博碩士論文 105421040 詳細資訊




以作者查詢圖書館館藏 以作者查詢臺灣博碩士 以作者查詢全國書目 勘誤回報 、線上人數:62 、訪客IP:3.144.47.27
姓名 董妤柔(Yu-Jou Tung)  查詢紙本館藏   畢業系所 企業管理學系
論文名稱 影響行動支付行為意圖因素之探討
(Exploring Factors of Consumer Behavioral Intention toward Mobile Payment)
相關論文
★ 二氧化鈦技術生命週期之研究★ 整體後勤業參與同步工程於產品開發績效關係之研究—以中科院為例
★ 筆記型電腦之IFA/PIFA天線技術生命週期分析★ 國籍航空公司經營績效分析-以資料包絡分析方法分析
★ 從專利分析看3D IC技術與市場發展★ 影響企業導入電子發票系統成效之因素探討
★ 影響企業導入數位學習成功因素之探討-以個案公司為例★ 產品生命週期管理系統導入成功要素之探討--以S科技公司為例--
★ 組織創新能力影響因素研究★ 製 造 業 閒 置 資 產 轉 售 平 台 製造業閒置資產轉售平台-以廣達電腦股份有限公司為例
★ 供應商先行者優勢探討-以宸鴻科技為例★ 團隊領導者創新特質與開放式創新專案關係之研究
★ 從商業生態系統談樞紐者策略-以Apple 與Nokia 為例★ 個人電腦的競爭與發展策略-以台灣電子產業為例
★ 應用兩階段資料包絡分析法評估高級職業學校之經營績效★ ERP導入的促進因素:使用者觀點
檔案 [Endnote RIS 格式]    [Bibtex 格式]    [相關文章]   [文章引用]   [完整記錄]   [館藏目錄]   至系統瀏覽論文 ( 永不開放)
摘要(中) 隨著資訊科技的發展,全球的支付模式在近幾年產生了劇烈的變化,行動支付成為新形態的支付方式,然而相較於其他國家,行動支付在台灣仍不普及。本研究針對目前台灣消費者不願使用行動支付系統的兩大主因,沒轉換需求與安全性問題進行延伸。利用現狀偏好理論與資訊安全觀點作為關鍵的外部變量,並以慣性與信任作為中介變項,從眾行為作為干擾變項,探討這些因素對於消費者行為意圖之影響。
本研究使用網路問卷調查方式,以台灣地區的民眾作為研究對象,共回收 322 份有效問卷,並以結構方程模式進行假設驗證分析。研究結果顯示在現狀偏好理論中,損失厭惡對慣性有正向顯著的影響,而知覺控制對慣性有負向顯著的影響。資訊安全觀點中,機密性、完整性與可用性皆對信任有正向顯著的影響。此外,慣性對行為意圖有負向顯著的影響;信任對行為意圖有正向顯著的影響。最後,從眾行為對於信任與行為意圖之間的關係有顯著的調節效果。
摘要(英) With the advance of information technology, payment methods are dramatically changing in few decades. In addition, mobile payment becomes the newest and the most popular payment method. Many countries including China and Swedes have embraced mobile payment and enjoyed its convenience; however, it is not yet popular in Taiwan. Therefore, this study examines the reasons that Taiwanese consumer are unwilling to use mobile payment: lack of demand and security concerns. This study develops an explanatory model to explain how status quo bias theory and information security affect consumer behavioral intention toward mobile payment. Furthermore, this study uses trust and inertia as mediate factors and conformity as moderator factor.
This study collected responses from Taiwanese respondents and received 322 effective samples through internet questionnaires. Structural Equation Modeling (SEM) is applied to test the hypotheses of this study. The empirical results indicate the following points. First, in the aspect of status quo bias theory, loss aversion has significant positive effect on inertia, while perceived control has significant negative effect on inertia. Second, in the aspect of information security, confidentiality, integrity and availability have significant positive effect on trust. Third, inertia has significant negative effect but trust has significant positive effect on behavioral intention toward mobile payment. Finally, conformity only moderates between trust and behavioral intention toward mobile payment.
