘誤回報
作者:郭柏志
作者(英文):Kuo Po Chih
論文名稱:消費者保險費使用行動支付APP之行為意圖研究-以人壽保險為例
論文名稱(英文):The study of consumers' behavioral intention of using mobile APP to pay insurance premiums-using life insurance as an example
指導教授:祝道松
指導教授(英文):Dauw-Song Zhu
口試委員:陳光華
巫喜瑞
口試委員(英文):Quang-Hua Chen
Hsi-Jui Wu
學位類別:碩士
校院名稱:國立東華大學
系所名稱:企業管理學系
學號:610132507
出版年(民國):107
畢業學年度:106
語文別:中文
論文頁數:135
關鍵詞:科技接受模式行動支付資訊系統知覺便利性知覺安全性信任
關鍵詞(英文):Technology Acceptance ModelMobile PaymentInformation SystemPerception of ConveniencePerceived SecurityTrust
相關次數:
  • 推薦推薦:0
  • 點閱點閱:48
  • 評分評分:系統版面圖檔系統版面圖檔系統版面圖檔系統版面圖檔系統版面圖檔
  • 下載下載:6
  • 收藏收藏:0
行動支付在台灣掀起一陣旋風,消費者購買物不需使用現金、支票或實體信用卡付費,只要使用手機等行動裝置即可支付各項費用,但新科技對消費者帶來不確定性因素之影響無法真實得知。因此,本研究採用TAM模型(Technology Acceptance Model)作為研究之概念性框架,進而探討保險公司之保戶對行動支付APP繳納保費的環境中,資訊系統、知覺便利性、知覺安全性、信任之間所產生影響,以了解保險公司之保戶的行為意圖。本研究研究對象為臺灣地區有保險保單且須要繳費之要保人及使用智慧型手機支付,共計452位有效樣本。本研究使用結構方程模式進行模式檢驗,經研究實證結果發現(1)資訊品質對信任及知覺易用性有顯著影響;(2)系統品質對信任及知覺易用性有顯著影響;(3)知覺便利性對知覺有用性顯著影響;(3)知覺安全性分別對知覺易用性、知覺有用性、信任有顯著影響;(4)信任分別對知覺有用性、使用態度及行為意圖有顯著影響;(5)知覺易用性分別對知覺有用性、使用態度、行為意圖有顯著影響;(6)使用態度對行為意圖有顯著影響。
In Taiwan, it has been seen as bringing a whirlwind of mobile payment. On purchase, consumers no longer need to pay by cash, checks or credit cards; now they can buy all kinds of merchandise with mobile payment APP. However, the new technology has brought consumers not only convenience but also uncertain effects. Therefore, this study used TAM (Technology Acceptance Model) as a conceptual framework to explore the effects of information system, perception of convenience, perceived security, and trust in the environment of the insured using mobile payment to pay the fee, in order to understand the behavioural intention of the insured. The objects of this study are the ensured in Taiwan, and a total of 452 valid samples has been collected. This study used structural equation modeling to test the proposed model. The empirical findings are described below: First, information quality has significant and positive effects on trust and perceived ease of use, respectively. Second, system quality has significant and positive effects on trust and perceived ease of use, respectively. Third, perception of convenience has significant and positive effects on perceived usefulness. Fourth, perceived security has significant and positive effects on perceived ease of use, perceived usefulness and trust, respectively. Fifth, trust has significant and positive effects on perceived usefulness, attitude toward using and intention to use, respectively. Sixth, perceived ease of use has significant and positive effects on perceived usefulness, attitude toward using and intention to use, respectively. Seventh, attitude toward using has significant and positive effects on intention to use.
