Please use this identifier to cite or link to this item: https://ah.lib.nccu.edu.tw/handle/140.119/60217
DC FieldValueLanguage
dc.contributor.advisor李有仁zh_TW
dc.contributor.advisorLi, Eldonen_US
dc.contributor.author吳翊齊zh_TW
dc.contributor.authorWu, Yi Chien_US
dc.creator吳翊齊zh_TW
dc.creatorWu, Yi Chien_US
dc.date2010en_US
dc.date.accessioned2013-09-04T08:59:26Z-
dc.date.available2013-09-04T08:59:26Z-
dc.date.issued2013-09-04T08:59:26Z-
dc.identifierG0098356014en_US
dc.identifier.urihttp://nccur.lib.nccu.edu.tw/handle/140.119/60217-
dc.description碩士zh_TW
dc.description國立政治大學zh_TW
dc.description資訊管理研究所zh_TW
dc.description98356014zh_TW
dc.description99zh_TW
dc.description.abstract  網際網路的成長,促使電子商務快速發展。然而,回顧電子商務的市場現況,即使網路購物規模不斷成長,但是卻仍有54.9%的網路商店未能達到損益平衡,主要原因在於激烈的市場競爭環境導致商品毛利率降低,獲利速度減緩。因此,資策會認為網路商店若想在競爭市場中脫穎而出,網站的技術安全必須值得消費者信任。\n\n  消費者不願意在網路上購買商品或服務,是因為缺乏對網路購物相關安全性的信任與缺乏對網路上企業可靠性的信任。因此,如何建立消費者對網路商店的「信任」,是企業獲得顧客的關鍵因素。\n\n  過去文獻指出,信任信念能藉由改善網站的結構性確保來提升,且消費者對網站的信任信念會影響到其信任網站的態度。因此,本研究根據文獻探討的方式找出Cialdini影響力模式及其所會影響的消費者信任信念的各個構面,並利用此模式作為結構性確保的實驗變數來設計網站,從中操弄各項實驗變數以探討各種不同影響力原則影響消費者信任信念之效果。接著,再進一步分析各個信任信念分別如何影響消費者的信任態度,以全盤了解消費者初次瀏覽網路商店網站時,利用Cialdini影響力模式所歸納的網站結構性確保所影響之效果。\n\n  本研究透過實驗室實驗法模擬網路商店的購物情境,並操控不同Cialdini影響力原則所設計的結構性確保,研究結果發現:\n\n1. 除了「好感」原則的結構性確保外,網站中其餘的結構性確保在消費者瀏覽網路商店時,皆會正向影響到消費者的信任信念。\n2. 消費者的「認知診斷」、「認知保證」、「認知信心」、「認知能力」、「認知可靠」、「認知嚮往」等信任信念的各個構面,會正向影響消費者的「信任態度」。zh_TW
dc.description.abstract The e-commerce environment has developed rapidly with the fast growth of Internet. However, by reviewing the market status of e-commerce, there were still 54.9% of Internet shops which couldn’t make the profit and loss balance even the internet shopping was growing constantly. The environment was so competitive that the profit margin of product reduced and the rate of making profits slowed down. Therefore, the Institute for Information Industry advised internet shops to enhance their internet security of websites if they wanted to stand out from the competitive environment.\n\n Consumers are not willing to purchase the products or services due to the lack of trust in the security of the website and credibility of the internet shops. For this reason, the key to gain the consumers is how to make them trust the internet shops.\n\n Past researches indicated that the consumer’s trusting beliefs can be enhanced by improving the structural assurance of the website. In addition, these trusting beliefs were positively related to the trusting attitude toward the website. Therefore, we identified the constructs of the trusting beliefs which could be affected by Cialdini’s Influence Model from literature review. We used this model to design the structural assurances of the website as experimental variables to probe the differences of consumer’s trusting beliefs under the model’s principles. Furthermore, we understand the effect of structural assurance by analyzing how the constructs of trusting beliefs affected consumers’ trusting attitude when consumers visit the Internet shop at the first time.\n\n This research manipulated the principles of Cialdini’s Influence Model to design the structural assurance of website and simulated the situation of internet shopping via laboratory experimentation. The research result was shown as below:\n1. The structural assurances designed by Cialdini’s Influence Model were positively related to the trusting beliefs of consumers except the “Liking” principle.\n2. The constructs of consumer’s trusting beliefs were related to the trusting attitude toward the website positively and respectively.en_US