關鍵字(中) ★ 行動支付
★ 現狀偏好理論
★ 資訊安全
★ 信任
★ 慣性
★ 從眾行為
關鍵字(英)
論文目次 摘要 I
Abstract II
致謝 III
目次 IV
表目錄 VI
圖目錄 VII
第一章 緒論 1
第一節 研究背景與動機 1
第二節 研究目的 3
第三節 研究流程 4
第二章 文獻探討 5
第一節 行動支付 5
第二節 現狀偏好理論 7
第三節 慣性 10
第四節 資訊安全 12
第五節 信任 14
第六節 從眾行為 16
第三章 研究架構與研究設計 18
第一節 研究架構 18
第二節 研究假設 19
一、 現狀偏好理論與慣性之間的關係 19
二、 資訊安全與信任之間的關係 20
三、 慣性與行為意圖之間的關係 22
四、 信任與行為意圖之間的關係 22
五、 從眾行為的調節作用 23
第三節 研究變數操作型定義及問項設計 24
第四節 研究對象與資料來源 28
第五節 資料分析方法 28
一、 敘述性統計分析 28
二、 信度分析 29
三、 效度分析 29
四、 假設檢驗 30
第四章 實證分析與結果 33
第一節 敘述性統計 33
一、 樣本資料敘述統計 33
二、 研究變數敘述統計 35
第二節 模型信效度分析 37
一、 信度分析 37
二、 效度分析 38
第三節 結構模型路徑分析 41
一、 模型配適度檢定 41
二、 模型分析結果 42
三、 調節變數分析 44
第五章 結論與建議 45
第一節 研究討論 45
一、 現狀偏好理論對於慣性之影響 45
二、 資訊安全觀點對於信任之影響 46
三、 慣性和信任的中介效果 47
四、 從眾行為的調節效果 48
第二節 研究意涵 49
一、 理論面 49
二、 實務面 50
第三節 研究限制與後續建議 52
參考文獻 53
附錄一 問卷 67
參考文獻 中文文獻
財團法人資訊工業策進會(2018年2月21日)台灣人更黏手機了!近8成民眾每天使用手機逾2小時 資策會:掌握娛樂市場需求成下一波商機。檢自:https://www.iii.org.tw/Press/NewsDtl.aspx?nsp_sqno=2081&fm_sqno=14
財團法人資訊工業策進會(2017年5月1日)八成以上台灣人愛用Facebook、Line坐穩社群網站龍頭 1人平均擁4個社群帳號 年輕人更愛YouTube和IG。檢自:
https://www.iii.org.tw/Press/NewsDtl.aspx?nsp_sqno=1934&fm_sqno=14
科技產業資訊室(2017年10月18日)2017年近端行動支付市場規模接近580億美元。檢自:http://iknow.stpi.narl.org.tw/Post/Read.aspx?PostID=13871
資策會產業情報研究所(2017年2月9日)【行動支付消費者調查】80%消費者有意願使用行動支付。檢自:https://mic.iii.org.tw/IndustryObservations_PressRelease02.aspx?sqno=457
資策會產業情報研究所(2017年2月9日)【行動支付消費者調查】國人認知度已突破八成 NFC功能漸普及。檢自:https://mic.iii.org.tw/IndustryObservations_PressRelease02.aspx?sqno=456
資策會產業情報研究所(2018年1月12日)台灣行動支付消費者調查-用戶與非用戶分析。檢自:https://mic.iii.org.tw/aisp/ReportS.aspx?id=CDOC20180110002
資策會產業情報研究所(2018年1月12日)台灣行動支付消費者調查-整體消費者分析。檢自:https://mic.iii.org.tw/aisp/ReportS.aspx?id=CDOC20180110001
資策會產業情報研究所(2018年1月31日)【行動支付大調查一】近四成手機用戶曾使用行動支付 LINE Pay、Apple Pay認知度最高。檢自:https://mic.iii.org.tw/IndustryObservations_PressRelease02.aspx?sqno=486

英文文獻
Ajzen, I. (2002). Perceived behavioral control, self‐efficacy, locus of control, and the theory of planned behavior. Journal of applied social psychology, 32(4), 665-683.
