博碩士論文 88423011 詳細資訊




以作者查詢圖書館館藏 以作者查詢臺灣博碩士 以作者查詢全國書目 勘誤回報 、線上人數:27 、訪客IP:3.145.88.20
姓名 王振浩(Zhin-Hou Wang )  查詢紙本館藏   畢業系所 資訊管理研究所
論文名稱 影響消費者採用網路銀行行為意向之因素研究
相關論文
★ 製藥業的成本會計評估研究─ 一個ABC成本制度的應用★ 一個保險業的資料採擷應用--業務員的薪酬制度分析
★ 農漁產品電子化交易中分類分級管理之研究★ 應用類神經網路建構壽險核保決策支援之研究
★ 企業導入ERP之關鍵成功因素-個案研究★ 體外診斷醫療器材滿足CE及GMP驗證要求之個案研
★ 企業資訊系統委外研究-以個案銀行為例★ DRAM月平均價格變動分析
★ 定期航運產業運價及運送時間對經營績效影響之研究-以某外商海運公司在台灣經營為例★ 以交通儲值卡作為電子支付工具的營運模式及可行性分析
★ 軟體公司能力成熟度評估★ 加速台灣海關的通關便捷化-提升行動化服務的解決方案
★ 以均勻度係數為預測晶圓良率指標之可行性分析-以國內某DRAM廠為例★ 某公司資訊部門變革失敗之探討
★ 資訊部門導入ITIL 管理機制之現況分析─ 以企業導入ITIL 服務支援為例★ 導入WCO SAFE 優質企業之可行性分析–以A航空公司為例
檔案 [Endnote RIS 格式]    [Bibtex 格式]    [相關文章]   [文章引用]   [完整記錄]   [館藏目錄]   [檢視]  [下載]
  1. 本電子論文使用權限為同意立即開放。
  2. 已達開放權限電子全文僅授權使用者為學術研究之目的,進行個人非營利性質之檢索、閱讀、列印。
  3. 請遵守中華民國著作權法之相關規定,切勿任意重製、散佈、改作、轉貼、播送,以免觸法。

摘要(中) 隨著金融自由化與國際化的腳步,使得國內的金融業者除了面對彼此的激烈競爭外,還必須面臨走向國際金融市場,直接面對歐美先進國家銀行競爭的壓力。而網際網路的發展,可以提供企業與顧客進行線上交易的良好環境,使企業能夠結合資訊科技,創造新的行銷方式,用以降低企業的成本、及提供高效率的方式進行商業活動。目前大多數的研究多著重於網路銀行安全性之探討,較少以使用者的觀點來進行研究,但是在電子商務上,沒有顧客就沒有交易,所以確定目標市場是一個非常重要的議題。故本研究針對此重要議題,從「消費者」的角度,探討影響是否採用網路銀行的原因,其目的是希望可以藉由瞭解影響消費者採用網路銀行的原因,進而提供銀行業在擴展網路銀行時的策略建議。
本研究以「計畫行為理論」作為解釋消費者採用網路銀行行為意向的理論基礎。再由「創新擴散理論」、「科技接受模型」,探討「相對優勢」、「知覺易用性」、「相容性」對於消費者採用網路銀行「態度」的影響。及「計畫行為理論」中對控制信念的探討,將其解構為「自我效能」與「便利的狀態」,探討消費者在採用網路銀行時對「知覺行為控制」影響。
本研究設計以「問卷調查法」進行,共143位受測樣本。經實徵研究的結果發現,當消費者具有愈正向的「態度」與愈正向的「主觀規範」時,對其採用網路銀行的「行為意向」愈高。同時當消費者知覺到愈高的「相對優勢」與愈高的「相容性」時,對其採用網路銀行的「態度」愈正向,以及當消費者具有愈高的「自信心」與愈高的「便利的狀態」時,對其採用網路銀行的「知覺行為控制」愈高。
關鍵字(中) ★ 創新擴散理論
★  知覺風險
★  科技接受模型
★  網路銀行
★  計畫行為理論
關鍵字(英)
論文目次 目錄
目錄I
圖目錄III
表目錄IV
第一章緒論1
第一節研究背景1
第二節研究動機2
第三節研究目的3
第四節研究範圍3
第五節論文架構與研究程序3
第二章文獻探討6
第一節網路銀行6
第二節行為理論基礎10
第三節知覺風險20
第四節創新擴散理論22
第五節小結24
第三章研究模型與方法26
第一節研究模型26
第二節研究假說28