dc.description.tableofcontents第一章 緒論 1\n第一節 研究背景 1\n第二節 研究動機 2\n第三節 研究目的 3\n第四節 研究流程 4\n第二章 文獻探討 6\n第一節 消費者信任及信任建立模式 6\n2.1.1 信任 6\n2.1.1 信任建立模式 7\n第二節 Cialdini影響力模式 12\n第三節 計畫行為理論 14\n2.3.1 計畫行為理論的發展 14\n2.3.2 行為信念與行為態度之相關性 16\n2.3.3 網路消費者信任信念的構面 17\n第四節 研究架構 21\n第五節 研究假說推理 22\n2.5.1 結構性確保因素影響消費者信任信念 22\n2.5.2 消費者信任信念影響信任態度 25\n第三章 研究方法 26\n第一節 研究設計 26\n3.1.1 實驗設計 26\n3.1.2 實驗網站 29\n3.1.3 實驗對象 31\n第二節 研究變數之操作化定義 32\n3.2.1 自變項之定義與操弄 32\n3.2.2 自變項之衡量問項 40\n3.2.3 應變項之操作化定義 42\n3.2.4 應變項之衡量問項 43\n第三節 統計分析方法 47\n3.3.1 信度與效度分析 47\n3.3.2 成對樣本t檢定 49\n3.3.3 基本敘述統計 49\n3.3.4 變異數分析 49\n3.3.5 複迴歸分析 50\n第四章 資料分析 51\n第一節 樣本分布說明 51\n第二節 量表信效度檢定 53\n4.2.1 信度檢定 53\n4.2.2 效度檢定 53\n4.2.3 實驗效度檢定 55\n第三節 假說檢定 58\n4.3.1 雙因子變異數分析結果 58\n4.3.2 複迴歸分析與共線性檢測 61\n第五章 結論與建議 64\n第一節 研究結論 64\n第二節 管理意涵 67\n第三節 理論貢獻 70\n第四節 研究限制 71\n第五節 未來研究方向 73\n參考文獻 74\n附錄:研究問卷 81\n附錄二:實驗網站 84\n附錄三:Pearson相關分析表 88zh_TW
dc.format.extent3043522 bytes-
dc.format.mimetypeapplication/pdf-
dc.language.isoen_US-
dc.source.urihttp://thesis.lib.nccu.edu.tw/record/#G0098356014en_US
dc.subject消費者信任zh_TW
dc.subject信任建立模式zh_TW
dc.subject結構性確保zh_TW
dc.subjectCialdini影響力模式zh_TW
dc.subject信任信念zh_TW
dc.subjectConsumer Trusten_US
dc.subjectTrust Building Modelen_US
dc.subjectStructural Assuranceen_US
dc.subjectCialdini`s Influence Modelen_US
dc.subjectTrusting Beliefen_US
dc.titleB2C電子商務信任之研究:以齊氏影響力模式闡述網路購物流程zh_TW
dc.titleA study of B2C E-Commerce trust: applying cialdini’s influence model to internet shopping processen_US
dc.typethesisen
dc.relation.reference中文部分\n1. 吳明隆(2003),「SPSS統計應用實務-問卷分析與統計應用」,松崗出版社,台北。\n2. 許鳳玲(2009),「網際網路上的認證標章之探討」,碩士論文,國立中正大學法律學研究所,嘉義。\n3. 資策會產業情報研究所(2009),「2009年台灣線上購物市場現況再創高峰-台灣網購市場規模預估3116億」,網址:http://tinyurl.com/yzxbjnf,上網日期:2009-07-14。\n4. 資策會產業情報研究所(2010),「2010台灣線上購物市場規模3,583億元」,網址:http://tinyurl.com/2c9pfl7,上網日期:2010-10-18。\n英文部分\n1. Ajzen, I. (1985), “From Intention to Actions: a Theory of Planned Behavior,” In: Kuhl, J. and Beckmann, J. (Eds.), Action Control: From Cognition to Behavior, Springer Verlag, New York, pp. 11-39.\n2. Ajzen, I. (1991), “The Theory of Planned Behavior,” Organ. Behavior Hyman Decision Processes, Vol. 50, No.2, pp. 179-211.\n3. Alba, J. W. and Hutchinson, J. W. (1987), “Dimensions of Consumer Experience,” Journal of Consumer Research, Vol. 13, No. 4, pp.411-454.\n4. Atkinson, R. C. and Shiffrin, R. M. (1968), “Human Memory: a Proposed System and Its Control Processes,” Psychology of Learning and Motivation, Vol. 2, pp. 89-195.\n5. Awad, N. F. and Ragowsky, A. (2008), “Establishing Trust in Electronic Commerce Through Online Word of Mouth: An Examination Across Genders,” Journal of Management Information Systems, Vol. 24, No. 4, pp. 101-121.\n6. Bagozzi, R. P. and Warshaw, P. R. (1990), “Trying to Consume,” Journal of Consumer Research, Vol. 17, No. 2, pp. 127-140.\n7. Barua, A., Chellappa, R., and Whinston, A. B. (1995), “Creating a Collaboratory in Cyberspace: Theoretical Foundation and an Implementation,” Journal of Organizational, Vol. 5, No. 4, pp. 417-442.\n8. Bawden, D. (2001), “Information overload,” Library & information briefings, No. 92, pp. 1-15\n9. Belsley, D. A., Kuh, E., and Welsch, R. E.