Ajzen, I., & Fishbein, M. (1980). Understanding attitudes and predicting social behaviour.
Allen, V. L. (1965). Situational factors In conformity1. In Advances in experimental social psychology (Vol. 2, pp. 133-175). Academic Press.
Arvidsson, N. (2014). Consumer attitudes on mobile payment services–results from a proof of concept test. International Journal of Bank Marketing, 32(2), 150-170.
Asch, S. E., & Guetzkow, H. (1951). Effects of group pressure upon the modification and distortion of judgments. Groups, leadership, and men, 222-236.
Assael, H. (1998). Consumer behaviour and marketing action, Southwestern College Publishing, Ohio.
Au, Y. A., & Kauffman, R. J. (2008). The economics of mobile payments: Understanding stakeholder issues for an emerging financial technology application. Electronic Commerce Research and Applications, 7(2), 141-164.
Bagozzi, R. P., & Yi, Y. (1988). On the evaluation of structural equation models. Journal of the academy of marketing science, 16(1), 74-94.
Bandura, A. (Ed.). (1995). Self-efficacy in changing societies. Cambridge university press.
Bank for International Settlements. (2012). Innovations in Retail Payments. Report of the Working Group on Innovations in Retail Payments. Committee on Payment and Settlement Systems. Basel: BIS
Bawa, K. (1990). Modeling inertia and variety seeking tendencies in brand choice behavior. Marketing Science, 9(3), 263-278.
Bearden, W. O., Netemeyer, R. G., & Teel, J. E. (1989). Measurement of consumer susceptibility to interpersonal influence. Journal of consumer research, 15(4), 473-481.
Bentler, P. M. (1990). Comparative fit indexes in structural models. Psychological bulletin, 107(2), 238.
Bikhchandani, S., & Sharma, S. (2000). Herd behavior in financial markets. IMF Staff papers, 47(3), 279-310.
Bilgihan, A. (2016). Gen Y customer loyalty in online shopping: An integrated model of trust, user experience and branding. Computers in Human Behavior, 61, 103-113.
Bstieler, L., Hemmert, M., & Barczak, G. (2017). The changing bases of mutual trust formation in inter-organizational relationships: A dyadic study of university-industry research collaborations. Journal of Business Research, 74, 47-54.
Burger, J. M. (1989). Negative reactions to increases in perceived personal control. Journal of personality and social psychology, 56(2), 246.
Burnham, T. A., Frels, J. K., & Mahajan, V. (2003). Consumer switching costs: A typology, antecedents, and consequences. Journal of the Academy of marketing Science, 31(2), 109-126.
Campbell, J. D., & Fairey, P. J. (1989). Informational and normative routes to conformity: The effect of faction size as a function of norm extremity and attention to the stimulus. Journal of personality and social psychology, 57(3), 457.
Chandra, S., Srivastava, S. C., & Theng, Y. L. (2010). Evaluating the role of trust in consumer adoption of mobile payment systems: An empirical analysis. CAIS, 27(29), 27.
Chang, S., & Lin, C. S. (2007). Exploring organizational culture for information security management. Industrial Management & Data Systems, 107(3), 438-458.
Chellappa, R. K., & Pavlou, P. A. (2002). Perceived information security, financial liability and consumer trust in electronic commerce transactions. Logistics Information Management, 15(5/6), 358-368.
Chen, P. Y., & Hitt, L. M. (2002). Measuring switching costs and the determinants of customer retention in Internet-enabled businesses: A study of the online brokerage industry. Information systems research, 13(3), 255-274.
Chou, D. C., Yen, D. C., Lin, B., & Hong-Lam Cheng, P. (1999). Cyberspace security management. Industrial Management & Data Systems, 99(8), 353-361.
Dahlberg, T., Guo, J., & Ondrus, J. (2015). A critical review of mobile payment research. Electronic Commerce Research and Applications, 14(5), 265-284.
Dahlberg, T., Mallat, N., & Öörni, A. (2003). Trust enhanced technology acceptance modelconsumer acceptance of mobile payment solutions: Tentative evidence. Stockholm Mobility Roundtable, 22, 23.
