Please use this identifier to cite or link to this item: http://hdl.handle.net/11455/22669
DC FieldValueLanguage
dc.contributor林金賢zh_TW
dc.contributor許光華zh_TW
dc.contributor.advisor張樹之zh_TW
dc.contributor.author蕭英信zh_TW
dc.contributor.authorHsiao, Ying-Shinen_US
dc.contributor.other中興大學zh_TW
dc.date2009zh_TW
dc.date.accessioned2014-06-06T07:18:27Z-
dc.date.available2014-06-06T07:18:27Z-
dc.identifierU0005-0608200821320800zh_TW
dc.identifier.citation[1] Alexander G., 2006. Mobile Malware Evolution: An Overview, Part 1 [online]. USA, Viruslist.com. Available from: http://www.viruslist.com/en/analysis?pubid=200119916 [Accessed 21 March 2008]. [2] Al-Gahtani, S.S., Hubona, G.S., and Wang, J., 2007. Information technology (IT) in Saudi Arabia: Culture and the acceptance and use of IT. Information and Management, 44(8), 681-691. [3] Atchariyachanvanich, K., Okada, H., and Sonehara, N. 2007. Proceedings from: Wireless Communications, Networking and Mobile Computing, 2007. WiCom 2007. International Conference on. Factors Affecting Customers'' Intention to Repurchase in Internet Shopping: Extrinsic Benefits and Intrinsic Benefits. 3454-3457. [4] Bose, A. and Shin, K.G. 2006. Proceedings from: IEEE Securecomm and Workshops. On Mobile Viruses Exploiting Messaging and Bluetooth Services.1-10. [5] Blau, P., 1964. Exchange and Power in Social Life. New York: Wiley. [6] Cai, Y.S, and Lai, Y.C. 2001. Proceedings from: The 2005 Conference on Technology and Management. The user study of teenagers'' purchasing behavior to the fashion products. 147-154. [7] Catalan, M. and Kotzab, H., 2003. Assessing the responsiveness in the Danish mobile phone supply chain. International Journal of Physical Distribution and Logistics Management, 33(8), 668-685. [8] Chang, Y.L., 2007. Exploration and Design Application of The Fashionable Elements of NOKIA Mobile Phone. Thesis(Master's degree). Tatung University. [9] Chen, I.T., 2002. A Study on the Customers' Preferences of 3G Applications. Thesis (Master's degree). Tatung University. [10] Chin, W.W., Marcolin, B.L., and Newsted, P.R. 1996. Proceedings from: International Conference ON Information Systems. A Partial Least Squares Latent Variable Modeling Approach For Measuring Interaction Effects: Results From A Monte Carlo Simulation Study And Voice Mail Emotion/Adoption Study. 16-18. [11] Davis, F. D., 1989. Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology. MIS Quarterly, 13(3), 319-339. [12] Doney, P. M., Cannon, J. P., and Mullen, M. R., 1998. Understanding the influence of national culture on the development of trust. Academy of Management Review, 23(3), 601-620. [13] Fornell, C. and Larcker, D.F., 1981. Evaluating structural equation models with unobservable variables and measurement error. Journal of Marketing Research, 18, 39-50. [14] Fishbein, M. and Ajzen, I., 1975. Belief, Attitude, Intention and Behavior: An Introduction to Theory and Research. Boston, MA: Addison-Wesley. [15] Gefen D., 2000. E-commerce: The Role of Familiarity and Trust. Omega, 28(6), 725-727. [16] Hoffman, D. L., Novak, T. P., and Peralta, M., 1999. Building consumer trust online. Communications of the ACM, 42(4), 80-85. [17] Hypponen, M., 2006. Malware goes mobile, Scientific American, November, p. 70. [18] Ishii, K., 2004. Internet use via mobile phone in Japan. Telecommunications Policy, 28(1), 43-58. [19] John, Y.J., Gorman, G.E., 2002. Internet use in South Korea. Online Information Review, 26(5), 335-44. [20] Kaiser, H.F., 1974. An index of factorial simplicity. Psychometrika, 39(1), 31-36. [21] Karabulut, Y., Kerschbaum, F., Massacci, F., Robinson, P., and Yautsiukhin, A., 2007. Security and Trust in IT Business Outsourcing: a Manifesto. Electronic Notes in Theoretical Computer Science, 179(6), 47-58. [22] Lin, X.H., Zhang, L.K., Lin, W.L., and Zhang, Y.H. 2007. Proceedings from: The 18th International Conference on Information Management. The predict model for behavior of using E-coupon based on UTAUT: direct and interact effects. 