博碩士論文 984203031 詳細資訊




以作者查詢圖書館館藏 以作者查詢臺灣博碩士 以作者查詢全國書目 勘誤回報 、線上人數:50 、訪客IP:18.226.181.54
姓名 李乾立(Chian-li Lee)  查詢紙本館藏   畢業系所 資訊管理學系
論文名稱 網路拍賣網站消費者使用隱私機制行為的前因探討
相關論文
★ 應用結構行動理論探討跨國企業導入供應鏈管理之個案研究-以資訊電子業為例★ 應用調適性結構行動理論探討ERP卅MES系統導入、轉移和整合之個案研究
★ LCD面板製造廠資訊系統商業價值之個案研究★ 應用調適性結構行動理論探討CIM系統的導入 -以TFT-LCD產業為例
★ ERP系統品質Enhancement的實徵研究★ 以資訊處理理論探討出貨管理系統在TFT-LCD產業的導入及影響之個案研究
★ 連接器供應商於中國大陸地區導入出貨管理系統之個案研究★ 以AHP法探討跨國企業評選固網供應商之決策準則
★ 工具機製造業導入協作式接單服務之探討--以沖床製造廠商為例★ 製造業導入先進規劃與排程系統之探討—以筆電領導廠商為例
★ 經銷商管理的再造-台灣知名飲料業的個案研究★ 運用精實六標準差手法改善資料品質─某TFT-LCD業者之個案研究
★ 第三方物流業者之設施規劃與方案評估-以C物流公司為例★ 期望和認知差異對ERP導入專案的影響-以B公司導入SAP為例
★ 使用者主導系統導入時資訊單位的角色-以W公司導入產品資料管理系統為例★ 運用限制理論探討F公司大型資訊服務專案執行之研究
檔案 [Endnote RIS 格式]    [Bibtex 格式]    [相關文章]   [文章引用]   [完整記錄]   [館藏目錄]   [檢視]  [下載]
  1. 本電子論文使用權限為同意立即開放。
  2. 已達開放權限電子全文僅授權使用者為學術研究之目的,進行個人非營利性質之檢索、閱讀、列印。
  3. 請遵守中華民國著作權法之相關規定,切勿任意重製、散佈、改作、轉貼、播送,以免觸法。

摘要(中) 在現今的社會中,電子商務的發展已經相當的成熟,而其中又以網路拍賣為世界上最普遍被使用的平台,但是網路交易不同於實體店鋪的交易,存在著買賣方的資訊不對稱以及信任的問題,因此發展出了回饋機制來彌補網路拍賣的缺陷。但是在這樣一個良好的機制底下,卻衍伸出了令人意想不到的問題,因為在買賣雙方經由回饋機制互相留下評價的同時,當次交易的許多內容都會被公開出來,像是商品名稱、商品價格等等的隱私資訊都會被一覽無遺。有鑑於此,拍賣平台推出了隱私保護機制這樣的線上服務來因應回饋機制所產生的問題,然而這樣的一個新的線上服務是否會被消費者採納,以及甚麼樣的情況下消費者會想啟用隱私保護機制成為本研究所關心的問題。
因此,本研究透過前人研究的理論,採用網頁內容探勘(Web Content Mining)的方式蒐集露天拍賣的交易資料,透過程式自動蒐集二十四種不同類別的商品交易資料,使用迴歸分析以及t檢定來討論消費者啟用隱私機制的前因。研究結果發現,對於不同種類的商品,消費者啟用隱私機制的情況也會有所差異,而高價商品相對於低價商品也有較高的啟用機率,其他買家啟用隱私機制的情況也會影響消費者是否啟用。
摘要(英) In today’’s society, e-commerce’s development is already quite mature. And the online auction is the most widely used platform. But trading on the internet is different from the physical store; there exist asymmetric information between buyer and seller. So the development of a feedback mechanism to compensate for defects in the online auction. However, under such a good mechanism also has some problem. Because when buyers and sellers use feedback mechanism and give evaluation for each other, many information of this transaction will be made public such as commodities’ names or commodities’ prices. For this reason, the auction platform launched online privacy protection services to solve feedback mechanism’s problems. But, dose this new online service accepted by consumers? In what situation does a consumer want to use privacy protection mechanisms? All above question will become issues of concern in this study.
Therefore, this study through the theory of previous studies and use Web content mining to collect transaction data. Through the program automatically collect twenty-four kinds of different categories of goods transactions data. Use regression analysis and t-test to discuss the reason of use privacy protection. The results showed that, for different types of goods, consumers also have different privacy of a mechanism for the difference. High price commodities have more opportunity to use privacy protection than the lower one. And other buyer use privacy protection will also affect the result.
