博碩士論文 954201013 詳細資訊




以作者查詢圖書館館藏 以作者查詢臺灣博碩士 以作者查詢全國書目 勘誤回報 、線上人數:66 、訪客IP:18.119.162.106
姓名 曾文聖(Wen-sheng Tseng)  查詢紙本館藏   畢業系所 企業管理學系
論文名稱 以計劃行為理論為基礎探討消費者仿冒品購買意願
(Study of intention toward counterfeits purchasing based on theory of planned behavior)
相關論文
★ 台灣企業經營模式研究-以個案公司為例★ 組織文化對企業永續經營之影響---以某外商為例之個案研究
★ 專案管理運用於軍售作業之探討★ 合資企業組織變革與組織學習對組織績效之影響 ---以國內某合資氣體公司為例
★ 探討在分散型產業,如何利用策略性委外執行低成本與差異化-以Supermicro公司為例★ 企業投資中國的成長策略之探討-以台灣艾華電子公司為例
★ 從全球定位系統(GPS)設計代工個案探討其競爭優勢★ 創投公司投資網際網路產業之先佔者優勢探討
★ 以資料包絡分析法評估電資通光領域之科技研究發展專案計畫相對效率★ 車廠中頻直流(MFDC)點焊之品質管理制度的建立 — 以C公司為例
★ 運用六個標準差降低液晶製程中半成品耗損 — 以A公司為例★ 以財務指標探討連接器產業之經營策略-以A公司為例
★ 台灣半導體通路商經營績效分析之研究-以資料包絡分析法評估★ 自行車安全帽行業自創品牌進入中國市場之行銷策略-以廠商F公司為例
★ 化粧品零售業之電子商務商業模式-以S企業集團直營網站經營為例★ 台灣網版印刷中小企業競爭策略分析-以E公司為例
檔案 [Endnote RIS 格式]    [Bibtex 格式]    [相關文章]   [文章引用]   [完整記錄]   [館藏目錄]   至系統瀏覽論文 ( 永不開放)
摘要(中) 仿冒逐漸發展成一個顯著的國際問題,大部分產品不能倖免的成為被仿冒對象。亞洲國家被認為是侵犯智慧財產權最甚者,而台灣也名列特別301其中。本研究以計劃行為理論為基礎,以需求面探討仿冒品,欲了解消費者對於仿冒品購買意願之影響因素。本研究根據知覺流行內涵,將流行性成分大於功能性成分的產品,以仿冒衣飾/飾品類別為例;功能性成分大於流行性成分的產品,以盜版軟體/遊戲/影片/音樂CD類別為例,分別以此兩類產品探討消費者態度、主觀規範、自我效能對於消費者仿冒品購買意願的影響。研究結果如下:在衣飾/飾品方面,僅消費者態度顯著影響對其購買意願;而在盜版軟體/遊戲/影片/音樂CD方面則是態度、主觀規範與自我效能皆影響消費者購買意願,顯示了產品類別的不同,對於仿冒品購買意願影響因素也就因此而有所不同。
摘要(英) No product category is left unscathed and counterfeiting has become a significant economy problem. Asian countries are notorious as the world’s worst violators of intellectual property rights, and Taiwan is on the special 301 list. This study proposes a model based on the Theory of Planned Behavior and investigates demand side of counterfeits to understand what factor affect intention toward counterfeits purchasing. According to perceived fashion content, this study names products with more fashion component than functional component as CA category, and names products with more functional component than fashion component as OD category. Investigate how attitude toward counterfeits purchasing, subjective norm and self-efficacy affect intention toward counterfeits purchasing in the two product categories respectively. This study results are as follows: only attitude toward counterfeits purchasing effects intention toward counterfeits purchasing in the CA category. Attitude toward counterfeits purchasing, subjective norm and self-efficacy effect intention toward counterfeits purchasing in the OD category. It indicates that different factors affect intention toward counterfeits purchasing with difference in product category.
