博碩士論文 974403008 詳細資訊




以作者查詢圖書館館藏 以作者查詢臺灣博碩士 以作者查詢全國書目 勘誤回報 、線上人數:14 、訪客IP:3.22.216.30
姓名 方毓賢(Yu-Hsien Fang)  查詢紙本館藏   畢業系所 資訊管理學系
論文名稱 探討使用社群媒體轉發線上內容之意願
(A Study of the Intention of Forwarding Online Content with Social Media)
相關論文
★ 以個案研究法探討機械式組織之資訊系統導入★ 銀行企業內部網路導入TCP/IP通信協定之研究
★ 後金控時代臺灣地區金融服務業 薪資決策支援系統之設計研究 --以一家中型證券商為例★ 影響數位在職訓練之學習態度及行為意向研究
★ 台灣銀行業導入電子商務線上金流訊息標準之研究★ 國防訓儲軍士官制度評估
★ 以關係承諾角度探討組織中軟體專案開發之個案研究★ 企業工作流程再造之研究─以銀行發卡流程為例
★ 以個案研究法探討B2B電子商務導入之研究—以汽車售後服務件製造商為例★ 以個案研討方法探討公文簽核流程再造之研究- 以變更資訊部門服務為例
★ 醫療資訊系統之資訊安全危安因素探討以台北某醫學中心為例★ 資訊部門專案經理派遣人員之個案研究
★ 綠色供應鏈管理資訊系統導入問題分析與探討-以A公司為例★ 企業導入企業資源規劃(ERP)對作業流程之影響-以A公司為例
★ 客訴處理電子化流程管理-以飲料業為例★ 以個案研究法探討企業垃圾郵件防堵
檔案 [Endnote RIS 格式]    [Bibtex 格式]    [相關文章]   [文章引用]   [完整記錄]   [館藏目錄]   [檢視]  [下載]
  1. 本電子論文使用權限為同意立即開放。
  2. 已達開放權限電子全文僅授權使用者為學術研究之目的,進行個人非營利性質之檢索、閱讀、列印。
  3. 請遵守中華民國著作權法之相關規定,切勿任意重製、散佈、改作、轉貼、播送,以免觸法。

摘要(中) 為了幫助行銷人員了解如何有效運用社群媒體來創造行銷成效,本研究聚焦
於探討影響使用者採用社群媒體轉發線上內容之意願的相關因素。根據先前病毒行銷與社群媒體等相關的研究發現,本研究提出一個整合性的概念模型來探究:科技性認知(認知易用性、認知有用性、認知愉悅性、認知自我匿名性、認知他人匿名性)、人際需求(利他特質、公眾呈現特質)以及社會影響(社會認同感)等層面對於使用社群媒體轉發線上內容之意願所產生的影響。研究模型主要探討:(1)認知易用性、認知有用性、認知愉悅性、利他特質、公眾呈現特質、社會認同感對於轉發意願之影響,及(2)認知自我匿名性在公眾呈現特質與轉發意願之調節效果;認知他人匿名性在社會認同感與轉發意願之調節效果。本研究採用線上問卷調查的方式進行資料蒐集,共完成 528 份有效問卷。研究結果發現認知易用性、認知有用性、認知愉悅性以及利他特質對於轉發意願有正向且顯著的影響。然而,公開呈現特質與社會認同感對於轉發意願沒有顯著的影響。認知自我匿名性與認知他人匿名性則沒有顯著的調節效果。最後,本研究對於分析結果進行探討並提出理論與實務意涵作為結論。
摘要(英) To help marketers understand how to effectively harness social media to create marketing effectiveness, this study aims to investigate factors determining users’ intentions to forward online content with social media. Drawing on insights from prior viral marketing and social media research, an integrative conceptual model is proposed for exploring the influences of three different aspects on forwarding intention, in terms of technological perceptions (perceived ease of use, perceived usefulness, perceived enjoyment, perceived anonymity of self, perceived anonymity of others), interpersonal needs (altruism, public individuation), and social influences (social identity). The research model aims to explore: (1) the impact of perceived ease of use, perceived usefulness, perceived enjoyment, altruism, public individuation and social identity on the forwarding intention, and (2) the moderating effect of perceived anonymity of self on the relationship between public individuation and forwarding intention; the moderating effect of perceived anonymity of others on the relationship between social identity and forwarding intention. An online survey is conducted to collect 528 valid questionnaires. It is found that perceived ease of use, perceived usefulness, perceived enjoyment and altruism have positive and significant influence on the forwarding intention. However, public individuation and social identity have insignificant impacts on the forwarding intention. Perceived anonymity of self and perceived anonymity of others have no moderating effect on the proposed relationships. This study concludes by discussing the analytic results and proposing theoretical and practical implications.