Deutsch, M., & Gerard, H. B. (1955). A study of normative and informational social influences upon individual judgment. The journal of abnormal and social psychology, 51(3), 629.
Dhillon, G., & Backhouse, J. (2000). Technical opinion: Information system security management in the new millennium. Communications of the ACM, 43(7), 125-128.
Doll, W. J., Xia, W., & Torkzadeh, G. (1994). A confirmatory factor analysis of the end-user computing satisfaction instrument. MIS quarterly, 453-461.
Doney, P. M., & Cannon, J. P. (1997). An examination of the nature of trust in buyer-seller relationships. the Journal of Marketing, 35-51.
Dong, P., & Zhong, C. B. (2017). Witnessing moral violations increases conformity in consumption. Journal of Consumer Research, 44(4), 778-793.
Eastman, J. K., Iyer, R., Shepherd, C. D., Heugel, A., & Faulk, D. (2018). Do they shop to stand out or fit in? The luxury fashion purchase intentions of young adults. Psychology & Marketing, 35(3), 220-236.
Fan, J., Shao, M., Li, Y., & Huang, X. (2018). Understanding users’ attitude toward mobile payment use: A comparative study between China and the USA. Industrial Management & Data Systems, 118(3), 524-540.
Fan, Y. W., Chen, C. D., Wu, C. C., & Fang, Y. H. (2015). The effect of status quo bias on cloud system adoption. Journal of Computer Information Systems, 55(3), 55-64.
Fang, Y., Qureshi, I., Sun, H., McCole, P., Ramsey, E., & Lim, K. H. (2014). Trust, Satisfaction, and Online Repurchase Intention: The Moderating Role of Perceived Effectiveness of E-Commerce Institutional Mechanisms. Mis Quarterly, 38(2).
Flavián, C., Guinalíu, M., & Gurrea, R. (2006). The role played by perceived usability, satisfaction and consumer trust on website loyalty. Information & management, 43(1), 1-14.
Fornell, C., & Larcker, D. F. (1981). Structural equation models with unobservable variables and measurement error: Algebra and statistics. Journal of marketing research, 382-388.
Galinsky, A. D., Magee, J. C., Gruenfeld, D. H., Whitson, J. A., & Liljenquist, K. A. (2008). Power reduces the press of the situation: implications for creativity, conformity, and dissonance. Journal of personality and social psychology, 95(6), 1450.
Garbarino, E., & Johnson, M. S. (1999). The different roles of satisfaction, trust, and commitment in customer relationships. the Journal of Marketing, 70-87.
Gefen, D., & Straub, D. W. (2004). Consumer trust in B2C e-Commerce and the importance of social presence: experiments in e-Products and e-Services. Omega, 32(6), 407-424.
Gefen, D., Karahanna, E., & Straub, D. W. (2003). Trust and TAM in online shopping: An integrated model. MIS quarterly, 27(1), 51-90.
Gordon, L. A., Loeb, M. P., & Zhou, L. (2011). The impact of information security breaches: Has there been a downward shift in costs?. Journal of Computer Security, 19(1), 33-56.
Guilford, J. P. (1965). Fundamental Statistics in psychology and education 4th Ed.
Guo, J., & Bouwman, H. (2016). An analytical framework for an m-payment ecosystem: A merchants׳ perspective. Telecommunications Policy, 40(2-3), 147-167.
Hartono, E., Holsapple, C. W., Kim, K. Y., Na, K. S., & Simpson, J. T. (2014). Measuring perceived security in B2C electronic commerce website usage: A respecification and validation. Decision Support Systems, 62, 11-21.
Heap, T., & Pollari, I. (2018). FINTECH 100 - Leading Global Fintech Innovators Report 2017. Available from:
https://s3-ap-southeast-2.amazonaws.com/h2vc/static/reports/innovators/2017/H2-Fintech-Innovators-2017.pdf [Accessed 6th June 2018.].
Hosmer, L. T. (1995). Trust: The connecting link between organizational theory and philosophical ethics. Academy of management Review, 20(2), 379-403.