(1980), “Regression Dianostics,” John Wiley and Sons, New York.\n10. Bennett, P. D. and Harrell, G. D. (1975), “The Role of Confidence in Understanding and Predicting Buyers’ Attitudes and Purchase Intentions,” Journal of Consumer Research, Vol. 2, No. 2, pp. 110-117.\n11. Burnkrant, R. E. and Page, T. J. (1988), “The Structural and Antecedents of the Normative and Attitudinal Components of Fishbein’s Theory of Reasoned Action,” Journal of Experimental Social Psychology, Vol. 24, No. 1, pp. 66-87.\n12. Burton, S., Lichtenstein, D. R., Netemeyer, R. G., and Garretson, J. A. (1998), “A Scale for Measuring Attitude toward Private Label Products and an Examination of Its Psychological and Behavioral Correlates,” Journal of the Academy of Marketing Science, Vol. 26, No.4, pp. 293-306.\n13. Cheung, C. M. and Lee, M. K. O. (2001), “Trust in Internet Shopping: Instrumental Development and Validation through Classical and Modern Approach,” Journal of Global Information Management, Vol. 9, No. 3.\n14. Cialdini, R. B. (1985), “Influence: How and Why People Agree to Things,” 1st ed., New York, Quill.\n15. Cialdini, R. B. (2001), “Influence: Science and Practice,” 4th ed., Allyn & Bacon.\n16. Davis, F. D. (1989), “Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology,” MIS Quarterly, Vol. 13, No. 3, pp. 319-340.\n17. Dayal, S., Landesburg, H., and Zeisser, M. (1999), “How to Build Trust Online,” Marketing Management, Vol. 8, No. 3, pp. 64-69.\n18. Derbaix, C. (1983), “Perceived Risk and Risk Relievers: a Empirical Investigation,” Journal of Economic Psychology, Vol. 3, No. 1, pp. 19-38.\n19. Doney, P. M. and Cannon, J. P. (1997), “An Examination of the Nature of Trust in Buyer-Seller Relationship,” Journal of Marketing, Vol. 61, No. 2, pp.35-51.\n20. Erevelles, S., Roy, A., and Yip, L. S. C. (2001), “The Universality of the Signal Theory for Products and Services,” Journal of Business Research, Vol. 52, No. 2, pp. 175-187.\n21. Feldman J. M. and Lynch, J. G. (1988), “Self-Generated Validity and Other Effects of Measurement on Belief, Attitude, Intention, and Behavior,” Journal of Applied Psychology, Vol. 73, No. 3, pp. 421-435.\n22. Fishbein, M. and Ajzen, I. (1975), “Belief, Attitude, Intention, and Behavior: an Introduction to Theory and Research,” Addison-Wesley Reading, MA.\n23. Fung, R. K. K. and Lee, M. K. O. (1999), “EC-Trust(Trust in Electronic Commerce): Exploring the Antecedent Factors,” AMCIS 1999 Proceedings, Paper 179., http://aisel.aisnet.org/amcis1999/179\n24. Garbarino, E. and Johnson, M. S. (1999), “The Different Roles of Satisfaction, Trust, and Commitment in Customer Relationships,” Journal of Marketing, Vol. 63, No.2, pp. 70-87.\n25. Gassenheimer, J. B., Houston, F. S., and Davis, J. C. (1998), “The Role of Economic Value, Social Value, and Perceptions of Fairness in Interorganizational Relationship Retention Decisions,” Journal of the Academy of Marketing Science, Vol. 26, No. 4, pp. 322-337.\n26. Gefen, D. (2000), “E-Commerce: the Role of Familiarity and Trust,” Omega, Vol. 28, No. 6, pp. 725-737.\n27. Gefen, D. and Straud, D. W. (2003), “Managing User Trust in B2C E-Services,” e-Service Journal, Vol. 2, No. 2, pp. 7-24.\n28. Gefen, D., Karahanna, E., and Straud, D. W. (2003), “Trust and TAM in Online Shopping: an Integrated Model,” MIS Quarterly, Vol. 27, No. 1, pp. 51-90.