關鍵字(中) ★ 線上內容轉發意願
★ 科技接受模式
★ 認知匿名性
★ 利他特質
★ 公眾呈現特質
★ 社會認同感
★ 社群媒體
關鍵字(英) ★ Intention of Forwarding Online Content
★ Technology Acceptance Model
★ Perceived Anonymity
★ Altruism
★ Public Individuation
★ Social Identity
★ Social Media
論文目次 中文摘要 ........................................................................................................................ i
Abstract ......................................................................................................................... ii
誌謝 .............................................................................................................................. iii
Content ......................................................................................................................... iv
List of Tables .................................................................................................................. v
List of Figures .............................................................................................................. vi
1. Introduction ............................................................................................................ 1
1-1 Background and Motivation ............................................................................ 1
1-2 Research Questions and Objectives ................................................................. 4
2. Literature Review ................................................................................................... 8
2-1 Previous Empirical Literature on Viral Marketing .......................................... 8
2-2 Social Media and Its Forward Mechanism .................................................... 16
2-3 Technological Perceptions ............................................................................. 24
2-4 Motivations and Influences of Social Interaction .......................................... 34
3. Research Methodology......................................................................................... 43
3-1 Conceptual Model and Hypotheses ............................................................... 43
3-2 Measurement Development ........................................................................... 57
3-3 Sample and Data Collection .......................................................................... 65
3-4 Analytic Strategy for Assessing the Research Model .................................... 70
4. Data Analysis and Results .................................................................................... 72
4-1 Analysis of Reliability and Validity ............................................................... 72
4-2 Assessment of Multivariate Normality .......................................................... 75
4-3 Assessment of the Common Method Bias ..................................................... 76
4-4 Analysis of the Structural Model ................................................................... 77
4-5 Analysis of the Moderating Effects ............................................................... 79
5. Conclusion and Implications ................................................................................ 83
5-1 Findings and Discussions .............................................................................. 83
5-2 Implications ................................................................................................... 89
5-3 Limitations and Future Research ................................................................... 92
Reference...................................................................................................................... 95
Appendix 1. Questionnaire ........................................................................................ 109
Appendix 2. Analysis of Non-Response Bias ............................................................ 117
Appendix 3. Statistics of Construct Items .................................................................. 118
Appendix 4. Assessment of Multivariate Normality .................................................. 119
參考文獻 〔1〕 Abedniya, A. and Mahmouei, S.S. 2010. “The impact of social networking websites to facilitate the effectiveness of viral marketing,” International Journal of Advanced Computer Science and Applications (1:6), pp. 139-146.
〔2〕 Adams, D. A. and Nelson, R. R. 1992. “Perceived usefulness, ease of use, and usage of information technology: a replication,” MIS Quarterly (16:2), pp. 227-247.
〔3〕 Ajzen, I. 1985. “From intentions to action: A theory of planned behavior,” in J. Kuhl, J. Beckmann (Eds.), Action Control: Form Cognition to Behavior, Springer Veriag, New York, pp. 11-39.
〔4〕 Ajzen, I. 1991. “The theory of planned behavior,” Organization Behavior and Human Decision Processes (50:2), pp. 179-211.