第三節變數定義與操作化39
第四節問卷設計45
第五節研究設計47
第六節資料分析方法48
第四章資料分析50
第一節樣本基本資料分析50
第二節效度與信度檢定52
第三節假說檢定56
第五章結論與建議63
第一節研究結果63
第二節管理實務建議65
第三節研究限制66
第四節未來研究建議67
參考文獻69
一、中文部分69
二、英文部分70
附錄一 試測問卷75
附錄二 正式問卷79
圖目錄
圖1-1 研究程序5
圖2-1 慎思行動理論11
圖2-2 計畫行為理論14
圖2-3 科技接受模型18
圖3-1 研究模型28
圖3-2 構念因素關係圖38
圖3-3 資料分析流程49
圖4-1 迴歸係數估計結果62
表目錄
表2-1 銀行各服務管道比較表9
表3-1 研究假說彙整 38
表3-2 變數操作化彙整44
表3-3 試測問卷之信度分析表47
表4-1 樣本資料來源 50
表4-2 樣本基本特性表51
表4-3 與「態度」相關的構念因素分析53
表4-4 與「知覺行為控制」相關的構念因素分析54
表4-5 「主觀規範」、「知覺風險」、「行為意向」構念因素分析 55
表4-6 本研究各構念信度56
表4-7 影響「行為意向」因素的複迴歸分析57
表4-8 影響「行為意向」各因素構面敘述統計分析58
表4-9 影響行為「態度」因素的複迴歸分析59
表4-10 影響「知覺行為控制」因素的複迴歸分析60
表4-11 研究假說檢定結果彙整表61
參考文獻 一、中文部分
1. 王存國,「資訊密度在組織特性與資訊科技角色間的中介性」,第八屆國際資訊管理學術研討會論文集,1997年5月。
2. 江怡慧、陳怡樺,「網路銀行使用者之行為分析」,產業金融,第107期,2000年6月,頁88-102。
3. 林名正,「網路銀行能為你做什麼?」,數位周刊,第33期,2001年4月,頁68-73。
4. 吳肇銘,「影響網站使用意向之因素研究─以入門網站為例」,國立中央大學資訊管理研究所未出版之博士論文,1999年。
5. 李怡菁,「等待型態與等待發生的時點對消費者行為影響之研究--以網路銀行為例」,國立中央大學資訊管理研究所未出版之碩士論文,1999年。

6. 周景弘,「網路銀行安全性對使用者知覺風險與使用意願之影響」,國立台灣大學會計學研究所未出版之碩士論文,1997年。

7. 徐蕙萍,「網路銀行之風險分析與安全控管」,財金資訊,2001年4月。
8. 黃智強,「影響採用網路購物因素之研究─以網路書店為例」,國立中央大學資訊管理研究所未出版之碩士論文,2000年。

9. 馮炫竣,「消費者使用電子銀行之行為研究--以ATM、電話銀行及網路銀行為例」,私立元智大學管理研究所未出版之碩士論文,2000年。

10. 楊國樞、文崇一、吳聰賢、李亦園,「社會及行為科學研究法」,東華,1997年。
11. 蔡佩鈴,「台灣高科技廠商使用網路銀行之相關因素研究」,國立交通大學經營管理研究所未出版之碩士論文,2000年。

12. 網際網路資訊情報中心,「蕃薯藤2000年台灣網路使用大調查結果出爐」,2001年,,Accessed June 1, 2001。
二、英文部分
1. Ajzen, Icek and Martin Fishbein (1980), Understanding Attitude and Predicting Social Behavior, Englewood Cliffs, N.J.: Prentice-Hall.
2. Ajzen, Icek (1985), “From Intention to Action: A Theory of Planned Behavior,” in Julius Kuhl and Jurgen Beckmann, ed., Action Control: From Cognition to Behavior, Heidelberg: Springer-Verlag.