Hsieh, P. J. (2016). An empirical investigation of patients’ acceptance and resistance toward the health cloud: The dual factor perspective. Computers in Human Behavior, 63, 959-969.
Hu, L. T., & Bentler, P. M. (1999). Cutoff criteria for fit indexes in covariance structure analysis: Conventional criteria versus new alternatives. Structural equation modeling: a multidisciplinary journal, 6(1), 1-55.
Huang, D. L., Rau, P. L. P., Salvendy, G., Gao, F., & Zhou, J. (2011). Factors affecting perception of information security and their impacts on IT adoption and security practices. International Journal of Human-Computer Studies, 69(12), 870-883.
Huang, J. H., & Chen, Y. F. (2006). Herding in online product choice. Psychology & Marketing, 23(5), 413-428.
Huang, M. H., & Yu, S. (1999). Are consumers inherently or situationally brand loyal?—A set intercorrelation account for conscious brand loyalty and nonconscious inertia. Psychology & Marketing, 16(6), 523-544.
Hwang, R. J., Shiau, S. H., & Jan, D. F. (2007). A new mobile payment scheme for roaming services. Electronic Commerce Research and Applications, 6(2), 184-191.
Idrissou, L., van Paassen, A., Aarts, N., Vodouhè, S., & Leeuwis, C. (2013). Trust and hidden conflict in participatory natural resources management: The case of the Pendjari national park (PNP) in Benin. Forest Policy and Economics, 27, 65-74.
Inder, B., & O′Brien, T. (2003). The endowment effect and the role of uncertainty. Bulletin of Economic Research, 55(3), 289-301.
Jarvenpaa, S. L., Tractinsky, N., & Vitale, M. (2000). Consumer trust in an Internet store. Information technology and management, 1(1-2), 45-71.
Jiang, Y., Ho, Y. C., Yan, X., & Tan, Y. (2018). Investor Platform Choice: Herding, Platform Attributes, and Regulations. Journal of Management Information Systems, 35(1), 86-116.
Johnson, V. L., Kiser, A., Washington, R., & Torres, R. (2018). Limitations to the rapid adoption of M-payment services: Understanding the impact of privacy risk on M-Payment services. Computers in Human Behavior, 79, 111-122.
Jones, M. A., Mothersbaugh, D. L., & Beatty, S. E. (2002). Why customers stay: measuring the underlying dimensions of services switching costs and managing their differential strategic outcomes. Journal of business research, 55(6), 441-450.
Kahneman, D., & Tversky, A. (1979). Prospect Theory: An Analysis of Decision under Risk. Econometrica, 47(2), 263-292.
Kempf, A., & Ruenzi, S. (2006). Status quo bias and the number of alternatives: An empirical illustration from the mutual fund industry. The journal of behavioral finance, 7(4), 204-213.
Khalilzadeh, J., Ozturk, A. B., & Bilgihan, A. (2017). Security-related factors in extended UTAUT model for NFC based mobile payment in the restaurant industry. Computers in Human Behavior, 70, 460-474.
Khedhaouria, A., Thurik, R., Gurau, C., & van Heck, E. (2016). Customers′ continuance intention regarding mobile service providers: A status quo bias perspective. Journal of Global Information Management (JGIM), 24(4), 1-21.
Kim, C., Tao, W., Shin, N., & Kim, K. S. (2010). An empirical study of customers’ perceptions of security and trust in e-payment systems. Electronic commerce research and applications, 9(1), 84-95.
Kim, H. W. (2011). The effects of switching costs on user resistance to enterprise systems implementation. IEEE Transactions on Engineering management, 58(3), 471-482.
Kim, H. W., & Gupta, S. (2012). Investigating customer resistance to change in transaction relationship with an internet vendor. Psychology & Marketing, 29(4), 257-269.
Kim, H. W., & Kankanhalli, A. (2009). Investigating user resistance to information systems implementation: A status quo bias perspective. MIS quarterly, 567-582.
Kim, Y. A., & Phalak, R. (2012). A trust prediction framework in rating-based experience sharing social networks without a Web of Trust. Information Sciences, 191, 128-145.