\n29. Geyskens, I. and Steenkamp, J. B. (1995), “An Investigation into the Joint Effects of Trust and Interdependence on Relationship Commitment,” Proceedings of the 24th EMAC Conference, pp. 351-371.\n30. Grazioli, S., Jarvenpaa, S. (2000), “Perils of Internet Fraud: an Empirical Investigation of Depetion and Trust with Experienced Internet Consumers,” IEEE Transactions on Systems, Man, and Cybernetics, Vol. 30, No. 4, pp. 395-410.\n31. Grewal, D., Monroe, K. B., and Krishnan, R. (1998), “The Effects of Price-Comparison Advertising on Buyers’ Perceptions of Acquisition Value, Transaction Value, and Behavioral Intentions,” Journal of Marketing, Vol. 62, No. 2, pp. 46-59.\n32. Hahn, K. H. and Kim, J. (2009), “The Effect of Offline Brand Trust and Perceived Internet Confidence on Online Shopping Intention in the Integrated Multi-Channel Context,” International Journal of Retail & Distribution Management, Vol. 37, No.2, pp. 126-141.\n33. Hair, J. F., Anderson, R. E., Tatham, R. L., and Black, W. C. (1998), “Multivariate Data Analysis, 5th ed.,” Prentice Hall, New Jersey.\n34. Herbig, P. A. and Karmer, H. (1994), “The Effect of Information Overload on the Innovation Choice Process,” Journal of Consumer Marketing, Vol. 11, No. 2, pp. 45-54.\n35. Horai, J. M., Naccari, N., and Fatoullah, E. (1974), “The Effects of Expertise and Physical Attractiveness Upon Opinion Agreement and Liking,” Sociometry, Vol. 37, No. 4, pp. 601-606\n36. Howard, J. A. and Sheth, J. N. (1969), “The Theory of Buyer Behavior,” Wiley, New York, 1969.\n37. Jacoby, J. (1977), “Information Load and Decision Quality: Some Contested Issues,” Journal of Marketing Research, Vol. 14, No. 4, pp. 569-573.\n38. Jacoby, J. (1984), “Perspectives on Information Overload,” Journal of Consumer Research, Vol. 10, No. 4, pp. 432-435.\n39. Jacoby, J., Speller, D. E., and Berning, C. K. (1974), “Brand Choice Behavior as a Function of Information Load: Replication and Extension,” Journal of Consumer Research, Vol. 1, No. 1, pp. 33-42.\n40. Jiang, Z. and Benbasat, I. (2004-2005), “Virtual Product Experience: Effects of Visual and Functional Control of Products on Perceived Diagnosticity and Flow in Electronic Shopping,” Journal of Management Information Systems, Vol. 21, No. 3, pp. 111-147.\n41. Johnson, D. and Grayson, K. (2005), “Cognitive and Affective Trust in Service Relationships” Journal of Business Research, Vol. 58, No. 4, pp. 500-507.\n42. Kamins, M. A. (1989), “Celebrity and Noncelebrity Advertising in a Two-Sideed Context,” Journal of Advertising Research, Vol. 29, pp.34-42.\n43. Kempf, D. S. and Smith, R. E. (1998), “Consumer Processing of Product Trail and the Influence of Prior Advertising: a Structural Modeling Approach,” Journal of Marketing Research, Vol. 35, No. 3, pp. 325-337.\n44. Kerlinger, F. N. and Lee, H. B.(1985), “Foundation of Behavior Research, 4th ed.,” Wadsworth Publishing, New York.\n45. Kim, D. and Benbasat, I. (2003), “Trust-Related Arguments in Internet Stores: a Framework for Evaluation,” Journal of Electronic Commerce Research, Vol. 4, No. 2, pp. 49-64.\n46. Kim, D. and Benbasat, I. (2006), “The Effect of Trust-Assuring Arguments on Consumer Trust in Internet Stores: Application of Toulmin’s Model of Argumentation,” Information Systems Research, Vol. 17, No. 3, pp. 286-300.