第一章 緒論 1
第一節 研究背景 1
第二節 研究動機 8
第三節 研究問題與研究目的 11
第四節 研究貢獻與重要性 12
第五節 研究範圍與對象及研究流程 14
第二章 文獻探討 17
第一節 行動支付 (Mobile Payment) 17
第二節 資訊系統(Information System) 19
第三節 知覺便利性 (Perception of Convenience) 21
第四節 知覺安全性 (Perceived Security) 22
第五節 信任(Trust) 23
第六節 科技接受模型(Technology Acceptance Model, TAM) 24
第七節 變數之間的關係探討與假設建立 28
第三章 研究方法 35
第一節 研究架構及研究假設 35
第二節 研究變數操作性定義與衡量 38
第三節 問卷設計 47
第四節 資料蒐集方法 49
第五節 資料分析方法 50
第六節 共同方法變異問題之處理與檢測 53
第七節 問卷前測結果分析 54
第四章 資料分析 57
第一節 正式問卷發放 57
第二節 敘述性統計分析 59
第三節 共同方法變異檢測 68
第四節 信度與效度分析 74
第五節 結構模式分析 84
第五章 結論與建議 91
第一節 研究結論 91
第二節 管理意涵與貢獻 95
第三節 研究限制與後續研究建議 102
參考文獻 105
附錄一、前測問卷 117
附錄五、前測各構面量表收斂效度分析 126
附錄五、前測各構面量表收斂效度分析(續) 127
附錄五、前測各構面量表收斂效度分析(續) 128
附錄六、前測區別效度分析暨變數相關係數表 129
附錄七、前測各構面信度分析 130
附錄七、前測各構面信度分析(續) 131
附錄七、前測各構面信度分析(續) 132
附錄八、正式問卷 133
1.亞洲電子支付使用(2017/02/23),https://money.udn.com/money/story/5613/2301643
2.「pay.taipei」智慧支付平台(2017/02/20),https://technews.tw/2017/02/20/pay-taipei/
3.2015~2019年全球行動支付市場規模(2017/02/09),https://mic.iii.org.tw/IndustryObservations_PressRelease02.aspx?sqno=457
4.用心強化安全設計!行動支付的信任從來不是說說而已(2017/06/01),https://www.bnext.com.tw/article/44161/visa-secure-mobile-payment
5.行動支付安全嗎?見仁見智(2015/10/12),http://googlerconcert1.pixnet.net/blog/post/437775775-%E8%A1%8C%E5%8B%95%E6%94%AF%E4%BB%98%E5%AE%89%E5%85%A8%E5%97%8E%3F%E8%A6%8B%E4%BB%81%E8%A6%8B%E6%99%BA%21
6.【行動支付消費者調查】用戶消費仍「低頻小額」 業者不妨採合作策略,(2017/03/15)https://mic.iii.org.tw/IndustryObservations_PressRelease02.aspx?sqno=462
7.資策會FIND銀髮族的購物行為調查(2017/03/31),
http://www.iii.org.tw/Press/NewsDtl.aspx?nsp_sqno=1917&fm_sqno=14
8.行動支付 保險創新的下一步!現代保險健康理財雜誌(2017/06/05),http://magazine.chinatimes.com/riskmanagement/20170605002303-300208
9.保險雲世代(2016/04/11),http://www.tw-insurance.info/article.cfm?ct=7790
10.行動支付大浪 市調有5大預言(2017/02/10),https://tw.appledaily.com/new/realtime/20170210/1052730/
11.邱皓政(2003),量化研究與統計分析,五南圖書出版股份有限公司,臺北市。
12.Ajzen, I. and Fishbein, M. (1975), Belief, Attitude, Intention, and Behavior: An Introduction to Theory and Research, pp. 53-89, Addison-Wesley, Reading, MA.
13.Al-Somali, S. A., Gholami, R. and Clegg, B. (2008), “An investigation into the acceptance of online banking in Saudi Arabia,” Technovation, Vol. 29, No. 2, pp. 130-141.
14.Amer, A. A. and Abdel Hafez, H. A. (2017), “Empirical investigation of M-Government adoption in Egypt,” Egyptian Computer Science, Vol. 41, No. 2, pp. 36-48.
15.Anderson, E. and Weitz, B. (1990), “Determinants of continuity in conventional industrial channel dyads,” Marketing Science, Vol. 8, No. 4, pp. 310-23.
16.Anderson, J. C. and Gerbing, D. W. (1988), “Structural equation modeling in practice: A review and recommended two-step approach,” Psychological Bulletin, Vol. 103, No. 3, pp. 411-423.
17.Antovski, L and Gusev, M. (2003), “M-Payments,” Proceedings of the 25th International Conference on Information Technology Interfaces, pp. 95-100, Cavtat, Croatia.
18.Avolio, B., Yammarino, F. J. and Bass, B. M. (1991), “Identifying common methods variance with data collected from a single source: An unresolved sticky issue,” Journal of Management, Vol. 17, No. 3, pp. 571-587.
19.Bagozzi, R. P. and Yi, Y. (1988), “On the evaluation of structural equation models,” Journal of the Academy of Marketing Science, Vol. 16, No. 1, pp. 74-94.