Kolsaker, A., & Payne, C. (2002). Engendering trust in e-commerce: a study of gender-based concerns. Marketing Intelligence & Planning, 20(4), 206-214.
Koufaris, M., & Hampton-Sosa, W. (2004). The development of initial trust in an online company by new customers. Information & management, 41(3), 377-397.
KPMG (2018). The Pulse of Fintech Q4 2017. Available from: https://assets.kpmg.com/content/dam/kpmg/xx/pdf/2018/02/pulse_of_fintech_q4_2017.pdf [Accessed 6 June 2018].
Lascu, D. N., & Zinkhan, G. (1999). Consumer conformity: review and applications for marketing theory and practice. Journal of Marketing Theory and Practice, 7(3), 1-12.
Lee, M., & Lee, J. (2012). The impact of information security failure on customer behaviors: A study on a large-scale hacking incident on the internet. Information Systems Frontiers, 14(2), 375-393.
Lee, Y. C. (2006). An empirical investigation into factors influencing the adoption of an e-learning system. Online information review, 30(5), 517-541.
Leibenstein, H. (1950). Bandwagon, snob, and Veblen effects in the theory of consumers′ demand. The quarterly journal of economics, 64(2), 183-207.
Lending, D., & Straub, D. W. (1997). Impacts of an Integrated Information Center on faculty end‐users: A qualitative assessment. Journal of the Association for Information Science and Technology, 48(5), 466-471.
Li, C. Y., & Ku, Y. C. (2017). The power of a thumbs-up: Will e-commerce switch to social commerce?. Information & Management.
Li, J., Liu, M., & Liu, X. (2016). Why do employees resist knowledge management systems? An empirical study from the status quo bias and inertia perspectives. Computers in Human Behavior, 65, 189-200.
Linck, K., Pousttchi, K., & Wiedemann, D. G. (2006). Security issues in mobile payment from the customer viewpoint.
Liu, C., Marchewka, J. T., Lu, J., & Yu, C. S. (2005). Beyond concern—a privacy-trust-behavioral intention model of electronic commerce. Information & Management, 42(2), 289-304.
Lu, J., & Xie, X. (2014). To change or not to change: A matter of decision maker’s role. Organizational Behavior and Human Decision Processes, 124(1), 47-55.
Lu, Y., Yang, S., Chau, P. Y., & Cao, Y. (2011). Dynamics between the trust transfer process and intention to use mobile payment services: A cross-environment perspective. Information & Management, 48(8), 393-403.
Lucia-Palacios, L., Pérez-López, R., & Polo-Redondo, Y. (2016). Enemies of cloud services usage: inertia and switching costs. Service Business, 10(2), 447-467.
Mamonov, S., & Benbunan-Fich, R. (2018). The impact of information security threat awareness on privacy-protective behaviors. Computers in Human Behavior, 83, 32-44.
Mayer, R. C., Davis, J. H., & Schoorman, F. D. (1995). An integrative model of organizational trust. Academy of management review, 20(3), 709-734.
McKnight, D. H., Choudhury, V., & Kacmar, C. (2002). The impact of initial consumer trust on intentions to transact with a web site: a trust building model. The journal of strategic information systems, 11(3-4), 297-323.
McKnight, D. H., Choudhury, V., & Kacmar, C. (2002). Developing and validating trust measures for e-commerce: An integrative typology. Information systems research, 13(3), 334-359.
Moorman, C., Zaltman, G., & Deshpande, R. (1992). Relationships between providers and users of market research: The dynamics of trust within and between organizations. Journal of marketing research, 29(3), 314.
Morgan, R. M., & Hunt, S. D. (1994). The commitment-trust theory of relationship marketing. The journal of marketing, 20-38.
Nofsinger, J. R., & Sias, R. W. (1999). Herding and feedback trading by institutional and individual investors. The Journal of finance, 54(6), 2263-2295.
Nook, E. C., Ong, D. C., Morelli, S. A., Mitchell, J. P., & Zaki, J. (2016). Prosocial conformity: Prosocial norms generalize across behavior and empathy. Personality and Social Psychology Bulletin, 42(8), 1045-1062.