457-464. [23] Mayer, R. C., Davis, J.H., and Schoorman, F.D., 1995. An integrative model of organizational trust. Academy of Management Review, 20(3), 709-734. [24] McIntyre, S.H. and Miller, C.M., 1992. Social utility and fashion behavior. Marketing Letters, 3(4), 371-382. [25] Miller, C.M., McIntyre, S.H. and Mantrala, M.K., 1993. Toward Formalizing Fashion Theory. Journal of Marketing Research, 30(2), 142-157. [26] Mishra, A.K., 1996. Organizational responses to crisis: The centrality of trust. In: R. M. Kramer and T. R. Tyler, Eds. Trust in Organizations: Frontiers of Theory and Research. Thousand Oaks, CA: Sage, 261-287. [27] Moore, G.C. and Benbasat, I., 1991. Development of an Instrument to Measure the Perceptions of Adopting an Information Technology Innovation. Information Systems Research, 2(3), 192-222. [28] Morales, J.A., Clarke, P.J., Deng, Y. and Kibria, B.M.G., 2006. Testing and evaluating virus detectors for handheld devices. Journal in Computer Virology, 2(2), 135-47. [29] Morgan, R.M. and Hunt, S.D., 1994. The Commitment- Trust Theory of relationship Marketing. Journal of Marketing, 58, 20-38. [30] Nunnally, J.C., 1978. Psychometric Theory. 2nd Edition. New York: McGraw-Hill. [31] Ringle, C.M., Wende, S., and Will, A., 2005. SmartPLS 2.0 (beta)[online]. Hamburg University. Available From: http://www.smartpls.de[Accessed 21 March 2008]. [32] Ringle, C. M., Wende, S., Will, A. 2008. The finite mixture partial least squares approach: Methodology and application. In: Esposito Vinzi, V., Chin, W. W., Henseler, J., and Wang, H., eds. Handbook of partial least squares: Concepts, methods and applications in marketing and related fields, Springer-Verlag Berlin and Heidelberg GmbH & Co. K. [33] Rocher J.P., Cavalier J.C., Laquet J.L., and Ken W., 1996. Mobile Phone Fraud -- Are GSM Networks Secure. Computer Fraud and Security, 1996(11), 11-18. [34] Rotters,J. , 1967. A New Scale for The Measurement of Interpersonal Trust. Journal of Personality, 35(4), 651-665. [35] Rousseau, D. M., Sitkin, S. B., Burt, R. S., and Camerer, C., 1998. Not so different after all: A cross-discipline view of trust, Academy of Management Review, 23(3), 393-404. [36] Roy, M.C., Dewit, O., and Aubert, B.A., 2001. The impact of interface usability on trust in Web retailers. Internet Research, 11(5), 388-398. [37] Shang, R.A., Chen, Y.C., and Shen, L., 2004. Extrinsic versus intrinsic motivations for consumers to shop on-line. Information and Management, 42(3), 401-413. [38] Shih, D.H., Lin, B., Chiang, H.S., and Shih, M.H., 2007. Security aspects of mobile phone virus: a critical survey. Industrial Management and Data Systems, 108(4), 478-494. [39] Tao, Y.H., Wu, Y.L., and Yang, P.C. 2007. Proceedings from: Industrial Engineering and Engineering Management, 2007 IEEE International Conference on. Using UTAUT to explore the behavior of 3G mobile communication users. 199-203. [40] Tenenhaus, M., Vinzi, V.E., Chatelin, Y.M., and Lauro, C., 2005. PLS path modeling. Computational Statistics and Data Analysis, 48, 159-205. [41] Thompson, R. L., Higgins, C. A., and Howell, J. M., 1991. Personal Computing: Toward a Conceptual Model of Utilization. MIS Quarterly,15(1), 124-143. [42] T o¨yssy, S. and Helenius, M., 2006. About malicious software in smartphones. Journal in Computer Virology, 2(2), 109-19.× [43] Türkyilmaz, A. and Özkan, C., 2007. Development of a customer satisfaction index model: An application to the Turkish mobile phone sector. Industrial Management and Data Systems, 107(5), 672-687. [44] Venkatesh, V., Morris, M.G., Davis, G.B., and Davis, F.D., 2003. User Acceptance of Information Technology: Toward A Unified View. MIS Quarterly, 27, 425-478. [45] Yang, J., He, X., and Lee, H., 2007. Social reference group influence on mobile phone purchasing behaviour: a cross-nation comparative study. International Journal of Mobile Communications, 5(3), 319-38. [46] Yap, T.S. and Ewe, H.T., 2005. A mobile phone malicious software detection model with behavior checker. Lecture Notes in Computer Science, 3597, 57-65. [47] Zheng, H., Li, D., and Gao, Z. 2006. Proceedings from: 2006 1st International Symposium on Pervasive Computing and Applications. An epidemic model of mobile phone virus. 1-5.zh_TW
dc.identifier.urihttp://hdl.handle.net/11455/22669-
dc.description.abstract本研究主要是以科技接受與使用整合理論為基礎來探討影響手機使用者使用手機防毒軟體之使用意願的因素。經由對先前關於科技接受與使用整合理論、信任感知構面以及流行影響構面的文獻進行閱讀與研究之後,建立出本研究的理論基礎架構,進而對此理論架構進行檢視。 在建立理論架構之後,本研究以網路問卷發放的方式配合實證研究來檢視本研究架構。所採用的313份有效問卷,皆經由網路問卷服務系統收集而來。經由問卷的設計、發放、回收與統計的過程,驗證本研究各個構面對使用意願影響之結果。本研究發現,在沒有控制變數影響的情況下科技接受與使用整合理論中的對績效的期望、對付出的期望、有利情況三項以及信任感知和流行影響確實與手機防毒軟體使用意願呈現顯著的相關,而在自願性控制變數的影響下社會影響也呈現對使用意願有顯著的相關。基於這些結果以及本研究探討之手機病毒文獻,除了有效探討影響使用意願的因素之外,也帶給手機使用者對手機病毒有更進一部的瞭解。zh_TW