20.Baker, D. A. and Cromton, J. L. (2000), “Quality satisfaction and behavioral intentions.” Annals of Tourism Research, Vol. 27, No. 3, pp. 785-804.
21.Balasubramanian, S. (1997), Two essays in Direct Marketing, Ph. D. Dissertation, Yale University, New Haven, CT.
22.Bandura, A., Adams, N. E., Hardy, A. B. adn Howells, G. N. (1980), “Tests of the generality of self-efficacy theory,”Cognitive Therapy and Research, Vol. 4, No. 1, pp. 39-66.
23.Bhimani, A. (1996),“Securing the commercial internet,”Communications of the ACM, Vol. 39, No. 6, pp. 29-35.
24.Suh, B and Han, I. (2002), “Effect of trust on customer acceptance of Internet banking,”Electronic Commerce Research and Applications, Vol. 1 No.3-4. pp. 247-263.
25.Benassi, P. (1999). “Truste: An online privacy seal program,”Communication of the ACM, Vol. 42, No. 2, pp. 56-59.
26.Bentler, P. M. and Wu, E. J. C. (1993), EQS/Windows User Guide, BMDP Statistical Software, Los Angeles, CA.
27.Berry, L. L., Seiders, K. and Grewal, D. (2002), “Understanding service convenience,” Journal of Marketing, Vol. 66, No. 3, pp. 1-17.
28.Boon, S. D. and Holmes, J. G. (1991),“The dynamics of interpersonal trust: Resolving uncertainty in the face of risk”, In R. A. Hinde & J. Groebel (Eds.), Cooperation and prosocial behavior. UK:Cambridge, Cambridge University Press, pp. 190-211.
29.Bradley, R. V., Pridmore, J. L. and Byrd, T. A. (2006), “Information systems success in the context of different corporate cultural types: An empirical investigation,” Journal of Management Information Systems, Vol. 23, No. 2, pp. 267-294.
30.Brown, L. G. (1990), “Convenience in services marketing,” The Journal of Services Marketing, Vol. 4, No. 1, pp. 53-59.
31.Brown, S. A., Fuller, R. M. and Vician, C. (2004), “Who’s afraid of the virtual world? Anxiety and computermediated communication,” Journal of the Association for Information Systems, Vol. 5, No. 2, pp. 79-107.
32.Carter, L. and Campbell, R. (2012), “Internet Voting Usefulness: An Empirical Analysis of Trust, Convenience and Accessibility,” Journal of Organizational & End User Computing, Vol. 24, No. 3, pp. 1-17.
33.Chae, M., Kim, J., Kim, H. and Ryu, H. (2001), “Information quality for mobile internet services: A theoretical model with empirical validation,” Electronic Markets, Vol. 12, No. 1, pp. 38-46.
34.Chang, C. C., Yan, C. F. and Tseng, J. S. (2012), “Perceived convenience in an extendedtechnology acceptance model: Mobile technology and english learning forcollege students,”Australasian Journal of Educational Technology, Vol. 28, No. 5, pp. 809-826.
35.Chang, Y. F., Chen, C. S. and Zhou, H. (2009), “Smart phone for mobile commerce,”Computer Standards and Interfaces, Vol. 31, No. 4, pp. 740-747.
36.Chen, L., Gillenson, M. L. and Sherrell, D. L. (2002), “Enticing online consumers: An extended technology acceptance perspective,” Information and Management, Vol. 39, No. 8, pp. 705-709.
37.Chen, Y. H. and Barnes, S. (2007), “Initial trust and online buyer behavior,” Industrial Management and Data Systems, Vol. 107, No. 1, pp. 21-36.
38.Cheng, T. C. E., Lam, D, Y. C. and Yeung, A. C. L. (2006), “Adoption of internet banking: an empirical study in Hong Kong,” Decis Support Syst, Vol. 42, No. 3, pp. 1558-1572.
39.Cho, V., Cheng, T. C. E. and Lai, W. M. J. (2009), “The role of perceived user-interface design in continued usage intention of self-paced e-learning tools,” Computers & Education, Vol. 53, No. 2, pp. 216-227.
40.Chuttur, M. Y. (2009), “Overview of the technology acceptance model: Origins, developments and future directions,” Sprouts: Working papers on information systems, Vol. 9, No. 37, pp. 9-37.