Nunnally, J. C., & Bernstein, I. H. (1978). Psychometric theory.
Oliveira, T., Thomas, M., Baptista, G., & Campos, F. (2016). Mobile payment: Understanding the determinants of customer adoption and intention to recommend the technology. Computers in Human Behavior, 61, 404-414.
Parker, D. B. (1997). The strategic values of information security in business. Computers & Security, 16(7), 572-582.
Pavlou, P. A. (2002). Institution-based trust in interorganizational exchange relationships: the role of online B2B marketplaces on trust formation. The Journal of Strategic Information Systems, 11(3-4), 215-243.
Pavlou, P. A., Liang, H., & Xue, Y. (2007). Understanding and mitigating uncertainty in online exchange relationships: A principal-agent perspective. MIS quarterly, 105-136.
Peng, H., Xu, X., & Liu, W. (2011). Drivers and barriers in the acceptance of mobile payment in China. Communications in Information Science and Management Engineering, 1(5), 73–78.
Polites, G. L., & Karahanna, E. (2012). Shackled to the status quo: the inhibiting effects of incumbent system habit, switching costs, and inertia on new system acceptance. MIS quarterly, 21-42.
Prince, J. T. (2011). Relating inertia and experience in technology markets: an analysis of households’ personal computer choices. Applied Economics, 43(29), 4501-4514.
Qasim, H., & Abu-Shanab, E. (2016). Drivers of mobile payment acceptance: The impact of network externalities. Information Systems Frontiers, 18(5), 1021-1034.
Ransbotham, S., Mitra, S., & Ramsey, J. (2012). Are markets for vulnerabilities effective?. Mis Quarterly, 43-64.
Ross, L., Bierbrauer, G., & Hoffman, S. (1976). The role of attribution processes in conformity and dissent: Revisiting the Asch situation. American Psychologist, 31(2), 148.
Rousseau, D. M., Sitkin, S. B., Burt, R. S., & Camerer, C. (1998). Not so different after all: A cross-discipline view of trust. Academy of management review, 23(3), 393-404.
Ryan, S. D., & Bordoloi, B. (1997). Evaluating security threats in mainframe and client/server environments. Information & Management, 32(3), 137-146.
Samuelson, W., & Zeckhauser, R. (1988). Status quo bias in decision making. Journal of risk and uncertainty, 1(1), 7-59.
Schierz, P. G., Schilke, O., & Wirtz, B. W. (2010). Understanding consumer acceptance of mobile payment services: An empirical analysis. Electronic commerce research and applications, 9(3), 209-216.
Schnackenberg, A. K., & Tomlinson, E. C. (2016). Organizational transparency: A new perspective on managing trust in organization-stakeholder relationships. Journal of Management, 42(7), 1784-1810.
Sharma, N., & Patterson, P. G. (2000). Switching costs, alternative attractiveness and experience as moderators of relationship commitment in professional, consumer services. International journal of service industry management, 11(5), 470-490.
Sherif, M. (1936). The psychology of social norms. New York: Harper.
Sirdeshmukh, D., Singh, J., & Sabol, B. (2002). Consumer trust, value, and loyalty in relational exchanges. Journal of marketing, 66(1), 15-37.
Skinner, E. A. (1996). A guide to constructs of control. Journal of personality and social psychology, 71(3), 549.
Stroborn, K., Heitmann, A., Leibold, K., & Frank, G. (2004). Internet payments in Germany: a classificatory framework and empirical evidence. Journal of Business Research, 57(12), 1431-1437.
Subashini, S., & Kavitha, V. (2011). A survey on security issues in service delivery models of cloud computing. Journal of network and computer applications, 34(1), 1-11.
Takabi, H., Joshi, J. B., & Ahn, G. J. (2010). Security and privacy challenges in cloud computing environments. IEEE Security & Privacy, 8(6), 24-31.
Tan, G. W. H., Ooi, K. B., Chong, S. C., & Hew, T. S. (2014). NFC mobile credit card: the next frontier of mobile payment?. Telematics and Informatics, 31(2), 292-307.