關鍵字(中) ★ 實徵研究
★ 回饋機制
★ 隱私保護機制
★ 網路拍賣
關鍵字(英) ★ Empirical research
★ Feedback mechanism
★ Privacy protection mechanism
★ online auction
論文目次 目錄
摘要 iv
Abstract v
圖目錄 viii
表目錄 ix
第一章 緒論 1
1.1 研究背景及動機 1
1.2 研究目的與問題 3
第二章 文獻探討 6
2.1 網路拍賣的評價機制和其產生的隱私問題 6
2.2 拍賣平台的隱私保護機制 9
2.3 線上隱私 12
2.4 資料蒐集方法 12
第三章 研究方法 14
3.1 研究模型與假說推導 14
3.1.1 隱私機制啟用 14
3.1.2 網路購物的知覺風險 15
3.1.3 從眾效應 17
3.1.4 過去相關經驗 17
3.2 資料蒐集 18
3.2.1 資料來源 18
3.2.2 資料蒐集過程 19
3.2.3 資料蒐集範例 22
第四章 資料分析與討論 29
4.1 樣本資料 29
4.2 假說檢定 32
4.2.1 以商品種類為自變數 32
4.2.2 以商品價格為自變數 34
4.2.3 以其他買家啟用隱私機制為自變數 35
4.2.4 以買家經驗為自變數 36
4.3 小結 38
第五章 結論與建議 40
5.1 研究結果 40
5.2 研究結論 41
5.2.1 商品種類對於買家啟用隱私機制的影響 41
5.2.2 商品價格對於買家啟用隱私機制的影響 41
5.2.3 其他買家啟用隱私機制對於買家啟用隱私機制的影響 42
5.2.4 買家購買經驗對於買家啟用隱私機制的影響 42
5.3 研究貢獻 43
5.4 研究限制 44
5.4.1 樣本資料代表性的限制 44
5.4.2 研究設計上的限制 44
5.5 管理意涵與未來發展 44
5.5.1 管理意涵 45
5.5.2 未來研究方向 45
參考文獻 46
參考文獻 1. Akerlof, G. A., 1970. “The Market for "Lemons": Quality Uncertainty and the Market Mechanism,” Quarterly Journal of Economics, 84(3), pp. 488-500.
2. Ba, S. & Pavlou, P. A., 2002. “Evidence of the Effect of Trust Building Technology in Electronic Markets: Price Premiums and Buyer Behavior,” MIS Quarterly, 26(3), pp. 243-268.
3. Bapna, R., Goes, P., Gupta, A. & Jin, Y., 2004. “User Heterogeneity and Its Impact on Electronic Auction Market Design: An Empirical Exploration,” MIS Quarterly, 28(1), pp. 21-43.
4. Bauer, R.A., 1960. “Consumer Behavior as Risk Taking”. Risk Taking and Information Handling in Consumer Behavior, D. F. Cox., Harvard University Press, pp. 389-398.
5. Becker, G.S., 1991. “A note on restaurant pricing and other examples of social influences on price,” Journal of Political Economy, 90(5), pp.1109-1116.
6. Beach, L.R., 1993. “Broadening the definition of decision making: The role of prechoice screening of options” Psychological Science, 4(4), pp.215-220.
7. Bhatnagar, A., Misra, S., & Rao, H.R., 2000. “On Risk, Convenience, and Internet Shopping Behavior,"Communications of the ACM , 43(11), pp. 98-105.
8. Bickhchandani, S., Hirschleifer, D., & Welch, I., 1992. “A theory of fads, fashion, custom, and cultural change as informational cascades” Journal of Political Economy, 100(5), pp.992-1026.
9. Cooley, R., Mobasher, B. & Srivastava, J., 1997. “Web Mining: Information and Pattern Discovery on the World Wide Web,” Tools with Artificial Intelligence, 1997. Proceedings., Ninth IEEE International Conference on Tools with Artificial Intelligence, pp. 558-567.
10. Cummings, W. H. & Venkatesan, M., 1976.” Cognitive dissonance and consumer behavior: A review of the evidence,” Journal of Marketing Research, 13(3), pp. 303-308.
11. Cunningham, S., 1967. “The major dimensions of perceived risk,” In: D. Cox (Ed.), Risk Taking and Information Handling in Consumer Behavior. Harvard University Press, Cambridge, MA.