〔5〕 Anandarajan, M., Zaman, M., Dai, Q. and Arinze, B. 2010. “Generation Y adoption of instant messaging: An examination of the impact of social usefulness and media richness on use richness,” IEEE Transactions on Professional Communication (53:2), pp. 132-143.
〔6〕 Anderson, J. C. and Gerbing, D. W. 1988. “Structural equation modeling in practice: A review and recommended two step approach,” Psychological Bulletin, (103:3), pp. 411-423.
〔7〕 Aral, S. and Walker, D. 2011. “Creating social contagion through viral product design: A randomized trial of peer influence in networks,” Management Science (57:9), pp. 1623-1639.
〔8〕 Armstrong, J. S. and Overton, T. S. 1977, “Estimating non-response bias in mail surveys”, Journal of Marketing Research (14:3), pp. 396-402.
〔9〕 Arndt, J. 1967. “Role of product-related conversations in the diffusion of a new product,” Journal of Marketing Research (4:3), pp. 291-295.
〔10〕 Bagozzi, R. P. and Dholakia, U. M. 2002. “Intentional social action in virtual communities,” Journal of Interactive Marketing (16:2), pp. 2-21.
〔11〕 Barnes, N. and Lescault, A. 2011. “The 2011 Inc. 500 social media update: blogging declines as newer tools rule,” Available at http://www.umassd.edu/cmr/studiesresearch/blogstudy5.pdf (access date: 22 March, 2015).
〔12〕 Baron, R.M. and Kenny, D.A. 1986. “The moderator-mediator variable distinction in social psychological research: Conceptual, strategic, and statistical considerations,” Journal of Personality and Social Psychology (51:6), pp. 1173-1182.
〔13〕 Berthon, P. R., Pitt, L. F., Plangger, K. and Shapiro, D. 2012. “Marketing meets Web 2.0, social media, and creative consumers: implications for international marketing strategy,” Business Horizons (55:3), pp. 261-271.
〔14〕 Bollen, K.A. 1989. Structural Equations with Latent Variables, Wiley-Interscience, New York, NY.
〔15〕 Browne, M. W., and Cudeck, R. 1992. “Alternative ways of assessing model fit,” Sociological Methods Research (21:2), pp. 230-258.
〔16〕 Buffardi, L. E. and Campbell, W. K. 2008. “Narcissism and social networking web sites,” Personality and Social Psychology Bulletin (34:10), pp. 1303-1314.
〔17〕 Chan, K. K. and Misra, S. 1990. “Characteristics of the opinion leader: A new dimension,” Journal of Advertising (19:3), pp. 53-60.
〔18〕 Chang, C.C., Hung, S.W., Cheng, M.J. and Wu, C.Y. 2014. “Exploring the intention to continue using social networking sites: The case of Facebook,” Technology Forecasting & Social Change (In Press), Available online 9 May 2014.
〔19〕 Chang, H.H. and Chung, S.S. 2011. “Social capital and individual motivations on knowledge sharing: participant involvement as a moderator,” Information & Management (48:1), pp. 9-18.
〔20〕 Cheung, C. M. K. and Lee, M. K. O. 2010. “A theoretical model of intentional social action in online social networks,” Decision Support System (49:1), pp. 24-30.
〔21〕 Cheung, C. M. K., Chiu, P.Y. and Lee, M. K. O. 2011. “Online social networks: Why do students use facebook?” Computer in Human Behavior (27:4), pp.1337-1343.
〔22〕 Chiu, H.C., Hsieh, Y.C., Kao, Y.H. and Lee, M. 2007. “The determinants of email receivers’ disseminating behaviors on the Internet,” Journal of Advertising Research (47:4), pp. 524-534.
〔23〕 Cho, H., Chen, M. H. and Chung, S. 2010. “Testing an integrative theoretical model of knowledge sharing behavior in the context of Wikipedia,” Journal of the American Society for Information Science and Technology (61:6), pp. 1198-1212.