3. Ajzen, Icek and Thomas J. Madden (1986), “Prediction of Goal-Directed Behavior: Attitude, Intention, and Perceived Behavioral Control,” Journal of Experimental Social Psychology, 22, p. 453-474.
4. Ajzen, Icek (1988), Attitudes, Personality, and Behavior, Chicago, IL: The Dorsey Press.
5. Ajzen, Icek (1991), “The Theory of Planned Behavior,” Organization Behavior and Human Decision Processes, 50, p. 179-211.
6. Bagozzi, Richard P. (1981), “Attitude, Intention, and Behavior: A Test of Some Key Hypotheses,” Journal of Personality and Social Psychology, 41, p. 607-627.
7. Bagozzi, Richard P. and Paul R. Warshaw (1990), “Trying to Consume,” Journal of Consumer Research, 17(2), p. 127-140.
8. Bagozzi, Richard P., Hans Baumgartner and Youjae Yi (1992), “State Versus Action Orientation and the Theory of Reasoned Action,” Journal of Consumer Research, 18(4), p. 505-528.
9. Bandura, Albert (1977), “Self-Efficacy: Toward a Unifying Theory of Behavioral Change,” Psychological Review, 84, p. 191-215.
10. Bandura, Albert (1982), “Self-Efficacy Mechanism in Human Agency,” American Psychologist, 37, p. 122-147.
11. Bauer, Raymond A. (1960), “Consumer Behavior as Risk Taking,” in R. S. Hancock, ed., Dynamic Marketing for a Changing World, Chicago: American Marketing Association, p. 389-393.
12. Busselle, Rick, Joey Reagan, Bruce Pinkleton and Kim Jackson (1999), “Factors Affecting Internet Use in a Saturated-Access Population,” Telematics and Informatics, 16(1-2), p. 45-58.
13. Compeau, Deborah R. and Christopher A. Higgins (1991), “A Social Cognitive Theory Perspective on Individual Reactions to Computing Technology,” in J. I. DeGross et al., eds., Proceeding of the 12th International Conference on Information Systems, New York, p. 187-198.
14. Compeau, Deborah R. and Christopher A. Higgins (1995), “Computer Self-Efficacy: Development of a Measure and Initial Test,” MIS Quarterly, 19(2), p. 189-211
15. Cooper, R. G. (1997), “Examining Some Myths About New Product Winners,” in Katz, R., ed., The Human Side of Managing Technological Innovation, Oxford, p. 550-560.
16. Cox, Donald F. ( 1967), “Risk Handling in Consumer Behavior — An Intensive Study of Two Cases,” in Donald F. Cox, ed., Risk Taking and Information Handling in Consumer Behavior, Boston: Harvard University Press, p. 34-81.
17. Coyne, Kevin P. and Renee Dye (1998), “The Competitive Dynamics of Network-Based Business,” Harvard Business Review, 76(1), p. 99-109.
18. Cunningham, S. M. (1967), “The Major Dimension of Perceived Risk,” in Donald F. Cox, ed., Risk Taking and Information Handling in Consumer Behavior, Boston: Harvard University Press, p. 82-108.
19. Davis, Fred D. (1986), A Technology Acceptance Model for Empirically Testing New End-User Information Systems: Theory and Results, Unpublished Ph. D. Dissertation, Sloan School of Management, MIT.
20. Davis, Fred D., Richard P. Bagozzi and Paul R. Warshaw (1989), “User Acceptance of Computer Technology: A Comparison of Two Theoretical Model,” Management Science, 35(8), p. 982-1003.
21. Davis, Fred D. (1989), “Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology,” MIS Quarterly, 13(3), p. 319-340.
22. DeLone, William H. and Ephraim R. McLean (1992), “Information Systems Success: The Quest for the Dependent Variable,” Information Systems Research, 3(1), p. 60-95.
23. Dowling, Grahame R. and Richard Staelin (1994), “A Model of Perceived Risk and Intended Risk-Handling Activity,” Journal of Consumer Research, 21(1), p. 119-134.
24. Eagly, Alice H. and Shelly Chaiken (1993), The Psychology of Attitude, NY: Harcourt, Brace, Jovonovich.
25. Evans, Philp B. and Thomas S. Wurster (1997), “Strategy and the New Economics of Information,” Harvard Business Review, 75(5), p. 71-82.