41.Dahlberg, T., Mallat, N., Ondrus, J. and Zmijewska, A. (2008), “Past, present and future of mobile payments research: A literature review,” Electronic Commerce Research and Applications, Vol. 7, No. 2, pp. 165-181.
42.Damghanian, H., Zarei, A. and Siahsarani Kojuri, M. A. (2016), “Impact of perceived security on trust, perceived risk, and acceptance of online banking in Iran,” Journal of Internet Commerce, Vol. 15, No. 3, pp. 214-238.
43.Davis, F. D. (1986), “A technology acceptance model for empirically testing new end-user information systems: Theory and results,” Ph. D. Dissertation, Sloan School of Management, Massachusetts Institute of Technology, Cambridge, MA.
44.Davis, F. D. (1989), “Perceived usefulness, perceived ease of use, and user acceptance of information technology,” Management Information Systems Quarterly, Vol. 13, No. 3, pp. 319-340.
45.Davis, F. D., Bagozzi, R. P. and Warshaw, P. R. (1989), “User acceptance of computer echnology: A comparison of two theoretical models,” Management Science, Vol. 35, No. 8, pp. 982-1003.
46.Davis, F. D., Bagozzi, R. P. and Warshaw, P. R. (1992), “Extrinsic and intrinsic motivation to use computers in the workplace”, Journal of Applied Social Psychology, Vol. 22, No. 14, pp. 1111-1132.
47.DeLone, W. H. and McLean, E. R. (2003), “The DeLone and McLean model of information systems success: A ten-year update,” Journal of Management Information Systems, Vol. 19, No. 4, pp. 9-30.
48.DeLone, W. H. and E. R. McLean. (1992), “Information systems success: The quest for the dependent variable,” Information Systems Research, Vol. 3, No. 1. pp. 60-95.
49.Dimitriadis, S. (2010), “Testing perceived relational benefits as satisfaction and behavioral outcomes drivers,” International Journal of Bank Marketing, Vol. 28, No. 4, pp. 297-313.
50.Eppler, M. and Muenzenmayer, P. (2002), “Measuring information quality in the web context: A survey of state-of-the-art instruments and an application methodology,” Proceedings of 7th International Conference on Information Quality, pp.187-196.
51.Ervasti, M. and Helaakoski, H. (2010), “Case study of application-based mobile service acceptance and development in Finland,” International Journal of Information Technology and Management, Vol. 9, No. 3, pp. 243-259.
52.Finn, A. (2011), “Investigating the non-linear effects of e-service quality dimensions on customer satisfaction,” Journal of Retailing and Consumer Services, Vol. 18, No. 1, pp. 27-37.
53.Fornell, C. and Larcker, D. F. (1981), “Evaluating structural equation models with unobservable variables and measurement error,” Journal of Marketing Research, Vol. 18, No. 1, pp. 39-50.
54.Gao, L. and Waechter, K (2017), “Examining the role of initial trust in user adoption of mobile payment services: An empirical investigation,” Information Systems Frontiers, Vol. 19, No. 3, pp. 525-548.
55.Gaski, J. F. and Nevin, J. R. (1985), “The differential effects of exercised and unexercised power sources in a marketing channel,” Journal of Marketing Research, Vol. 22, No. 2, pp. 130-142.
56.Gefen, D. (2003), “TAM or just plain habit: A look at experienced online shoppers,” Journal of End User Computing, Vol. 15 No. 3, pp. 1-13.
57.Gefen, D., Karahanna, E. and Straub, D. W. (2003), “Trust and TAM in online shopping: An integrated model,” Management Information Systems Quarterly, Vol. 27, No. 1, pp. 51-90.
58.Ghosh, A. K. and Swaminatha, T. M. (2001), “Software Security and Privacy Risks in Mobile E-Commerce,”Communications of the ACM, Vol. 44, No. 2, pp. 51-57.
59.Grazioli, S. and Jarvenpaa, S. L. (2000), “Perils of internet fraud: An empirical investigation of deception and trust with experienced internet consumers,” IEEE Transactions on Systems, Man, and Cybernetics Part A: Systems and Humans, Vol. 30, No. 4, pp. 395-410.
60.Gupta, S. and Kim, H. W. (2007), “The moderating effect of transaction experience on the decision calculus in on-line repurchase.” International Journal of Electronic Commerce, Vol. 12, No. 1, pp. 127-158.
61.Hair, J. F. Jr., Black, W. C., Babin, B. J. and Anderson, R. E. (2010), Multivariate Data Analysis (7^th Ed.), Prentice-Hall, Inc., Upper Saddle River, NJ.