〔24〕 Choi, M., Panek, E. T., Nardis, Y. and Toma, C. L. 2015. “When social media isn’t social: Friends’ responsiveness to narcissists on Facebook,” Personality and Individual Differences (77), pp.209-214.
〔25〕 Colliander, J. and Dahlén, M. 2011. “Following the fashionable friend: the power of social media,” Journal of Advertising Research (51:1), pp. 313–320.
〔26〕 Cortina, J. M. 1993. “Interaction, nonlinearity, and multicollinearity: Implications for multiple regression,” Journal of Management (19:4), pp.915-922.
〔27〕 Cress, U. (2005). “Ambivalent effect of member portraits in virtual groups,” Journal of Computer Assisted Learning, (21:4), pp. 281-291.
〔28〕 Datta, P., Chowdhury, D. and Chakraborty, B. 2005. “Viral marketing: new form of word of mouth through Internet,” The Business Review (3:2), pp. 69-75.
〔29〕 Davis, F. D. 1989. “Perceived usefulness, perceived ease of use, and user acceptance of information technology,” MIS Quarterly (13:3), pp. 319-340.
〔30〕 Davis, F. D., Bagozzi, R. P. and Warshaw, P. R. 1989. “User acceptance of computer technology: A comparison of two theoretical models,” Management Science (35:8), pp. 982-1003.
〔31〕 Davis, F. D., Bagozzi, R. P. and Warshaw, P. R. 1992. “Extrinsic and intrinsic motivations to use computer in the workplace,” Journal of Applied Social Psychology (22:14), pp. 1111-1132.
〔32〕 Deci, E. L. and Ryan, R. M. 2002. Handbook of Self-Determination, Rochester, NY: University of Rochester Press.
〔33〕 Dholakia, U. M., Bagozzi, R. P. and Pearo, L. K. 2004. “A social influence model of consumer participation in network- and small-group-based virtual communities,” International Journal of Research in Marketing (21:30), pp. 21-263.
〔34〕 Dichter, E. 1966. “How word-of-mouth advertising works,” Harvard Business Review (44:6), pp. 147-166.
〔35〕 Dickinger, A., Arami, M. and Meyer, D. 2008. “The role of perceived enjoyment and social norm in the adoption of technology with network externalities,” European Journal of Information Systems (17:1), pp. 4-11.
〔36〕 Dishaw, M. T. and strong, D. M. 1999. “Extending the technology acceptance model with task-technology fit constructs,” Information & Management (36:1), pp. 9-21.
〔37〕 Dobele, A., Toleman, D. and Beverland, M. 2005. “Controlled infection! Spreading the brand message through viral marketing,” Business Horizons (48:2), pp. 143-149.
〔38〕 Ellemers, N., Kortekaas, P. and Ouwerkerk, J.W. 1999. “Self-categorization, commitment to the group and group self-esteem as related but distinct aspects of social identity,” European Journal of Social Psychology (29:2-3), pp. 371-389.
〔39〕 Ellison, N. B., Steinfield, C. and Lampe, C. 2007. “The benefits of Facebook ‘friends’: Social capital and college students’ use of online social network sites,” Journal of Computer-Mediated Communication (12:4), pp. 1143-1168.
〔40〕 Fishbein, M. and Ajzen, I. 1975. Belief, Attitude, Intentions and Behavior: An Introduction to Theory and Research, Reading MA: Addison-Wesley.
〔41〕 Fornell, C., and Larcker, D. F. 1981. “Evaluating structural equation models with unobservable variables and measurement error,” Journal of Marketing Research (18:1), pp. 39-50.
〔42〕 Fox, J. and Rooney, M. C. 2015. “The Dark Triad and trait self-objectification as predictors of men’s use and self-presentation behaviors on social networking sites,” Personality and Individual Differences (76), pp. 161-165.
