Please use this identifier to cite or link to this item: http://hdl.handle.net/11455/22669
標題: 以科技接受與使用整合理論為基礎探討手機使用者對手機防毒軟體的使用意願
The User Study for Adopting Mobile Phone Anti-virus Software
作者: 蕭英信
Hsiao, Ying-Shin
關鍵字: Unified Theory of Acceptance and Use of Technology;科技接受與使用整合理論;Perceived Trust;Fashion Involvement;Mobile phone virus;信任感知;流行影響;手機病毒
出版社: 電子商務研究所
引用: [1] Alexander G., 2006. Mobile Malware Evolution: An Overview, Part 1 [online]. USA, Viruslist.com. Available from: http://www.viruslist.com/en/analysis?pubid=200119916 [Accessed 21 March 2008]. [2] Al-Gahtani, S.S., Hubona, G.S., and Wang, J., 2007. Information technology (IT) in Saudi Arabia: Culture and the acceptance and use of IT. Information and Management, 44(8), 681-691. [3] Atchariyachanvanich, K., Okada, H., and Sonehara, N. 2007. Proceedings from: Wireless Communications, Networking and Mobile Computing, 2007. WiCom 2007. International Conference on. Factors Affecting Customers'' Intention to Repurchase in Internet Shopping: Extrinsic Benefits and Intrinsic Benefits. 3454-3457. [4] Bose, A. and Shin, K.G. 2006. Proceedings from: IEEE Securecomm and Workshops. On Mobile Viruses Exploiting Messaging and Bluetooth Services.1-10. [5] Blau, P., 1964. Exchange and Power in Social Life. New York: Wiley. [6] Cai, Y.S, and Lai, Y.C. 2001. Proceedings from: The 2005 Conference on Technology and Management. The user study of teenagers'' purchasing behavior to the fashion products. 147-154. [7] Catalan, M. and Kotzab, H., 2003. Assessing the responsiveness in the Danish mobile phone supply chain. International Journal of Physical Distribution and Logistics Management, 33(8), 668-685. [8] Chang, Y.L., 2007. Exploration and Design Application of The Fashionable Elements of NOKIA Mobile Phone. Thesis(Master's degree). Tatung University. [9] Chen, I.T., 2002. A Study on the Customers' Preferences of 3G Applications. Thesis (Master's degree). Tatung University. [10] Chin, W.W., Marcolin, B.L., and Newsted, P.R. 1996. Proceedings from: International Conference ON Information Systems. A Partial Least Squares Latent Variable Modeling Approach For Measuring Interaction Effects: Results From A Monte Carlo Simulation Study And Voice Mail Emotion/Adoption Study. 16-18. [11] Davis, F. D., 1989. Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology. MIS Quarterly, 13(3), 319-339. [12] Doney, P. M., Cannon, J. P., and Mullen, M. R., 1998. Understanding the influence of national culture on the development of trust. Academy of Management Review, 23(3), 601-620. [13] Fornell, C. and Larcker, D.F., 1981. Evaluating structural equation models with unobservable variables and measurement error. Journal of Marketing Research, 18, 39-50. [14] Fishbein, M. and Ajzen, I., 1975. Belief, Attitude, Intention and Behavior: An Introduction to Theory and Research. Boston, MA: Addison-Wesley. [15] Gefen D., 2000. E-commerce: The Role of Familiarity and Trust. Omega, 28(6), 725-727. [16] Hoffman, D. L., Novak, T. P., and Peralta, M., 1999. Building consumer trust online. Communications of the ACM, 42(4), 80-85. [17] Hypponen, M., 2006. Malware goes mobile, Scientific American, November, p. 70. [18] Ishii, K., 2004. Internet use via mobile phone in Japan. Telecommunications Policy, 28(1), 43-58. [19] John, Y.J., Gorman, G.E., 2002. Internet use in South Korea. Online Information Review, 26(5), 335-44. [20] Kaiser, H.F., 1974. An index of factorial simplicity. Psychometrika, 39(1), 31-36. [21] Karabulut, Y., Kerschbaum, F., Massacci, F., Robinson, P., and Yautsiukhin, A., 2007. Security and Trust in IT Business Outsourcing: a Manifesto. Electronic Notes in Theoretical Computer Science, 179(6), 47-58. [22] Lin, X.H., Zhang, L.K., Lin, W.L., and Zhang, Y.H. 2007. Proceedings from: The 18th International Conference on Information Management. The predict model for behavior of using E-coupon based on UTAUT: direct and interact effects. 457-464. [23] Mayer, R. C., Davis, J.H., and Schoorman, F.D., 1995. An integrative model of organizational trust. Academy of Management Review, 20(3), 709-734. [24] McIntyre, S.H. and Miller, C.M., 1992. Social utility and fashion behavior. Marketing Letters, 3(4), 371-382. [25] Miller, C.M., McIntyre, S.H. and Mantrala, M.K., 1993. Toward Formalizing Fashion Theory. Journal of Marketing Research, 30(2), 142-157. [26] Mishra, A.K., 1996. Organizational responses to crisis: The centrality of trust. In: R. M. Kramer and T. R. Tyler, Eds. Trust in Organizations: Frontiers of Theory and Research. Thousand Oaks, CA: Sage, 261-287. [27] Moore, G.C. and Benbasat, I., 1991. Development of an Instrument to Measure the Perceptions of Adopting an Information Technology Innovation. Information Systems Research, 2(3), 192-222. [28] Morales, J.A., Clarke, P.J., Deng, Y. and Kibria, B.M.G., 2006. Testing and evaluating virus detectors for handheld devices. Journal in Computer Virology, 2(2), 135-47. [29] Morgan, R.M. and Hunt, S.D., 1994. The Commitment- Trust Theory of relationship Marketing. Journal of Marketing, 58, 20-38. [30] Nunnally, J.C., 1978. Psychometric Theory. 