62.Halonen, T. and Virtanen, T. (2002), “A system for secure mobile payment transactions,” The International Federation for Information Processing book, Vol. 95. No. 1. pp. 157-170.
63.Hernández, B., Jiménez, J. and Martín, M. J. (2010), “Customer behavior in electronic commerce: The moderating effect of e-purchasing experience,” Journal of Business Research, Vol. 63, No. 9/10, pp. 964-971.
64.Hewson, C., Yule, P., Laurent, D. and Vogel, C. (2003), Internet Research Methods: A Practical Guide for the Social and Behavioural Sciences, Sage, London, UK.
65.Hossain, M. M. and Prybutok, V. R. (2008), “Consumer acceptance of RFID technology: An exploratory study,” IEEE Transactions on Engineering Management, Vol. 55, No. 2, pp. 316-328.
66.Hsu, C.L. and Lu, H.P. (2004), “Why do people play online games? An extended TAM with social influences and flow experience,” Information and Management, Vol. 41, No. 7, pp. 853-868.
67.Hulland, J. (1999), “Use of partial least squares in strategic management research: A review of four recent studies,” Strategic Management Journal, Vol. 20, No. 2, pp. 195-204.
68.Jöreskog, K. G. and Sörbom, D. S. (1993), LISREL 8, A Guide to the Program and Application, SPSS Inc., Chicago, IL.
69.Karjaluoto, H. and Leppäniemi, M. (2013), “Social Identity for Teenagers: Understanding behavioral intention to participate in virtual world environment,” Journal of Theoretical & Applied Electronic Commerce Research, Vol. 8, No. 1, pp. 1-16.
70.Keen, P. G. W. (1997), “Are You Ready for Trust Economy?” Computerworld, Vol. 31, No. 16, pp. 80-81.
71.Kim, C., Oh, E., Shin, N. and Chae, M. (2009), “An empirical investigation of factors affecting ubiquitous computing use and U-business value,” International Journal of Information Management, Vol. 29, No. 6, pp.436-448.
72.Kim, H. and Niehm, L. S. (2009), “The impact of website quality on information quality, value, and loyalty intentions in apparel retailing”, Journal of Interactive Marketing, Vol. 23, No. 3, pp. 221-233.
73.Kini, A. and Choobineh, J. (1998), “Trust in Elec-tronic Commerce, Definition and Theo-retical Considerations,” IEEE Proceedings of the 31st Hawaii International Conference on System Science, Vol. 4, pp. 51-61, 1998.
74.Kotler, P. (2003), Marketing Management (〖11〗^th Ed.), Prentice-Hall Inc., New York, NY.
75.Kotler, P. and Gary, A. (1996). Pronciples o f Marketing (7^th Ed.), Englewood, prentice Hall. NJ.
76.Lee, M. K. O. and Turban, E. (2001), “A trust model for consumer internet shopping,” International Journal of Electronic Commerce, Vol. 61, No. 1, pp. 75-91.
77.Lee, M. K. O., Cheung, C. M. K. and Chen, Z. (2005), “Acceptance of internet-based learning medium: The role of extrinsic and intrinsic motivation,” Information & Management, Vol. 42, 8, pp. 1095-1104.
78.Lee, Y. C. (2006), “An empirical investigation into factors influencing the adoption of an e-learning system,” Online Information Review, Vol. 30, No. 5, pp. 517-541.
79.Legris, P., Ingham, J. and Collerette, P. (2003), “Why do people use information technology? A critical review of the technology acceptance model,”Information and Management,”Vol. 40, No. 3, pp. 191-204.
80.Lin, H. F. (2007), “The role of online and offline features in sustaining virtual communities: An empirical study,” Internet Research, Vol. 17, No. 2, pp. 119-138.
81.Lin, H. F. (2008), “Determinants of successful virtual communities: Contributions from system characteristics and social factors,” Information & Management, Vol. 45, No. 8, pp. 522-527.
82.Lin, K. Y. and Lu, H. P. (2015), “Predicting mobile social network acceptance based onmobile value and social influence,” Internet Research, Vol. 25, No. 1, pp. 107-130.
83.Lone, W. H. and E. R. McLean. (1992), “Information systems success: The quest for the dependent variable,” Information Systems Research, Vol.3, No. 1, pp. 60-95.