〔43〕 Gau, D. H., Cheng, H. F., Chiang, C. T. and Yang, M. H. 2014. “Factors affecting the intention of message forwarding in the social networking sites,” Journal of Information Management (21:4), pp. 365-390.
〔44〕 Gavish, B. and Gerdes Jr., J. H. 1998. “Anonymous mechanisms in group decision support systems communication,” Decision Support Systems (23:4), pp. 297-328.
〔45〕 Godes, D., Mayzlin, D., Chen, Y., Das, S., Dellarocas, C., Pfeiffer, B., Libai, B., Sen, S., Shi, M. and Verleghl, P. 2005. “The firm’s management of social interactions,” Marketing Letters (16:3-4), pp. 415-428.
〔46〕 Hair, J., Black, W., Babin, B., and Anderson, R. 2010. Multivariate Data Analysis (7th ed.): Prentice-Hall, Inc. Upper Saddle River, NJ, USA.
〔47〕 Hendrickson, A. R. and Collins, M. R. 1996. “An assessment of structure and causation of IS usage,” The DATA BASE for Advances in Information Systems (27:2), pp. 61-67.
〔48〕 Hennig-Thurau, T., Gwinner, K.P., Walsh, G. and Gremler, D.D. 2004. “Electronic word-of-mouth via consumer-opinion platforms: What motivates consumers to articulate themselves on the internet,” Journal of Interactive Marketing (18:1), pp. 38-52.
〔49〕 Hinz, O., Skiera, B., Barrot, C. and Becker, J. U. 2011. “Seeding strategies for viral marketing: an empirical comparison,” Journal of Marketing (75:6), pp. 55-71.
〔50〕 Hite, D. M., Voelker, T. and Rober, A. 2014. “Measuring perceived anonymity: The development of as context independent instrument,” Journal of Methods and Measurement in the Social Sciences (5:1), pp. 22-39.
〔51〕 Ho, J. Y.C. and Dempsey, M. 2010. “Viral marketing: motivations to forward online content,” Journal of Business Research (63:9-10), pp. 1000-1006.
〔52〕 Hogg, M. A. and Abrams, D. 1990. Social Identifications: A Social Psychology of Intergroup Relations and Group Processes, London, Routledge.
〔53〕 Hsu, C.-L. and Lin, C.-C. 2008. “Acceptance of blog usage: The roles of technology acceptance, social influence and knowledge sharing motivations,” Information & Management (45:1), pp. 65-74.
〔54〕 Huang, Z. and Benyoucef, M. 2013. “From e-commerce to social commerce: A close look at design features,” Electronic Commerce Research and Applications (12:4), pp. 246-259.
〔55〕 Ip, R.K.F. and Wagner, C. 2008. “Weblogging: A study of social computing and its impact on
organizations,” Decision Support Systems (45:2), pp. 242-250.
〔56〕 Ispareh, M. and Ladani, B. T. 2009. “A conceptual framework for specification, analysis, and design of anonymity services,” in Proceedings of the 2009 EDBT/ICDT Workshops, Saint-Petersburg, Russia, 23-26 March, pp. 131-138.
〔57〕 Jiang, Z., Heng, C. S. and Choi, B. C. F. 2013. “Privacy concerns and privacy-protective behavior in synchronous online social interactions,” Information System Research (24:3), pp. 579-595.
〔58〕 Kaikati, A., and, Kaikati, J. 2004. “Stealth marketing: How to reach consumers surreptitiously,” California Management Review (46:4), pp.6-22.
〔59〕 Kaplan, A. M. and Haenlein, M. 2010. “Users of the world, united! The challenges and opportunities of social media,” Business Horizons (53:1), pp. 59-68.
〔60〕 Kelman, H. C. 1958. “Compliance, identification, and internalization three processes of attitude change,” The Journal of Conflict Resolution (2:1), pp. 51-60.
〔61〕 Kietzman, J. H., Hermkens, K., McCarthy, I. P. and Silvestre, B. S. 2011. “Social media? Get serious! Understanding the functional building blocks of social media,” Business Horizons (54:3), pp.241-251.