Taylor, S., & Todd, P. A. (1995). Understanding information technology usage: A test of competing models. Information systems research, 6(2), 144-176.
Tsao, W. C., Hsieh, M. T., Shih, L. W., & Lin, T. M. (2015). Compliance with eWOM: The influence of hotel reviews on booking intention from the perspective of consumer conformity. International Journal of Hospitality Management, 46, 99-111.
Tsiakis, T., & Sthephanides, G. (2005). The concept of security and trust in electronic payments. Computers & Security, 24(1), 10-15.
Vatanasombut, B., Igbaria, M., Stylianou, A. C., & Rodgers, W. (2008). Information systems continuance intention of web-based applications customers: The case of online banking. Information & Management, 45(7), 419-428.
Venkatesh, V., Thong, J. Y., & Xu, X. (2012). Consumer acceptance and use of information technology: extending the unified theory of acceptance and use of technology. MIS quarterly, 157-178.
Walter, A., Mueller, T. A., & Helfert, G. (2000, September). The impact of satisfaction, trust, and relationship value on commitment: Theoretical considerations and empirical results. In IMP Conference Proceedings (pp. 07-09). United Kingdom: Bath.
Wang, W. T., Wang, Y. S., & Liu, E. R. (2016). The stickiness intention of group-buying websites: The integration of the commitment–trust theory and e-commerce success model. Information & Management, 53(5), 625-642.
Wang, X., Yu, C., & Wei, Y. (2012). Social media peer communication and impacts on purchase intentions: A consumer socialization framework. Journal of interactive marketing, 26(4), 198-208.
Wang, Y. Y., Wang, Y. S., & Lin, T. C. (2018). Developing and validating a technology upgrade model. International Journal of Information Management, 38(1), 7-26.
Whitten, D., & Wakefield, R. L. (2006). Measuring switching costs in IT outsourcing services. The Journal of Strategic Information Systems, 15(3), 219-248.
Williams, M. (2001). In whom we trust: Group membership as an affective context for trust development. Academy of management review, 26(3), 377-396.
Wilkie, W. (1994). Consumer behavior, 3rd. New York.
Wu, C. C. (2016). Status quo bias in information system adoption: a meta-analytic review. Online Information Review, 40(7), 998-1017.
Yanamandram, V., & White, L. (2006). Switching barriers in business-to-business services: a qualitative study. International Journal of Service Industry Management, 17(2), 158-192.
Yanamandram, V., & White, L. (2010). Are inertia and calculative commitment distinct constructs? An empirical study in the financial services sector. International Journal of Bank Marketing, 28(7), 569-584.
Yao, J., Ma, C., & He, W. P. (2014). Investor herding behaviour of Chinese stock market. International Review of Economics & Finance, 29, 12-29.
Yayla, A. A., & Hu, Q. (2011). The impact of information security events on the stock value of firms: The effect of contingency factors. Journal of Information Technology, 26(1), 60-77.
Zafar, H., Ko, M. S., & Osei-Bryson, K. M. (2016). The value of the CIO in the top management team on performance in the case of information security breaches. Information Systems Frontiers, 18(6), 1205-1215.
Zeelenberg, M., & Pieters, R. (2004). Beyond valence in customer dissatisfaction: A review and new findings on behavioral responses to regret and disappointment in failed services. Journal of business Research, 57(4), 445-455.
Zhang, X., Guo, X., Wu, Y., Lai, K. H., & Vogel, D. (2017). Exploring the inhibitors of online health service use intention: A status quo bias perspective. Information & Management, 54(8), 987-997.
Zhou, T. (2011). The effect of initial trust on user adoption of mobile payment. Information Development, 27(4), 290-300.
指導教授 洪秀婉 審核日期 2018-6-29
推文 facebook   plurk   twitter   funp   google   live   udn   HD   myshare   reddit   netvibes   friend   youpush   delicious   baidu   
網路書籤 Google bookmarks   del.icio.us   hemidemi   myshare   

若有論文相關問題,請聯絡國立中央大學圖書館推廣服務組 TEL:(03)422-7151轉57407,或E-mail聯絡  - 隱私權政策聲明