\n47. Kim, D. and Benbasat, I. (2009-2010), “Trust-Assuring Arguments in B2C E-Commerce: Impact of Content, Source, and Price on Trust,” Journal of Management Information Systems, Vol. 26, No. 3, pp.175-206.\n48. Kim, H. W., Xu, Y., and Koh, J. (2004), “A Comparison of Online Trust Building Factors between Potential Customers and Repeat Customers,” Journal of Association for Information Systems, Vol. 5, No. 10, pp. 392-420.\n49. Kimery, K. M. and McCord, M. (2002), “Third Party Assurances: Mapping the Road to Trust in eRtailing,” Journal of Information Technology Theory and Application, Vol. 4, No. 2, Article 7.\n50. Lander, M. C., Purvis, R. L., McCray, G. E., and Leigh, W. (2004), “Trust-Building Mechanisms Utilized in Outsourced IS Development Projects: a Case Study,” Information and Management, Vol. 4, No. 4, pp. 509-528.\n51. Laroche, M., Kim, C., and Zhou, L. (1996), “Brand Familiarity and Confidence as Determinants of Purchase Intention: an Empirical Test in a Multiple Brand Context,” Journal of Business Research, Vol. 37, No. 2, pp. 115-120.\n52. Lee, M. and Lou, Y. C. (1996), “Consumer Reliance on Intrinsic and Extrinsic Cues in Product Evaluations: a Conjoint Approach,” Journal of Applied Business Research, Vol. 12, No. 1, pp. 21-29.\n53. Lee, M. K. O. and Turban E. (2001), “A Trust Model for Consumer Internet Shopping,” International Journal of Electronic Commerce, Vol. 6, No.1, pp. 75-91.\n54. Lim, K. H., Sia, C. L., Lee, M. K. O., and Benbasat, I. (2006), “Do I Trust You Online, and If So, Will I Buy? An Empirical Study of Two Trust-Building Strategies,” Journal of Management Information Systems, Vol. 23, No. 2, pp. 233-266.\n55. Limayem, M., Khalifa, M., and Frini, A. (2000), “What Makes Consumers Buy From Internet? a Longitudinal Study of Online Shopping,” IEEE Transaction on Systems, Man & Cybernetics: Part A, Vol. 3, No. 4, pp. 421-432.\n56. Lowry, P.B., Vance, A., Moody, G., Beckman, B., and Read, A. (2008), “Explaining and Prediction the Impact of Branding Alliances and Web Site Quality on Initial Consumer Trust of E-Commerce Web Sites,” Journal of Management Information Systems, Vol. 24, No. 4, pp. 199-224.\n57. Lynn, M. (1989), “Scarcity Effects on Desirability: Mediated by Assumed Expensiveness,” Journal of Economic Psychology, Vol. 10, No. 2, pp. 257-274.\n58. Lynn, M. and Harris J. (1997), “The Desire for Unique Consumer Products: a New Individual Differences Scale,” Vol. 14, No. 6, pp.601-616.\n59. Maddux, J. E. and Rogers, R. W. (1980), “Effects of Source Expertness, Physical Attractiveness and Supporting Arguments on Persuasion: a Case of Brains Over Beauty,” Journal of Personality and Social Psychology, Vol. 39, No. 2, pp. 235-244.\n60. Malhotra, N. K. (1982), “Information load and consumer decision making,” Journal of Consumer Research, Vol. 8, No. 4, pp. 419-430.\n61. Mathieson, K. (1991), “Predicting User Intentions: Comparing the Technology Acceptance Model with the Theory of Planned Behavior,” Information Systems Research, Vol. 2, No. 3, pp. 173-191.\n62. Matthews, B. A. and Shimoff, E. (1979), “Expansion of Exchange: Monitoring Trust Levels in Ongoing Exchange Relations,” Journal of Conflict Resolution, Vol. 23, No.3, pp. 538-560.