關鍵字(中) ★ 計劃行為理論
★ 仿冒
關鍵字(英) ★ theory of planned behavior
★ counterfeits
論文目次 中文摘要 i
英文摘要 ii
圖目錄 iv
表目錄 v
第一章 緒論 1
第一節 研究背景與動機 1
第二節 研究目的 2
第三節 研究流程 2
第二章 文獻探討 4
第一節 仿冒的定義與種類 4
第二節 台灣仿冒品 4
第三節 仿冒相關文獻 7
第四節 計劃行為理論 9
第五節 自我效能理論 11
第三章 研究方法 14
第一節 研究架構 14
第二節 研究假說 15
第三節 研究變數操作型定義與測量 17
第四節 資料分析與統計方法 20
第四章研究結果 22
第一節 樣本敘述性統計分析 22
第二節 研究變數結果描述 25
第三節 研究變數之信度與效度分析 28
第四節 研究變數之因果模式分析 33
第五章 結論與研究限制 48
參考文獻 49
附錄:研究問卷 53
圖目錄
圖1 研究流程 3
圖2 理性行為理論 9
圖3 計劃行為理論 11
圖4 修正後之TPB 13
圖5 研究架構圖 14
圖6 研究路徑圖 35
圖7 整體模式關係路徑圖 - CA 42
圖8 整體模式關係路徑圖 - OD 43
圖9 研究假設路徑圖 - CA 44
圖10 研究假設路徑圖 - OD 44
表目錄
表1 特別301名單-亞洲國家部份 1
表2 2003~2007年IIPA台灣仿冒損失與比例調查 5
表3 消費者類型 7
表4 研究假設 17
表5 態度之衡量問項彙整 18
表6 主觀規範之衡量問項彙整 18
表7 自我效能之衡量問項彙整 19
表8 行為意願之衡量問項彙整 20
表9 性別次數分配表 22
表10 年齡次數分配表 22
表11 教育程度次數分配表 23
表12 職業次數分配表 23
表 13 每月可支配所得次數分配表 24
表14 居住地區次數分配表 24
表15 態度之敘述性統計分析 25
表16 主觀規範之敘述性統計分析 26
表17 自我效能之敘述性統計分析 26
表18 購買意願之敘述性統計分析 27
表19 信度分析表 28
表20 收斂效度分析表 - CA 30
表21 收斂效度分析表 - OD 30
表22 區別效度分析表 - CA 32
表23 區別效度分析表 - OD 32
參考文獻 1. 陳順宇(1998)。多變量分析。台北:華泰。
2. 林惠琦(2004)。仿冒品購買意圖之研究-以台灣、香港、新加坡地區為例。國立東華大學國際企業研究所碩士論文。
3. 高申春(2001)。人性輝煌之路-班杜拉的社會學習理論。台北:貓頭鷹出版社。
4. Albers-Miller, N.D. (1999). “Consumer misbehavior: why people buy illicit goods” Journal of Consumer Marketing, 3, 273-287.
5. Ajzen, I. and Fishbein M. (1980) “Understanding Attitudes and Predicting Social Behavior” Englewood Cliffs, NJ: Prentice-Hall.
6. Ajzen, I. (1985). “From Intentions to Actions: A Theory of Planned Behavior in Action Control from Cognition to Behavior”, 11-39.
7. Ajzen, I. (1991). “The Theory of Planned Behavior” Organizational Behavior and Human Decision Processes, 50, 179-211.
8. Ajzen. I. (2002). “Constructing a TpB Questionnaire: Conceptual and Methodological Considerations”, 1-13.
9. Anderson, J. (2004) “The China syndrome” Brand and Product Protection, March, 16 -17.
10. Ang, S. H., Cheng, P. S., Lim, E. A. C. and Tambyah, S. K. (2001). “Spot the difference: consumer responses towards counterfeits” Journal of Consumer Marketing, 3, 219-235.
11. Arellano, R. (1994). “Informal-underground retailers in less-developed countries: An exploratory research from a marketing point of view” Journal of Macromarketing, 14, 21-35.
12. Bandura, A. (1977). “Self-efficacy: toward a unifying theory of behavioral change” Psychological Review, 84, 191-215.
13. Bandura, A. (1982). “Self-efficacy mechanism in human agency” American Psychologist, 37(2), 122-147.
14. Bandura, A. (1986). “Social foundations of thought and action: a social cognitive theory” Englewood Cliffs, NJ: Prentice-Hall
15. Bandura, A. and Jourden, F. J. (1991). “Self-Regulatory Mechanisms Governing the Impact of Social Comparison on Complex Decision Making” Journal of Personality and Social Psychology, 60(6), 941-951.