〔62〕 Kline, R. B. 1998. Principles and Practices of Structural Equation Modeling. New York: Guilford Press.
〔63〕 Koo, C., Wati, Y., and Jung, J. J. 2011. “Examination of how social aspects moderate the relationship between task characteristics and usage of social communication technologies (SCTs),” International Journal of Information Management (31:5), pp. 445-459.
〔64〕 Korsgaard, M.A. and Roberson, L. 1995. “Procedural justice in performance evaluation: The role of instrumental and non-instrumental voice in performance appraisal discussions,” Journal of Management (21:4), pp. 657-669.
〔65〕 Kwon, O. and Wen, Y. 2010. “An empirical study of the factors affecting social network service use,” Computers in Human Behavior (26:2), pp. 254-263.
〔66〕 Lamb, R. and Kling, R. 2003. “Reconceptualizing users as social actors in information systems research,” MIS Quarterly (27:2), pp. 197-235
〔67〕 Lampe, C., Ellison, N. and Steinfield, C. 2007. “A familiar face(book): Profile elements as signals in an online social network,” in Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, San Jose, California, USA, 28 April - 3 May, pp. 435-444.
〔68〕 Larson, R. J. 2009. “The rise of viral marketing through the new media of social media,” Available at: http://works.bepress.com/rebecca_lingley/2 (access date: 22 March, 2015).
〔69〕 Lee, C. S. and Ma, L. 2012. “News sharing in social media: The effect of uses and gratifications and prior experience,” Computer in Human Behavior (28:2), pp. 331-339.
〔70〕 Lee, E.-J. and Jang, J.-W. 2010. “Profiling good Samaritans in online knowledge forums: Effects of affiliative tendency, self-esteem, and public individuation on knowledge sharing,” Computers in Human Behavior (26:6), pp. 1336-1344.
〔71〕 Lee, J., Lee J.-H. and Lee, D. 2009. “Impacts of tie characteristics on online viral diffusion,” Communications of the Association for Information Systems (24), pp. 545-546.
〔72〕 Li, J. and Zhan, L. J. 2011. “Online persuasion: How the written word drives WOM evidence from consumer-generated product reviews,” Journal of Advertising Research (51:1), pp. 239-257.
〔73〕 Li, X. 2011. “Factors influencing the willingness to contribute information to online communities,” New Media & Society (13:2), pp. 279-296.
〔74〕 Liang, H., Saraf, N., Hu, Q. and Xue, Y. 2007. “Assimilation of enterprise systems: The effect of institutional pressures and the mediating role of top management,” MIS Quarterly (31:1), pp. 59-87.
〔75〕 Lin, H.-F. 2007. “Effects of extrinsic and intrinsic motivation on employee knowledge sharing intentions,” Journal of Information Science (33:2), pp. 135-149.
〔76〕 Lin, K.-Y. and Lu, H.-P. 2011. “Why people use social networking sites: An empirical study integrating network externalities and motivation theory,” Computer in Human Behavior (27:3), pp. 1152-1161.
〔77〕 Lin, K.-Y. and Lu, H.-P. 2015. “Predicting mobile social network acceptance based on mobile value and social influence,” Internet Research (25:1), pp. 107-130.
〔78〕 Liu, S.-H., Chou, C.-H. and Liao, H.-L. 2015 “An exploratory study of product placement in social media,” Internet Research (25:2), pp. 300-316.
〔79〕 Mardia, K. V. and Foster, K. 1983. “Omnibus test of multi-normality base on skewness and kurtosis,” Communication in Statistics (12:2), pp. 207-221.
〔80〕 Maslach, C., Stapp, J. and Santee, R. T. 1985. “Individuation: Conceptual analysis and assessment,” Journal of Personality and Social Psychology (49:3), pp. 729-738.
〔81〕 Montgomery, A. L. 2001. “Applying quantitative marketing techniques to the Internet,” Interfaces (31:2), pp. 90-108.