26. Fishbein, Martin and Icek Ajzen (1975), Belief, Attitude, Intention, and Behavior: An Introduction to Theory and Research, Reading, MA: Addison-Wesley.
27. Guseman, D. S. (1981), “Risk Perception and Risk Reduction in Consumer Services,” in J. M. Donnely and W. R. George, eds., in Proc., Chicago: American Marketing Association, p. 200-204.
28. Hair, Joseph F., Rolph E. A., Ronald L. T. and William C. B. (1995), Multivariate Data Analysis: Fourth Edition, Prentice-Hall.
29. Hamill, Jim (1997), “The Internet and International Marketing,” International Marketing Review, 14(5), p. 300-323.
30. Harrison, David A., Peter P. Mykytyn, Jr. and Cynthia K. Riemenschneider (1997), “Executive Decisions About Adoption of Information Technology in Small Business: Theory and Empirical Tests,” Information Systems Research, 8(2), p. 171-195.
31. Hawke, John D. Jr. (2001), “The Internet Impact,” Independent Banker, 51(3), p. 32-38.
32. Henderson, R., D. Rickwood and P. Roberts (1998), “The Beta Test of an Electronic Supermarket,” Interacting with Computers, 10(4), p. 385-399.
33. Hickman, Meredith (1999), “Internet Banking: Transaction to Active Selling,” Banks Systems and Technology, 36(10), p. s3, s14.
34. Jackson, Cynthia M., Simeon Chow and Robert A. Leitch (1997), “Toward an Understanding of the Behavioral Intention to Use an Information System,” Decision Science, 28(2), p. 357-389.
35. Jacoby, J. and Leon B. Kaplan (1972), “The Components of Perceived Risk,” in M. Venkatesan, ed., Proceedings of Third Annual Conference, Association for Consumer Research, p. 382-393.
36. Karahanna, Elena and Detmar W. Straub (1999), “The Psychological Origins of Perceived Usefulness and Ease-of-Use,” Information and Management, 35(4), p. 237-250.
37. Klobas, Jane E. (1995), “Beyond Information Quality: Fitness for Purpose and Electronic Information Resource Use,” Journal of Information Science, 21(2), p. 95-114.
38. Klobas, Jane E. and Laurel A. Clyde (2000), “Adults Learning to Use the Internet: A Longitudinal Study of Attitudes and Other Factors Associated with Intended Internet Use,” Library and Information Science Research, 22(1), p. 5-34.
39. Liao, Shaoyi, Yuan Pu Shao, Huaiqing Wang and Ada Chen (1999), “The Adoption of Virtual Banking: An Empirical Study,” International journal of Information Management, 19(1), p. 63-74.
40. Liker, Jeffrey K. and Ahmed A. Sindi (1997), “User Acceptance of Expert Systems: A Test of the Theory of Reasoned Action,” Journal of Engineering and Technology Management, 14(2), p. 147-173.
41. Lin, Judy Chuan-Chuan and Hsipeng Lu (2000), “Towards an Understanding of the Behavioral Intention to Use a Web Site,” International Journal of Information Management, 20(3), p. 197-208.
42. Mahan, James S. III (1996), “Banking on the Internet at Security First Network Bank,” Journal of Retail Banking Services, 18(3), p. 23-27.
43. Maignan, Isabelle and Bryan A. Lukas (1997), “The Nature and Social Uses of the Internet: A Qualitative Investigation,” The Journal of Consumer Affairs, 31(2), p. 346-371.
44. Mathieson, Kieran (1991), “Predicting User Intentions: Comparing the Technology Acceptance Model with the Theory of Planned Behavior,” Information Systems Research, 2(3), p. 173-191.
45. Mitchell, V. W. and M. Greatorex (1993), “Risk Perception and Reduction in the Purchase of Consumer Services,” The Service Industries Journal, 13(4), p. 179-200.
46. Moon, Ji-Won and Young-Gul Kim (2001), “Extending the TAM for a World-Wide-Web Context,” Information and Management, 38(4), p. 217-230.