16. Behar, R. (2000). “Beijing’s phony war on fakes” Fortune (Europe), 142(10), 98 -110.
17. Bellenger, D., and Korgaonkar, P. K. (1980). “Profiling the recreational shopper” Journal of Retailing, 56, 77-92.
18. Bentler, P. M., and Bonett, D. G. (1980). “Significant tests and goodness of fit in the analysis of covariance structures” Psychological Bulletin, 88, 588-606.
19. Blatt, J. J. (1993). “Battling counterfeit products on the US side of the Pacific Rim” The International Computer Lawyer, 1(13), 5-16.
20. Bloch, P.H. Bush, R.F. and Campbell, L. (1993). “Consumer ‘accomplices’ in product counterfeiting: a demand-side investigation” Journal of Consumer Marketing, 4, 27-36.
21. Bock, G.W. and Kim, Y.G. (2002). “Determinants of the Individual’s Knowledge Sharing Behavior: The Theory of Reasoned Action Perspective” Proceedings of 6th Pacific Asia Conference on Information System (PACIS).
22. Browne, M. W., and Cudeck, R. (1989). “Single sample cross-validation indices for covariance structures” Multivariate Behavioral Research, 24, 445.
23. Bush, R., Bloch, P. and Dawson, S. (1989). “Remedies for product counterfeiting” Business Horizon, 32(1), 59-65.
24. Celso A., Cristiana T. and Carlos A. V. R. (2007). “Consumer attitudes toward counterfeits: a review and extension” Journal of Consumer Marketing, 36-47.
25. Chakraborty, G., Allred, A. and Bristol, T. (1996). “‘ Exploring consumers’ evaluations of counterfeits: The roles of country of origin and ethnocentrism” Advances in Consumer Research, 23, 379-384.
26. Cheng, H. K., Sims, R. R. and Teegen, H. (1997). “To purchase or to pirate software: an empirical study” Journal of Management Information System, 4, 49-60.
27. Compeau, D. R. and Higgins, C. A., 1995, “Computer self-efficacy: Development of a measure and initial test,” MIS Quarterly, 19, 189-211.
28. Cordell, V., Wongtada, N. and Kieschnick, R. L. Jr. (1996). “Counterfeit purchase intentions: Role of lawfulness attitudes and product traits as determinants” Journal of Business Research, 35, January, 41-53.
29. Cottman, L. (1992). “It’ s not the real thing”, Security Management, 36(12), 68-70.
30. Dodge, H.R, Edwards, E.A. and Fullerton, S. (1996). “Consumer transgressions in the marketplace: consumers’ perspectives” Psychology and Marketing, 8, 821-835.
31. Dowling, G.R. and Staelin, R. (1994). “A model of perceived risk and intended risk-handling activity” Journal of Consumer Research, 21(1), 119-34.
32. Eric H. Smith, (2007). “International Piracy: The Challenges of Protecting Intellectual Property in the 21st Century”
33. Gentry, J., Putrevu, S., Shultz, C. and Commuri, S. (2001). “How now Ralph Lauren? The separation of brand and product in a counterfeit culture” Advances in Consumer Research, 27, 258-265.
34. Gentry, J., Putrevu, S., and Shultz, C. (2006). “The Effects of Counterfeiting on Consumer Search” Journal of Consumer Behaviour 5 (September), 1-12.
35. Granbois, D. H., and Summers, J. O. (1975). “Primary and secondary validity of consumer purchase probabilities” Journal of Consumer Research, 1, 31-38.
36. Greenberg, C. J., Sherman, E. and Schiffman, L.G. (1983). “The measurement of fashion image as a determinant of store patronage”, in Darden, W.R. and Lusch, R.F. (Eds), Patronage Behavior & Retail Management, North Holland, New York, NY, 151-63.
37. Grossman, G. and Shapiro, C. (1988a). “Counterfeit trade. The American Economic Review.”
38. Grossman, G. and Shapiro, C. (1988b) “Foreign counterfeiting of status goods” Quarterly Journal of Economics, 103(1), 79-100.
39. Hair, J. F., Anderson, R. E., Tatham, R. L., and Black, W. C. (2006). Multivariate data analysis, sixth edition (six ed.). Englewood Cliffs, NJ: Prentice-Hall.