2nd Edition. New York: McGraw-Hill. [31] Ringle, C.M., Wende, S., and Will, A., 2005. SmartPLS 2.0 (beta)[online]. Hamburg University. Available From: http://www.smartpls.de[Accessed 21 March 2008]. [32] Ringle, C. M., Wende, S., Will, A. 2008. The finite mixture partial least squares approach: Methodology and application. In: Esposito Vinzi, V., Chin, W. W., Henseler, J., and Wang, H., eds. Handbook of partial least squares: Concepts, methods and applications in marketing and related fields, Springer-Verlag Berlin and Heidelberg GmbH & Co. K. [33] Rocher J.P., Cavalier J.C., Laquet J.L., and Ken W., 1996. Mobile Phone Fraud -- Are GSM Networks Secure. Computer Fraud and Security, 1996(11), 11-18. [34] Rotters,J. , 1967. A New Scale for The Measurement of Interpersonal Trust. Journal of Personality, 35(4), 651-665. [35] Rousseau, D. M., Sitkin, S. B., Burt, R. S., and Camerer, C., 1998. Not so different after all: A cross-discipline view of trust, Academy of Management Review, 23(3), 393-404. [36] Roy, M.C., Dewit, O., and Aubert, B.A., 2001. The impact of interface usability on trust in Web retailers. Internet Research, 11(5), 388-398. [37] Shang, R.A., Chen, Y.C., and Shen, L., 2004. Extrinsic versus intrinsic motivations for consumers to shop on-line. Information and Management, 42(3), 401-413. [38] Shih, D.H., Lin, B., Chiang, H.S., and Shih, M.H., 2007. Security aspects of mobile phone virus: a critical survey. Industrial Management and Data Systems, 108(4), 478-494. [39] Tao, Y.H., Wu, Y.L., and Yang, P.C. 2007. Proceedings from: Industrial Engineering and Engineering Management, 2007 IEEE International Conference on. Using UTAUT to explore the behavior of 3G mobile communication users. 199-203. [40] Tenenhaus, M., Vinzi, V.E., Chatelin, Y.M., and Lauro, C., 2005. PLS path modeling. Computational Statistics and Data Analysis, 48, 159-205. [41] Thompson, R. L., Higgins, C. A., and Howell, J. M., 1991. Personal Computing: Toward a Conceptual Model of Utilization. MIS Quarterly,15(1), 124-143. [42] T o¨yssy, S. and Helenius, M., 2006. About malicious software in smartphones. Journal in Computer Virology, 2(2), 109-19.× [43] Türkyilmaz, A. and Özkan, C., 2007. Development of a customer satisfaction index model: An application to the Turkish mobile phone sector. Industrial Management and Data Systems, 107(5), 672-687. [44] Venkatesh, V., Morris, M.G., Davis, G.B., and Davis, F.D., 2003. User Acceptance of Information Technology: Toward A Unified View. MIS Quarterly, 27, 425-478. [45] Yang, J., He, X., and Lee, H., 2007. Social reference group influence on mobile phone purchasing behaviour: a cross-nation comparative study. International Journal of Mobile Communications, 5(3), 319-38. [46] Yap, T.S. and Ewe, H.T., 2005. A mobile phone malicious software detection model with behavior checker. Lecture Notes in Computer Science, 3597, 57-65. [47] Zheng, H., Li, D., and Gao, Z. 2006. Proceedings from: 2006 1st International Symposium on Pervasive Computing and Applications. An epidemic model of mobile phone virus. 1-5.
摘要: 
本研究主要是以科技接受與使用整合理論為基礎來探討影響手機使用者使用手機防毒軟體之使用意願的因素。經由對先前關於科技接受與使用整合理論、信任感知構面以及流行影響構面的文獻進行閱讀與研究之後,建立出本研究的理論基礎架構,進而對此理論架構進行檢視。
在建立理論架構之後,本研究以網路問卷發放的方式配合實證研究來檢視本研究架構。所採用的313份有效問卷,皆經由網路問卷服務系統收集而來。經由問卷的設計、發放、回收與統計的過程,驗證本研究各個構面對使用意願影響之結果。本研究發現,在沒有控制變數影響的情況下科技接受與使用整合理論中的對績效的期望、對付出的期望、有利情況三項以及信任感知和流行影響確實與手機防毒軟體使用意願呈現顯著的相關,而在自願性控制變數的影響下社會影響也呈現對使用意願有顯著的相關。基於這些結果以及本研究探討之手機病毒文獻,除了有效探討影響使用意願的因素之外,也帶給手機使用者對手機病毒有更進一部的瞭解。

The purpose of this research is to incorporate Unified Theory of Acceptance and Use of Technology (UTAUT) to determine the factors that affect the intention of accepting mobile phone anti-virus software of users. Besides UTAUT, two other dimensions were also incorporated in this research, perceived trust and fashion involvement. After extensive literature reviews, a suitable research model is developed and examined. This research conducts a survey of 313 respondents. The results indicate without the presence of moderators, all the dimensions except social influence have significant effects on behavior intention; interact with the voluntariness of use moderator social influence has a significant effect on behavior intention. Based on these findings and the literature reviews of mobile phone virus, we could predict and explain the factors that affect the intention of accepting mobile phone anti-virus software of users and give these users have more knowledge on mobile phone virus.
URI: http://hdl.handle.net/11455/22669
其他識別: U0005-0608200821320800
Appears in Collections:科技管理研究所

Show full item record
 

Google ScholarTM

Check


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.