〔82〕 Moon J.-W. and Kim, Y.-G. 2001. “Extending the TAM for a World-Wide-Web context,” Information & Management (38:4), pp.217-230.
〔83〕 Mühlenfeld, H. U. 2005. “Differences between ‘talking about’ and ‘admitting’ sensitive behavior in anonymous and non-anonymous we-based interviews,” Computers in Human Behavior (21:6), pp. 993-1003.
〔84〕 Ngai, E. W.T., Tao, S. S.C. and Moon, K. K.L. 2015. “Social media research: Theories, constructs, and conceptual frameworks,” International Journal of Information Management (35:1), pp. 33-44.
〔85〕 Nissenbaum, H. 1999. “The meaning of anonymity in an information age,” The Information Society (15:2), pp. 141-144.
〔86〕 Osatuyi, B. 2013. “Information sharing on social media sites,” Computers in Human Behavior (29:6), pp. 2622-2631.
〔87〕 Palka, W., Pousttchi, K. and Wiedemann, D. G. 2009. “Mobile word-of-mouth – A grounded theory of mobile viral marketing,” Journal of Information Technology (24:2), pp. 172-185.
〔88〕 Papadopoulos, T., Stamati, T. and Nopparuch, P. 2013. “Exploring the determinants of knowledge sharing via employee weblogs,” International Journal of Information Management (33:1), pp. 133-146.
〔89〕 Park, J. H., Gu, B., Leung, A. C. M. and Konana, P. 2014. “An investigation of information sharing and seeking behaviors in online investment communities,” Computer in Human Behavior (31:Febuary), pp. 1-12.
〔90〕 Pescher, C., Reichhart, P. and Spann, M. 2014. “Consumer decision-making process in mobile viral marketing campaigns,” Journal of Interactive Marketing (28:1), pp. 43-54.
〔91〕 Pi, S.-M., Chou, C.-H. and Liao, H.-L. 2013. “A study of Facebook Groups members’ knowledge sharing,” Computers in Human Behavior (29:5), pp. 1971-1979.
〔92〕 Pinsonneault, A.and Heppel, N. 1997. “Anonymity in group support systems research: A new conceptualization, measure, and contingency framework,” Journal of Management Information Systems (14:3), pp. 89-108.
〔93〕 Podsakoff, P., MacKenzie, S., Lee, J., and Podsakoff, N. 2003. “Common method biases in behavioral research: A critical review of the literature and recommended remedies,” Journal of Applied Psychology (88:5), pp. 879-903.
〔94〕 Podsakoff, P. and Organ, D. 1986. “Self-reports in organizational research: Problems and prospects,” Journal of Management (12:4), pp. 531-544.
〔95〕 Postmes, T., Spears, R., Sakhel, K. and de Groot, D. 2001. “Social influence in computer-mediated communication: the effects of anonymity on group behavior,” Personality and Social Psychology Bulletin (27:10), pp. 1243-1254.
〔96〕 Price L. L., Feick, L. F. and Guskey, A. 1995. “Everyday market helping behavior,” Journal of Public Policy & Marketing (14:2), pp. 255-266.
〔97〕 Reinig, B. A. and Mejias, R. J. 2004. “The effects of national culture and anonymity on flaming and criticalness in GSS-supported discussions,” Small Group Research (35:6), pp. 698-723.
〔98〕 Schulze, C., Schöler, L. and Skiera, B. 2014. “Not all fun and games: viral marketing for utilitarian products,” Journal of Marketing (78:1), pp. 1-19.
〔99〕 Schutz, W. C. 1966. FIRO: A Three Dimensional Theory of Interpersonal Behavior, New York: Holt, Rinehart, & Winston.
〔100〕 Scott, C. R. 1998. “Reveal or not to reveal: A theoretical model of anonymous communication,” Communication Theory (8:4), pp. 381-407.
〔101〕 Scott, J. E. 1995. “The measurement of information systems effectiveness: Evaluating a measuring instrument,” ACM SIGMIS Database (26:1), pp. 43-61.