40. Husted, B.W. (2000). “The impact of national culture on software piracy” Journal of Business Ethics, 3, 197-211.
41. Lynne, G. D., C. Franklin C., Alan H., and Mohammed R. (1995). “Conservation Technology Adoption Decisions and the Theory of Planned Behavior” Journal of Economic Research, 16, 581-598.
42. Marron, D.B. and Steel, D.G. (2000). “Which countries protect intellectual property? The case of software piracy” Economic Inquiry, 2, 159-174.
43. McDonald, G., and Roberts, C. (1994). “Product piracy: The problem that will not go away” Journal of Product and Brand Management, 3, 55-65.
44. Moores, T. and Dhillon, G. (2000). “Software piracy: a view from Hong Kong” Communications of the ACM, 12, 88-93.
45. Nash, T. (1989), “Only imitation? The rising cost of counterfeiting” Director, May, 64-9.
46. Pajares F. (1996). “Self-efficacy beliefs in academic settings” Review of educational research, 66, 548-578.
47. Phau, I., Prendergast, G. and Chuen, L. H. (2001). “Profiling brand-piracy-prone consumers: An exploratory study in Hong Kong’s CA industry” Journal of Fashion Marketing and Management, 5(1), 45-55.
48. Presndegast, G., Chuen, L. H. and Phau, I. (2002). “Understanding consumer demand for non-deceptive pirate brands” Marketing intelligence and Planning, 20(7), 405-416.
49. Shaoyi, L., Yuan, P. S., Huaiqing, W. and Ada, C., 1999. “The adoption of virtual banking: an empirical study” International Journal of Information Management, 19, 63-74.
50. STATEMENT OF THE INTERNATIONAL INTELLECTUAL PROPERTY ALLIANCE ON USTR’S “SPECIAL 301” OUT-OF-CYCLE REVIEW DECISIONS ON TAIWAN AND POLAND, http://iipa.com
51. Stone, G. P. (1954). “City shoppers and urban identification: Observations on the social psychology of city life” American Journal of Sociology, 60, 36-45.
52. Sweeney, J., Greenberg, S. and Bilter, M. (1994). “Heading them off at the pass - Can counterfeit goods of foreign origin be stopped at the counterfeiter’s border” The Trademark Reporter, 48, 477-494.
53. Swinyard, W. R., Heikki, R., and Kau, A. K. (1990). “The morality of software piracy: Across cultural analysis” Journal of business Ethics, 9, 655-664.
54. Tan, B. (2002). “Understanding consumer ethical decision making with respect to purchase of pirated software” Journal of Consumer Marketing, 2, 96-111.
55. Taylor, S. and Todd, P. A., (1995). “Understanding information technology usage: A test of competing models,” Information systems research, Vol.6, No.2, 144-177.
56. Tom, G., Garibaldi, B., Zeng, Y. and Pilcher, J. (1998). “Consumer demand for counterfeit goods” Psychology and Marketing, 15(5), 405-421.
57. Traphagan, M. and Griffith, A. (1998). “Software piracy and global competitiveness: report on global software piracy” International Review of Law Computers and Technology, 3, 431-451.
58. Wang, F., Zhang, H., Zang, H., and Ouyang, M. (2005). “Purchasing pirated software: an initial examination” Journal of Consumer Marketing, 6, 340-351.
59. Wee, C. H., Tan, S. J. and Cheok, K. H. (1995). “Non-price determinants of intention to purchase counterfeit goods” International Marketing Review, 6, 19-46.
60. Wilke, R. and Zaichkowsky, J. L. (1999). “Brand imitation and its effects on innovation competition, and brand equity” Business Horizons, 42(7), 9-19.
61. Wood, R. and Bandura, A., (1989). “Impact of Conceptions of Ability on Self-Regulatory Mechanisms and Complex Decision Making” Journal of Personality and Social Psychology, 56(3), 407-415.
62. Yvette, R., and Lindsay, T. (1999). “Structural equation modeling with lisrel: Application in tourism” Tourism Management, 20(1), 71-88.
指導教授 洪德俊 審核日期 2008-7-23
推文 facebook   plurk   twitter   funp   google   live   udn   HD   myshare   reddit   netvibes   friend   youpush   delicious   baidu   
網路書籤 Google bookmarks   del.icio.us   hemidemi   myshare   

若有論文相關問題,請聯絡國立中央大學圖書館推廣服務組 TEL:(03)422-7151轉57407,或E-mail聯絡  - 隱私權政策聲明