Please use this identifier to cite or link to this item:
標題: 以科技接受與使用整合理論為基礎探討手機使用者對手機防毒軟體的使用意願
The User Study for Adopting Mobile Phone Anti-virus Software
作者: 蕭英信
Hsiao, Ying-Shin
關鍵字: Unified Theory of Acceptance and Use of Technology;科技接受與使用整合理論;Perceived Trust;Fashion Involvement;Mobile phone virus;信任感知;流行影響;手機病毒
出版社: 電子商務研究所
引用: [1] Alexander G., 2006. Mobile Malware Evolution: An Overview, Part 1 [online]. USA, Available from: [Accessed 21 March 2008]. [2] Al-Gahtani, S.S., Hubona, G.S., and Wang, J., 2007. Information technology (IT) in Saudi Arabia: Culture and the acceptance and use of IT. Information and Management, 44(8), 681-691. [3] Atchariyachanvanich, K., Okada, H., and Sonehara, N. 2007. Proceedings from: Wireless Communications, Networking and Mobile Computing, 2007. WiCom 2007. International Conference on. Factors Affecting Customers'' Intention to Repurchase in Internet Shopping: Extrinsic Benefits and Intrinsic Benefits. 3454-3457. [4] Bose, A. and Shin, K.G. 2006. Proceedings from: IEEE Securecomm and Workshops. On Mobile Viruses Exploiting Messaging and Bluetooth Services.1-10. [5] Blau, P., 1964. Exchange and Power in Social Life. New York: Wiley. [6] Cai, Y.S, and Lai, Y.C. 2001. Proceedings from: The 2005 Conference on Technology and Management. The user study of teenagers'' purchasing behavior to the fashion products. 147-154. [7] Catalan, M. and Kotzab, H., 2003. Assessing the responsiveness in the Danish mobile phone supply chain. International Journal of Physical Distribution and Logistics Management, 33(8), 668-685. [8] Chang, Y.L., 2007. Exploration and Design Application of The Fashionable Elements of NOKIA Mobile Phone. Thesis(Master's degree). Tatung University. [9] Chen, I.T., 2002. A Study on the Customers' Preferences of 3G Applications. Thesis (Master's degree). Tatung University. [10] Chin, W.W., Marcolin, B.L., and Newsted, P.R. 1996. Proceedings from: International Conference ON Information Systems. A Partial Least Squares Latent Variable Modeling Approach For Measuring Interaction Effects: Results From A Monte Carlo Simulation Study And Voice Mail Emotion/Adoption Study. 16-18. [11] Davis, F. D., 1989. Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology. MIS Quarterly, 13(3), 319-339. [12] Doney, P. M., Cannon, J. P., and Mullen, M. R., 1998. Understanding the influence of national culture on the development of trust. Academy of Management Review, 23(3), 601-620. [13] Fornell, C. and Larcker, D.F., 1981. Evaluating structural equation models with unobservable variables and measurement error. Journal of Marketing Research, 18, 39-50. [14] Fishbein, M. and Ajzen, I., 1975. Belief, Attitude, Intention and Behavior: An Introduction to Theory and Research. Boston, MA: Addison-Wesley. [15] Gefen D., 2000. E-commerce: The Role of Familiarity and Trust. Omega, 28(6), 725-727. [16] Hoffman, D. L., Novak, T. P., and Peralta, M., 1999. Building consumer trust online. Communications of the ACM, 42(4), 80-85. [17] Hypponen, M., 2006. Malware goes mobile, Scientific American, November, p. 70. [18] Ishii, K., 2004. Internet use via mobile phone in Japan. Telecommunications Policy, 28(1), 43-58. [19] John, Y.J., Gorman, G.E., 2002. Internet use in South Korea. Online Information Review, 26(5), 335-44. [20] Kaiser, H.F., 1974. An index of factorial simplicity. Psychometrika, 39(1), 31-36. [21] Karabulut, Y., Kerschbaum, F., Massacci, F., Robinson, P., and Yautsiukhin, A., 2007. Security and Trust in IT Business Outsourcing: a Manifesto. Electronic Notes in Theoretical Computer Science, 179(6), 47-58. [22] Lin, X.H., Zhang, L.K., Lin, W.L., and Zhang, Y.H. 2007. Proceedings from: The 18th International Conference on Information Management. The predict model for behavior of using E-coupon based on UTAUT: direct and interact effects. 457-464. [23] Mayer, R. C., Davis, J.H., and Schoorman, F.D., 1995. An integrative model of organizational trust. Academy of Management Review, 20(3), 709-734. [24] McIntyre, S.H. and Miller, C.M., 1992. Social utility and fashion behavior. Marketing Letters, 3(4), 371-382. [25] Miller, C.M., McIntyre, S.H. and Mantrala, M.K., 1993. Toward Formalizing Fashion Theory. Journal of Marketing Research, 30(2), 142-157. [26] Mishra, A.K., 1996. Organizational responses to crisis: The centrality of trust. In: R. M. Kramer and T. R. Tyler, Eds. Trust in Organizations: Frontiers of Theory and Research. Thousand Oaks, CA: Sage, 261-287. [27] Moore, G.C. and Benbasat, I., 1991. Development of an Instrument to Measure the Perceptions of Adopting an Information Technology Innovation. Information Systems Research, 2(3), 192-222. [28] Morales, J.A., Clarke, P.J., Deng, Y. and Kibria, B.M.G., 2006. Testing and evaluating virus detectors for handheld devices. Journal in Computer Virology, 2(2), 135-47. [29] Morgan, R.M. and Hunt, S.D., 1994. The Commitment- Trust Theory of relationship Marketing. Journal of Marketing, 58, 20-38. [30] Nunnally, J.C., 1978. Psychometric Theory. 