〔102〕 Scott, A. V. and Orlikowski, W. J. 2014. “Entanglements in practice: Performing anonymity through social media,” MIS Quarterly (38:3), pp. 873-893.
〔103〕 Spinello, R.A. 2001. “Code and moral values in cyberspace,” Ethics and Information (3: 2), pp. 137-150.
〔104〕 Subramanian, G. H. 1994. “A replication of perceived usefulness and perceived ease of use measurement,” Decision Sciences (25:5-6), pp.863-874.
〔105〕 Sundaram, D.S., Mitra, K. and Webster, C. 1998. “Word-of-mouth communications: A motivational analysis,” Advances in Consumer Research (25:1), pp. 527-531.
〔106〕 Tajfel, H. 1978. Differentiation between Groups: Studies in the Social Psychology of Intergroup Relation, London: Academic Press.
〔107〕 Teo, T. S. H., Lim V. K. G. and Lai, R. Y. C. 1999. “Intrinsic and extrinsic motivations in Internet usage,” Omega (27:1), pp. 25-37.
〔108〕 Thong, J. Y.L., Hong, S.-J. and Tam, K. Y. 2006. “The effects of post-adoption beliefs on the expectation-confirmation model for information technology continuance,” International Journal of Human-Computer Studies (64:9), pp. 799-810.
〔109〕 Tillwick, H. and Olivier, M. S. 2008. “Bridging the gap between anonymous e-mail and anonymous web browsing,” Online Information Review (32:1), pp. 22-34.
〔110〕 Tornatzky, L. G. and Klein, K. J. 1982. “Innovation characteristics and innovation adoption-implementation: A meta-analysis of findings,” IEEE Transactions on Engineering Management (EM-29:1), pp. 28-45.
〔111〕 Ullman, J. B. 2006. “Structural equation modeling: Reviewing the basics and moving forward,” Journal of Personality Assessment (87:1), pp. 35-50.
〔112〕 Van der Heijden, H. 2004. “User acceptance of hedonic information systems,” MIS Quarterly (28:4), pp. 695-704.
〔113〕 Venkatesh, V. and Davis, F. D. 2000. “A theoretical extension of the technology acceptance model: Four longitudinal field studies,” Management Science (46:2), pp. 186-204.
〔114〕 Venkatesh, V., Speier, C. and Morris, M. 2002. “User acceptance enablers in individual decision making about technology toward an integrated model,” Decision Science (33:2), pp. 297-316.
〔115〕 Wallace, K. A. 1999. “Anonymity,” Ethics and Information Technology (1:1), pp. 23-35.
〔116〕 Washaw, P. R. 1980. “A new model for predicating behavioral intentions: An alternative to Fishbein,” Journal of Marketing Research (17:2), pp. 153-172.
〔117〕 Wiedemann, D. G., Haunstetter, T. and Pousttchi, K. 2008. “Analyzing the basic elements of mobile viral marketing-An empirical study,” in Proceedings of the 7th International Conference on Mobile Business, IEEE, Barcelona,7-8 July, pp. 75-85.
〔118〕 Wilson, R.F. 2000. “The six simple principles of viral marketing,” Available at http://webmarketingtoday.com/articles/viral-principles/ (access date: 22 March, 2015).
〔119〕 Zhou, T. 2011. “Understanding online community user participation: A social influence perspective,” Internet Research (21:1), pp. 67-81.
指導教授 范懿文(Yi-Wen Fan) 審核日期 2015-7-2
推文 facebook   plurk   twitter   funp   google   live   udn   HD   myshare   reddit   netvibes   friend   youpush   delicious   baidu   
網路書籤 Google bookmarks   del.icio.us   hemidemi   myshare   

若有論文相關問題,請聯絡國立中央大學圖書館推廣服務組 TEL:(03)422-7151轉57407,或E-mail聯絡  - 隱私權政策聲明