dc.description.abstractThe purpose of this research is to incorporate Unified Theory of Acceptance and Use of Technology (UTAUT) to determine the factors that affect the intention of accepting mobile phone anti-virus software of users. Besides UTAUT, two other dimensions were also incorporated in this research, perceived trust and fashion involvement. After extensive literature reviews, a suitable research model is developed and examined. This research conducts a survey of 313 respondents. The results indicate without the presence of moderators, all the dimensions except social influence have significant effects on behavior intention; interact with the voluntariness of use moderator social influence has a significant effect on behavior intention. Based on these findings and the literature reviews of mobile phone virus, we could predict and explain the factors that affect the intention of accepting mobile phone anti-virus software of users and give these users have more knowledge on mobile phone virus.en_US
dc.description.tableofcontents中文摘要…………………………………………………………………i Abstract………………………………………………………………….ii Content Table……………………………………………………………iii List of Tables…………………………………………………………….v List of Figures…………………………………………………………..vi Chapter1. Introduction……………………………………………………1 1.1 Background and Motivation……………………………………………1 1.2 Research Objectives……………………………………………………3 1.3 Organizing this Research………………………………………………3 1.4 Research Procedure……………………………………………………4 Chapter2. Literature Review……………………………………………5 2.1 Mobile Phone Virus……………………………………………………5 2.1.1 Introduction of Mobile Phone Virus…………………………………5 2.1.2 Myths about Mobile Phone Viruses……………………………………7 2.1.3 Damages of Mobile Phone Viruses……………………………………9 2.1.4 How Mobile Phone Virus Infects Mobile Devices……………………10 2.1.5 Mobile Phone Anti-virus Software……………………………………11 2.2 Unified Theory of Acceptance and Use of Technology……………………15 2.2.1 Performance Expectancy……………………………………………16 2.2.2 Effort Expectancy…………………………………………………16 2.2.3 Social Influence……………………………………………………17 2.2.4 Facilitating Conditions……………………………………………18 2.3 Perceived Trust………………………………………………………19 2.3.1 Origin of Trust……………………………………………………19 2.3.2 Classification of Trust………………………………………………20 2.4 Fashion Involvement…………………………………………………21 Chapter3. Research Design……………………………………………23 3.1 Research Model and Hypotheses………………………………………23 3.2 Questionnaire Design…………………………………………………24 3.3 Data Collection………………………………………………………25 3.4 Data Analysis Methods………………………………………………26 Chapter4: Data Analysis………………………………………………27 4.1 Demography Analysis…………………………………………………27 4.2 Factor Analysis………………………………………………………28 4.3 Partial Least Squares estimation………………………………………30 4.3.1 Unidimensionality check of block……………………………………30 4.3.2 Outer model results…………………………………………………31 4.3.3 Inner model results…………………………………………………35 4.3.4 Model fit…………………………………………………………36 4.3.5 Moderating effects…………………………………………………37 4.3.5.1 Interaction with Gender…………………………………………37 4.3.5.2 Interaction with Age……………………………………………38 4.3.5.3 Interaction with Experience………………………………………39 4.3.5.4 Interaction with Voluntariness of Use……………………………39 Chapter5: Conclusions and Suggestions………………………………41 5.1 Discussions…………………………………………………………41 5.2 Managerial Implications and Suggestions………………………………45 5.3 Conclusions…………………………………………………………46 5.4 Limitations and Future Research………………………………………46 Reference………………………………………………………………48zh_TW
dc.language.isoen_USzh_TW
dc.publisher電子商務研究所zh_TW
dc.relation.urihttp://www.airitilibrary.com/Publication/alDetailedMesh1?DocID=U0005-0608200821320800en_US
dc.subjectUnified Theory of Acceptance and Use of Technologyen_US
dc.subject科技接受與使用整合理論zh_TW
dc.subjectPerceived Trusten_US
dc.subjectFashion Involvementen_US
dc.subjectMobile phone virusen_US
dc.subject信任感知zh_TW
dc.subject流行影響zh_TW
dc.subject手機病毒zh_TW
dc.title以科技接受與使用整合理論為基礎探討手機使用者對手機防毒軟體的使用意願zh_TW
dc.titleThe User Study for Adopting Mobile Phone Anti-virus Softwareen_US
dc.typeThesis and Dissertationzh_TW
item.openairetypeThesis and Dissertation-
item.openairecristypehttp://purl.org/coar/resource_type/c_18cf-
item.languageiso639-1en_US-
item.grantfulltextnone-
item.fulltextno fulltext-
item.cerifentitytypePublications-
Appears in Collections:科技管理研究所
Show simple item record
 

Google ScholarTM

Check


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.