84.Lorenzo-Romero, C. and Del Chiappa, G. (2013), “Adoption of social networking sites by Italian,” Information Systems and e-Business Management, Vol. 12, No. 2, pp. 165-187.
85.Lu, Y., Deng, Z. and Wang, B. (2010), “Exploring factors affecting Chinese consumers’ usage of short message service for personal communication,” Information Systems Journal, Vol. 20, No. 2, pp.183-208.
86.Lu. Y., Lu Y., Wang, B., Pan, Z. and Qin, H. (2015), “Acceptance of government-sponsored agricultural information systems in China: The role of government social power,” Information Systems and e-Business Management, Vol. 13, No. 2, pp. 329-354.
87.Mayer, R. C., Davis, J. h. and Schoorman, F. D. (1995), “An integrative model of organiza-tional trust,” Academy of Management Review, Vol. 20, No. 3, pp. 709-733.
88.McCallum, J., Simons, L., Simons, J. and Friedlander, Y. (1994), “Low serum cholesterol is not associated with depression in the elderly: Data from an Australian community study,” Australian and New Zealand Journal of Medicine, Vol. 24, No. 5, pp. 561-564.
89.McKinney, V., Yoon, K. and Zahedi, F. M. (2002), “The measurement of web-customer Satisfaction: An expectation and disconfirmation approach,” Information Systems Research, Vol. 13. No. 3, pp. 296-315.
90.McKnight, D. H. and Chervany, N. L. (2002), “What trust means in E-commerce customer relationships: An interdisciplinary conceptual typology,” International Journal of Electronic Commerce, Vol. 6, No. 2, pp. 35-59.
91.McKnight, D. H., Cummings, L. L. and Chervany, N. L. (1998), “Initial trust formation in new organizational relationships,” Academy of Management Review, Vol. 23, No. 3, pp. 473-490.
92.McKnight, D. H., Lankton, N., Nicolaou, A. and Price, J. (2017) “Distinguishing the effects of B2B information quality, system quality, and service outcome quality on trust and distrust,” The Journal of Strategic Information Systems, Vol. 26, No. 2, pp. 118-141.
93.Meharia, P. (2012),“Assurance on the reliability of mobile payment system and its effects on its’ use: An empirical examination,”Accounting and Management Information Systems, Vol. 11, No. 1, pp. 97-111.
94.Moorman, C., Deshpande, R. and Zaltman, G. (1993), “Factors affecting trust in market research relationships,” Journal of Marketing, Vol. 57, No. 1, pp. 81-101.
95.Mossholder, K. W., Bennett, N., Kemery, E. R. and Wesolowski, M. A. (1998), “Relationships between bases of power and work reactions: The mediational role of procedural justice,” Journal of Management, Vol. 24, No. 4, pp. 533-552.
96.Nelson, R. R., Todd, R. A. and Wixom, B. H. (2005), “Antecedents of information and system quality: An empirical examination within the context of data warehousing,” Journal of Management Information Systems,Vol. 21, No. 4, pp. 199-235.
97.Ngai, E. W. T., Poon, J. K. L. and Chan, Y. H. C. (2007), “Empirical examination of the adoption of WebCT using TAM, ” Computers and Education, Vol. 48, No. 2, pp. 250-267.
98.Nikou, S. A. and Economides, A. A. (2017), “Mobile-based assessment: Investigating the factors that influence behavioral intention to use,” Computers & Education, Vol. 109, p56-73.
99.Mills, A. J. and Plangger, K. (2015),“Social media strategy for online service brands,” The Service Industries Journal, Vol. 35, No. 10, pp. 521-536.
100.Nunnally, J. C. (1978), Psychometric Theory (2^th Ed.), McGraw-Hill, New York, NY.
101.Ong, C. S., Lai, J. Y. and Wang, Y. S. (2004), “Factors affecting engineers’ acceptance of asynchronous e-learning systems in high-tech companies”, Information and Management, Vol. 41, pp. 795-804.
102.Ozkan, S., Bindusara, G. and Hackney, R. (2010), “Facilitating the adoption of e-payment systems: Theoretical constructs and empirical analysis,” Journal of Enterprise Information Management, Vol. 23, No. 3. pp. 305-325.
103.Ozturk, A. B., Bilgihan, A., Nusair, K. and Okumus, F. (2016), “What keeps the mobile hotel booking users loyal? Investigating the roles of self-efficacy, compatibility, perceived ease of use, and perceived convenience,” International Journal of Information Management, Vol. 36, No. 6, pp. 1350-1359.