\n63. Mayer, R. C., Davis, J. H., and Schoorman, F. D. (1995), “An Integrative Model of Organizational Trust,” Academy of Management Review, Vol. 20, No. 3, pp. 709-734.\n64. McCarter, M. W. and Northcraft, G. B. (2007), “Happy Together?: Insights and Implications of Viewing Managed Supply Chains as a Social Dilemma,” Journal of Operations Management, Vol. 25, No. 2, pp.498-511.\n65. McKnight, D. H., Chervany, N. L. (2001-2002), “What Trust Means in E-Commerce Customer Relationships: an Interdisciplinary Conceptual Typology,” International Journal of Electronic Commerce, Vol. 6, No.2, pp.35-59.\n66. McKnight, D. H., Choudhury, V., and Kacmar, C. (2002), “The Impact of Initial Consumer Trust on Intentions to Transact with a Web Site: a Trust Building Model,” Journal of Strategic Information Systems, Vol. 11, No. 3-4, pp. 297-323.\n67. McKnight, D. H., Cummings, L. L., and Chervany, N. L. (1998), “Initial Trust Formation in New Organizational Relationships,” Academy of Management Review, Vol. 23, No. 3, pp. 473-490.\n68. Miller, G. A. (1956), “The Magic Number Seven, Plus or Minus Two: Some Limits on Our Capacity for Processing,” Psychological Review, Vol. 101, No. 2, pp. 343-352.\n69. Mills, J. and Harvey, J. (1972), “Opinion Changes as a Function of When Information About the Communicator is Received and Whether He is Attractive or Expert,” Journal of Personality and Social Psychology, Vol. 21, No. 1, pp. 52-55.\n70. Mishra, A. K. (1996), “Organizational Responses to Crisis: the Centrality of Trust,” In: Kramer, R. M., Tyler, T. R. (Eds.), Trust in Organizations: Frontiers of Theory and Research, Sage, Thousand Oaks, CA, pp. 261-287.\n71. Mitchell, V. M. and Greatorex, M. (1993), “Risk Perception and Reduction in the Purchase of Consumer Services,” The Service Industries Journal, Vol. 13, No. 4, pp. 179-200.\n72. Morgan, R. M. and Hunt, S. D. (1994), “The Commitment-Trust Theory of Relationship Marketing,” Journal of Marketing, Vol. 58, No. 3, pp. 20-38.\n73. Neter, J., Kutner, M. H., Nachtsheim, C. J., and Wasserman, W., “Applied Linear Regression Models, 3rd ed.,” Richard D. Irwin, Inc.\n74. Nunnally, J. C.(1978), “Psychometric Theory, 2nd ed.,” McGraw-Hill, New York.\n75. Ohanian, R. (1991), “The Impact of Celebrity Spokespersons’ Perceived Image on Consumers’ Intention to Purchase,” Journal of Advertising Research, Vol. 31, No. 1, pp.46-54.\n76. Park, C. W. and Lessig, P. (1981), “Familiarity and Its Impact on Consumer Decision Biases and Heuristics,” Journal of Consumer Research, Vol. 8, No. 2, pp. 223-231.\n77. Petty R. E. and Cacioppo, J. T. (1986), “The Elaboration Likelihood Model of Persuasion,” Advanced in Experimental Social Psychology, Vol. 19, pp. 123-205.\n78. Ross, J. A. (1973), “Influence of Expert and Peer Upon Negro Mothers of Low Socioeconomic Status,” Journal of Social Psychology, Vol. 89, No. 1, pp. 79-84.\n79. Roselius, T. (1971), “Consumer Rankings of Risk Reduction Methods,” Journal of Marketing, Vol. 35, No. 1, pp.56-61.\n80. Rousseau, D. M., Sitkin, S. B., Burt, R. S., Camerer, C. (1998), “Not So Different After All: a Cross-Discipline View of Trust,” Academy of Management Review, Vol. 23, No. 3, pp. 393-404.\n81. Schiffman, L. G. and Kanuk, L. L. (2000), “Consumer Behavior,” 7th ed., Prentice Hall.\n82. Schlenker, B. R., Helm, B., and Tedeschi, J. T. (1973), “The Effects of Personality and Situational Variables on Behavioral Trust,” Journal of Personality and Social Psychology, Vol. 25, No. 3, pp. 419-427.