12. Davis, F., 1989. “Perceived usefulness, perceived ease of use, and user acceptance of information technology,” MIS Quarterly , 13, pp. 319–340.
13. Dellarocas, C., 2003. “The Digitization of Word-of-Mouth: Promise and Challenges of Online Feedback Mechanisms,” Management Science, 49(10), pp. 1407-1424.
14. Featherman, M. S., & Pavlou, P. A., 2003. “Predicting e-Services Adoption: A Perceived Risk Facets Perspective,” International Journal of Human-Computer Studies, (59) , pp. 451-474.
15. Festinger, L., 1957. “A Theory of Cognitive Dissonance,” Stanford University Press, Stanford, CA.
16. Forsythe, S. M., & Shi, Bo. 2003. “Consumer Patronage and Risk Perceptions in Internet Shopping,” Journal of Business Research, (56), pp. 867-875.
17. Gefen, D., Karahanna, E. & Straub, D. W., 2003. “Trust and TAM in Online Shopping: An Integrated Model,” MIS Quarterly, 27(1), pp. 51-90.
18. Gefen, D., & Straub, D., 2000. “The relative importance of perceived ease-of-use in IS adoption: a study of e-commerce adoption,” JAIS, 1(8), pp. 1–20.
19. Jarvenpaa, S. L., & Todd, P. A., 1996. “Consumer Reactions to Electronic Shopping on the World Wide Web,” International Journal of Electronic Commerce, 1(2), pp. 59-88.
20. Kauffman, R. J. & Wood, C.A., 2003. “Running Up the Bid: Detecting, Predicting, and Preventing Reserve Price Shilling in Online Auctions,” Proceedings of the 5th international conference on Electronic commerce. Pittsburgh, Pennsylvania: ACM, pp. 259-265.
21. Lim, N., 2003. “Consumers' Perceived Risk: Sources versus Consequences,"Electronic Commerce Research and Applications, (2), pp. 216-228.
22. Melnik, M. & Alm, J., 2002. “Does a Seller’s e-Commerce Reputation Matter? Evidence from eBay Auctions,” Journal of Industrial Economics, 50(3), pp. 337-349.
23. Milgrom, P. R., North, D. C. & Weingast, B. R., 1990. “The Role of Institutions in the Revival of Trade: The Law Merchant, Private Judges, and the Champagne Fairs,” Economics and Politics, 2(1), pp. 1-23.
24. Miyazaki, A. D., & Fernandez, Ana., 2001. “Consumer Perceptions of Privacy and Security Risks for Online Shopping,"Journal of Consumer Affair, 35(1), pp. 27-44.
25. Moon, J., & Kim, Y., 2001. “Extending the TAM for a world-wide-web context,” Information and Management, 28, pp.217–230.
26. Nadeau, R., Cloutier, E. & Guay, J., 1993. “New Evidence about the Existence of a Bandwagon Effect in the Opinion Formation Process,” International Political Science Review, 14(2), pp. 203-213.
27. Pavlou, P., 2001. “Integrating trust in electronic commerce with the technology acceptance model: model development and validation,” AMCIS Proceedings, Boston, MA.
28. Ruyter, Ko de, Wetzels, M., & Kleijnen, M., 2001. “Customer adoption of e-service: an experimental study,” International Journal of Service Industry Management, 12(2), pp. 184–207.
29. Taylor, S. & Todd, P., 1995. “Assessing IT usage: The role of prior experience.” MIS Quarterly, 25(1), pp. 561-570.
30. Yu, C. & Lin, S., 2008. “Parallel Crawling and Capturing for On-Line Auction,” Proceedings of the IEEE ISI 2008 PAISI, PACCF, and SOCO international workshops on Intelligence and Security Informatics, Taipei, Taiwan: Springer-Verlag, pp. 455-466.
31. Zanna, M. P. & Rempel, J. K., 1998. “Attitudes: A new look at and old concept,” In D. Bar-Tal & A. W. Kruglanski (eds.), Cambridge University Press.
網路資料
1. 網路消費史,網路拍賣資料全都露(2008)
http://www.richyli.com/report/2004_10_21_Bid_History.htm
指導教授 何靖遠(Chin-yuan Ho) 審核日期 2011-7-26
推文 facebook   plurk   twitter   funp   google   live   udn   HD   myshare   reddit   netvibes   friend   youpush   delicious   baidu   
網路書籤 Google bookmarks   del.icio.us   hemidemi   myshare   

若有論文相關問題,請聯絡國立中央大學圖書館推廣服務組 TEL:(03)422-7151轉57407,或E-mail聯絡  - 隱私權政策聲明