47. Moore, Gary C. and Izak Benbasat (1991), “Developmetn of an Instrument to Measure the Perceptions of Adoption an Information Technology Innovation,” Information Systems Research, 2(3), p. 192-222.
48. Mykytyn, Peter P. and David A. Harrison (1993), “The Application of the Theory of Reasoned Action to Senior Management and Strategic Information Systems,” Information Resources Management Journal, 6(2), p. 15-26.
49. Rogers, Everett M. (1983), Diffusion of Innovations: Third Edition, New York: Free Press.
50. Rogers, Wendy A., D. Kristen Gilbert and Elizabeth Fraser (1997), “An Analysis of Automatic Teller Machine Usage by Older Adults: A Structured Interview Approach,” Applied Ergonomics, 28(3), p. 173-180.
51. Roselius, Ted (1971), “Consumer Rankings of Risk Reduction Methods,” Journal of Marketing, 35, p. 56-61.
52. Sathye, Milind (1999), “Adoption of Internet Banking by Australian Consumers: An Empirical Investigation,” International Journal of Bank Marketing, 17(7), p. 324-334.
53. Schwab, Donald P. (1980), “Construct Validity in Organizational Behavior,” in Barry M. Staw and Larry L. Cummings, eds., Research in Organizational Behavior, 2, p. 3-34.
54. Shimp, Terence A. and Alican Kavas (1984), “The Theory of Reasoned Action Applied to Coupon Usage,” Journal of Consumer Research, 11(3), p. 795-809.
55. Sneddon, Mark (1997), “Cyberbanking: Remote Banking Using the Internet,” Australian Business Law Review, 25(1), p. 64-67.
56. Swaminathan, Vanitha, Elzbieta Lepkowska-White and Bharat P. Rao (1999), “Browsers or Buyers in Cyberspace? An Investigation of Factors Influencing Electronic Exchange,” Journal of Computer-Mediated Communication, 5(2), , Accessed April 6, 2001.
57. Takacs, Scott J. and Jon B. Freiden (1998), “Changes on the Electronic Frontier: Growth and Opportunity of the World-Wide Web,” Journal of Marketing Theory and Practice, 16(3), p. 24-37.
58. Tan, Soo Jiuan (1999), “Strategies for Reducing Consumers’ Risk Aversion in Internet Shopping,” Journal of Consumer Marketing, 16(2), p. 163-180.
59. Taylor, Shirley and Peter A. Todd (1995a), “Decomposition and Crossover Effect in the Theory of Planned Behavior: A Study of Consumer Adoption Intentions,” International Journal of Research in Marketing, 12(2), p. 137-155.
60. Taylor, Shirley and Peter A. Todd (1995b), “Understanding Information Technology Usage: A Test of Competing Models,” Information System Research, 6(2), p. 144-177.
61. Teo, Thompson S. H., Vivien K. G. Lim and Raye Y. C. Lai (1999), “Intrinsic and extrinsic motivation in Internet usage,” Omega, 27(1), p. 25-37.
62. Thong, James Y. L. (1999), “An Integrated Model of Information Systems Adoption in Small Business,” Journal of Management Information Systems, 15(4), p. 187-214.
63. Triandis, Harry C. (1979), “Values, Attitudes, and Interpersonal Behavior,” in Nebraska Symposium on Motivation: Beliefs, Attitudes, and Values, University of Nebraska Press, Lincoln, NE, p, 195-259.
64. Venkatesh, Viswanath and Fred D. Davis (1996), “A Model of the Antecedents of Perceived Ease of Use: Development and Test,” Decision Sciences, 27(3), p. 451-481.
65. Weisul, Kimberly (1997), “Consultant Study Sees Big Future for On-Line Corporate Banking,” Investment Dealers Digest, 63(18), p. 15
指導教授 范錚強(Cheng-Kiang Farn) 審核日期 2001-7-11
推文 facebook   plurk   twitter   funp   google   live   udn   HD   myshare   reddit   netvibes   friend   youpush   delicious   baidu   
網路書籤 Google bookmarks   del.icio.us   hemidemi   myshare   

若有論文相關問題,請聯絡國立中央大學圖書館推廣服務組 TEL:(03)422-7151轉57407,或E-mail聯絡  - 隱私權政策聲明