\n83. Schumann, D. W., Petty, R. E., and Clemons, D. S. (1990), “Predicting the Effectiveness of Different Strategies of Advertising Variation: a Test of the Repetition-Variation Hypotheses,” Journal of Consumer Research, Vol. 17, No.2, pp.192-202.\n84. Shapiro, S. P. (1987), “The Social Control of Impersonal Trust,” The American Journal of Sociology, Vol. 93, No. 3, pp. 623-658.\n85. Sitkin, S. B. and Pablo, A. L. (1992), “Reconceptualizing the Determinants of Risk Behavior,” Academy of Management Review, Vol. 17, No. 1, pp.9-38.\n86. Skowronski, J. J. and Carlston, D. E. (1987), “Social Judgment and Social Memory: The Role of Cue Diagnosticity in Negetivity, Positivity, and Extremity Biases,” Journal of Personality and Social Psychology, Vol. 52, No. 4, pp. 689-699.\n87. Song, J. and Zahedi, F. M. (2001), “Web-Design in E-Commerce: a Theory and Empirical Analysis,” ICIS 2001 Proceedings, New Orleans, LA, pp. 205-219.\n88. Song, J. and Zahedi, F. M. (2005), “A Theoritical Approach to Web Design in E-Commerce: a Belief Reinforcement Model,” Management Science, Vol. 51, No. 8, pp. 1219-1235.\n89. Steinfield, C. and Whitten, P. (1999), “Community Level Socio-Economic Impacts of Electronic Commerce,” Journal of Computer-Mediated Communication, Vol. 5, issue 2.\n90. Suh, J. C. and Youjae, Y. (2006), “When Brand Attitudes Affect the Customer Satisfaction-Loyalty Relation: The Moderating Role of Product Involvement,” Journal of Consumer Psychology, Vol. 16, No. 2, pp. 145-155.\n91. Taytor, S. and Todd, P. A. (1995), “Understanding Information Technology Usage: a Test of Competing Models,” Information Systems Research, Vol. 6, No. 2, pp.144-176.\n92. Terman, A. W. (2007), “The Desire for Unique Consumer Products: a Moderator of the Scarcity Polarization Phenomenon? ,” Bachelor dissertation, The Ohio State University, Columbus, Ohio, USA.\n93. Troutman, C. M. and Shanteau, J. (1977), “Inferences Based on Nondiagnostic Information,” Organizational Behavior and Human Performance, Vol. 19, No. 1, pp. 43-55.\n94. Wingreen, S. and Baglione, S. (2005), “Untangling the Antecedents and Covariates of E-Commerce Trust: Institutional Trust vs. Knowledge-Based Trust,” Electronic Markets, Vol. 15, No. 3, pp. 246-260.\n95. Worchel, S., Lee, J., and Adewole, A. (1975), “Effects of Supply and Demand on Ratings of Object Value,” Journal of Personality and Social Psychology, Vol. 32, No. 5, pp. 906-914.\n96. Wu, J. H., Hsia, T. L., and Heng, M. S. H. (2006), “Core Capabilities for Exploiting Electronic Banking,” Journal of Electronic Commerce Research, Vol. 7, No. 2, pp. 111-122.\n97. Zucker, L. G. (1986), “Production of Trust: Institutional Sources of Economic Structure, 1840-1920,” In: Staw, B. M., Cummings, L. L. (Eds.), Research in Organizational Behavior, Vol. 8. JAI Press, Greenwich, CN, pp.53-111.zh_TW
item.languageiso639-1en_US-
item.cerifentitytypePublications-
item.fulltextWith Fulltext-
item.openairecristypehttp://purl.org/coar/resource_type/c_46ec-
item.grantfulltextrestricted-
item.openairetypethesis-
Appears in Collections:學位論文
Files in This Item:
File SizeFormat
601401.pdf2.97 MBAdobe PDF2View/Open
Show simple item record

Google ScholarTM

Check


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.