2nd Edition. New York: McGraw-Hill. [31] Ringle, C.M., Wende, S., and Will, A., 2005. SmartPLS 2.0 (beta)[online]. Hamburg University. Available From:[Accessed 21 March 2008]. [32] Ringle, C. M., Wende, S., Will, A. 2008. The finite mixture partial least squares approach: Methodology and application. In: Esposito Vinzi, V., Chin, W. W., Henseler, J., and Wang, H., eds. Handbook of partial least squares: Concepts, methods and applications in marketing and related fields, Springer-Verlag Berlin and Heidelberg GmbH & Co. K. [33] Rocher J.P., Cavalier J.C., Laquet J.L., and Ken W., 1996. Mobile Phone Fraud -- Are GSM Networks Secure. Computer Fraud and Security, 1996(11), 11-18. [34] Rotters,J. , 1967. A New Scale for The Measurement of Interpersonal Trust. Journal of Personality, 35(4), 651-665. [35] Rousseau, D. M., Sitkin, S. B., Burt, R. S., and Camerer, C., 1998. Not so different after all: A cross-discipline view of trust, Academy of Management Review, 23(3), 393-404. [36] Roy, M.C., Dewit, O., and Aubert, B.A., 2001. The impact of interface usability on trust in Web retailers. Internet Research, 11(5), 388-398. [37] Shang, R.A., Chen, Y.C., and Shen, L., 2004. Extrinsic versus intrinsic motivations for consumers to shop on-line. Information and Management, 42(3), 401-413. [38] Shih, D.H., Lin, B., Chiang, H.S., and Shih, M.H., 2007. Security aspects of mobile phone virus: a critical survey. Industrial Management and Data Systems, 108(4), 478-494. [39] Tao, Y.H., Wu, Y.L., and Yang, P.C. 2007. Proceedings from: Industrial Engineering and Engineering Management, 2007 IEEE International Conference on. Using UTAUT to explore the behavior of 3G mobile communication users. 199-203. [40] Tenenhaus, M., Vinzi, V.E., Chatelin, Y.M., and Lauro, C., 2005. PLS path modeling. Computational Statistics and Data Analysis, 48, 159-205. [41] Thompson, R. L., Higgins, C. A., and Howell, J. M., 1991. Personal Computing: Toward a Conceptual Model of Utilization. MIS Quarterly,15(1), 124-143. [42] T o¨yssy, S. and Helenius, M., 2006. About malicious software in smartphones. Journal in Computer Virology, 2(2), 109-19.× [43] Türkyilmaz, A. and Özkan, C., 2007. Development of a customer satisfaction index model: An application to the Turkish mobile phone sector. Industrial Management and Data Systems, 107(5), 672-687. [44] Venkatesh, V., Morris, M.G., Davis, G.B., and Davis, F.D., 2003. User Acceptance of Information Technology: Toward A Unified View. MIS Quarterly, 27, 425-478. [45] Yang, J., He, X., and Lee, H., 2007. Social reference group influence on mobile phone purchasing behaviour: a cross-nation comparative study. International Journal of Mobile Communications, 5(3), 319-38. [46] Yap, T.S. and Ewe, H.T., 2005. A mobile phone malicious software detection model with behavior checker. Lecture Notes in Computer Science, 3597, 57-65. [47] Zheng, H., Li, D., and Gao, Z. 2006. Proceedings from: 2006 1st International Symposium on Pervasive Computing and Applications. An epidemic model of mobile phone virus. 1-5.

The purpose of this research is to incorporate Unified Theory of Acceptance and Use of Technology (UTAUT) to determine the factors that affect the intention of accepting mobile phone anti-virus software of users. Besides UTAUT, two other dimensions were also incorporated in this research, perceived trust and fashion involvement. After extensive literature reviews, a suitable research model is developed and examined. This research conducts a survey of 313 respondents. The results indicate without the presence of moderators, all the dimensions except social influence have significant effects on behavior intention; interact with the voluntariness of use moderator social influence has a significant effect on behavior intention. Based on these findings and the literature reviews of mobile phone virus, we could predict and explain the factors that affect the intention of accepting mobile phone anti-virus software of users and give these users have more knowledge on mobile phone virus.
其他識別: U0005-0608200821320800
Appears in Collections:科技管理研究所

Show full item record

Google ScholarTM


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.