104.Pal., D., Vanijjab, V. and Papasratornc, B. (2015), “An Empirical analysis towards the adoption of NFC mobile payment system by the end user,” Procedia Computer Science, Vol. 69, No. 1, pp. 13-25
105.Pavlou, P. A. (2003), “Consumer acceptance of electronic commerce: Integrating trust and risk with the Technology Acceptance Model,” International Journal of Electronic Commerce, Vol. 7, No. 3, pp. 101-134.
106.Pavlou, P. A. and Fygenson, M. (2006), “Understanding and predicting electronic commerce adoption: An extension of the theory of planned behavior,” Management Information Systems Quarterly, Vol. 30, No. 1, pp. 115-143.
107.Pintrich, P. R. (2000), “Multiple goals, multiple pathways: The role of goal orientation in learning and achievement,” Journal of Educational Psychology, Vol. 92, No. 3, pp. 544-555.
108.Pituch, K. A. and Lee, Y. K. (2006), “The influence of system characteristics on e-learning use,” Computers & Education, Vol. 47, No. 2, pp. 222-244.
109.Podsakoff, P. M. and Organ, D. W. (1986), “Self reports in organizational research: Problems and prospects,” Journal of Management, Vol. 12, No. 4, pp. 531-544.
110.Podsakoff, P. M., MacKenzie, S. B., Lee, J. Y. and Podsakoff, N. P. (2003), “Common method viases in behavioral research: A critical review of the literature and recommened remedies,” Journal of Applied Psychology, Vol. 88, No. 5, pp. 879-903.
111.Rai, A., Lang, S. and Welker, R. (2002), “Assessing the validity of IS success models: An empirical test and theoretical analysis,” Information Systems Research, Vol. 13, No. 1, pp. 50-69.
112.Ramos-de-Luna, I. and Montoro-Ríos, F. (2016), “Determinants of the intention to use NFC technology as a payment system: An acceptance model approach,” Information Systems & e-Business Management, Vol. 14, No. 2, pp. 293-314.
113.Reichheld, F. F. and Schefter, P. (2000), “Your secret weapon on the web,” Harvard Business Review, Vol. 78, No. 4, pp. 105-113.
114.Roca, J. C., Chiu, C. M. and Marti´nez, F. J. (2006), “Understanding e-learning continuance intention: An extension of the technology acceptance model,” International Journal of Human- Computer Studies, Vol. 64, No. 8, pp. 683-696.
115.Rossiter, J. R. (2003) “How to construct a test of scientific knowledge in consumer behavior.” Journal of Consumer Research, Vol. 30, No. 2, pp. 305-310.
116.Schiaffino, S. and Amandia, Q. (2004),“User-interface agent interaction:Personalization issues,”International Journal of Human-Computer Studies, Vol. 60, No. 1, pp. 129-148.
117.Schiffman, L. G. and Kanuk, L. L. (1991), Consumer Behavior (2^nd Ed.), pp. 4-10. Upper Saddle River, NJ: Prentice Hall.
118.Schlosser, A. E. (2003), “Experiencing products in the virtual world: The role of goal and imagery in influencing attitudes versus purchase intentions,” Journal of Consumer Research, Vol. 30, No. 2, pp. 184-198.
119.Seddon. P. B. (1997), “A respecification and extension of the DeLone and McLean Model of Is Success,” Information Systems Research, Vol. 8, No. 3, pp. 240-253.
120.Shrigley, R. L. (1990), “Attitude and behavior are correlates,” Journal of Research in Science Teaching, Vol. 27, No.2, pp. 97-113.
121.Suh, B. and Han, I. (2002), “Effect of trust on customer acceptance of Internet banking,” Electronic Commerce Research and Applications, Vol. 1, No.3-4, pp. 247-263.
122.Suh, B. and Han, I. (2003), “The Impact of customer trust and perception of security control on the acceptance of electronic commerce,” International Journal of Electronic Commerce, Vol. 7, No. 3, pp. 135-161..
123.Szymanski, D. M. and Hise, R. T. (2000), “e-Satisfaction: An initial examination” Journal of Retailing, Vol. 76, No. 3, pp. 309-322.
124.Tang, L. L and Nguyen T. H. H. (2013), “Common causes of trust, Satisfaction and TAM in online shopping: An integrated model,” Journal of Quality, Vol. 20, No. 5 pp. 483-500.
125.Tarhini, A., Arachchilage, N.A.G. and Abbasi, M.S. (2015), “A critical review of theories and models of technology adoption and acceptance in information system research,” International Journal of Technology Diffusion, Vol. 6, No. 4, pp. 58-77.
126.Taylor, S. and Todd, P.A. (1995), “Understanding information technology usage: A test of competing models,” Information Systems Research, Vol. 6, No. 2, pp. 144-176.
127.Triandis, H. C. (1979), “Values, Attitudes, and Interpersonal Behavior,” in Nebraska Symposium on Motivation, H. E. How, Jr. (ed.), pp. 195-259, University of Nebraska Press, Lincoln, NE.
128.Tsai, H. T., Huang, H. C., Jaw, T. I. and Chen, W. K. (2006), “Why on-line customers remain with a particular e-retailer: An integrative model and empirical evidence,” Psychology and Marketing, Vol. 23, No. 5, pp. 447-464.
129.Tung, F. C. and Chang, S. C. (2008), “Nursing students’ behavioral intention to use online courses: A questionnaire survey,” International Journal of Nursing Studies, Vol. 45, No. 9, pp. 1299-1309.
130.Van der heijden, H. (2002), “Factors Affecting the Successful Introduction of Mobile Payment Systems,” Proceedings of the 15th Bled Electronic Commerce Conference. pp. 430-443.
131.Venkatesh, V. and Davis, F.D. (2000), “A theoretical extension of the technology acceptance model: four longitudinal field studies”, Management Science, Vol. 46, No. 2, pp. 186-204.
132.Venkatesh, V., Morris, M. G., Davis, G. B. and Davis, F. D. (2003), “User acceptance of information technology: Toward a unified view,” Management Information Systems Quarterly, Vol. 27, No. 3, pp. 425-478.
133.Venkatesh, V. (2000), “Determinants of perceived ease of use: Integrating control, intrinsic motivation, and emotion into the technology acceptance model,” Information Systems Research, Vol. 11, No.4, pp. 342-365.
134.Viehland, D. and Leong, R S Y. (2007), “Acceptance and use of mobile payments,” Proceedings of the 18th Australasian Conference on Information Systems, Toowoomba.
135.Walters, C. G. (1978), Consumer Behavior: Theory and Practice, (3rd Ed.). Homewood, IL:Richard D. Irwin, Inc
136.Walton, G., Childs, S. and Blenkinsopp, E. (2005), “Using mobile technologies to give health students access to learning resources in the UK community setting,” Health Information and Libraries Journal, Vol. 22, No.2, pp. 51-65.
137.Wambaa, S. F., Bhattacharyab, M., Trincherac, L. and Ngai. E. W. T. (2017), “Role of intrinsic and extrinsic factors in user social media acceptancewithin workspace: Assessing unobserved heterogeneity” International Journal of Information Management, Vol. 37, No. 2, pp. 1-13.
138.Wilkerson, G. L., Bennett L. T. and Oliver K. M. (1997), “Evaluation criteria and indicators of quality for internet resources,” Educational Technology, Vol. 37, No. 3, pp. 52-58.
139.Wu, J. J., Chen, Y. H. and Chungc, Y. S. (2010), “Trust factors influencing virtual community members: A study of transaction communities,” Journal of Business Research, Vol. 63, Nol. 9/10, pp. 1025-1032.
140.Yang, S., Lu, Y., Gupta, S., Cao, Y. and Zhang, R. (2012), “Mobile payment services adoption across time: An empirical study of the effects of behavioral beliefs, social influences, and personal traits,” Computers in Human Behavior, Vol. 28, No. 1, pp. 129-142.
141.Yeh, Y. H. and Choi, S. M. (2011), “MINI-lovers, maxi-mouths: An investigation of antecedents to eWOM intention among brand community members,” Journal of Marketing Communications, Vol. 17, No. 3, pp. 145-162.
142.Yoon, C. and Kim, S. (2007), “Convenience and TAM in a ubiquitous computing environment: The case of wireless LAN,” Electronic Commerce Research and Applications, Vol. 6, No. 1, pp.102-112.
143.Yousafzai, S., Pallister, J. and Foxall, G. (2009), “Multi-dimensional Role of Trust in Internet Banking Adoption,” The Service Industries Journal, Vol. 29, No. 5, pp. 591-605.
 
 
 
 
第一頁 上一頁 下一頁 最後一頁 top
* *