學術產出-Theses
Article View/Open
Publication Export
-
題名 一個用於解決NFC行動付款服務誤解之研究
An investigation of addressing misconceptions in using NFC mobile payment service作者 游家和
Yu, Chia-Ho貢獻者 杜雨儒
Tu, Yu-Ju
游家和
Yu, Chia-Ho關鍵詞 NFC行動支付
誤解
輕推理論
隱私政策
安全政策
NFC mobile payment
Misconception
Nudge
Privacy policy
Security policy日期 2023 上傳時間 6-Jul-2023 16:20:05 (UTC+8) 摘要 在COVID-19疫情與快速數位轉型的背景下,近場通訊 (NFC)行動支付服務的使用有了顯著的成長,然而,依舊存在一群人對其持抵制的態度,因此了解其抵制背後的原因並找到有效的解決方案顯得至關重要。除了資安疑慮,對服務的誤解同時也是提升使用率的主要阻礙之一,透過解除這些誤解,我們預計服務的使用率將會得到提升。在本研究中採用了輕推 (Nudge) 機制來制定關於資料隱私與安全的同意政策,目標為確保使用者閱讀該政策內容,提升他們對服務的理解。為了評估這些政策對服務使用率的影響,透過進行實驗,將參與者分配到三個實驗組與一個對照組,並藉由雙重差分法,評估政策內容對實驗結果的影響,研究結果顯示,同時具備隱私與安全政策的組別有最顯著的使用率提升。結論,本研究證明了同意政策在減少使用者對NFC行動支付的誤解以及促進服務的使用率上有著明顯的成效與影響。
Amidst the COVID-19 pandemic and rapid digital transformation, the use of near field communication (NFC) mobile payment services has grown significantly. However, some individuals resist its adoption. Understanding the reasons behind their reluctance and finding an effective solution is paramount. Cybersecurity concerns, in addition to misconceptions, are the primary deterrent to its adoption. By dispelling these misconceptions, we anticipate a boost in the adoption rate of NFC mobile payment services.In this study, we employ the nudge mechanism to develop a consent policy, addressing data privacy and security. We aim to enhance the individuals’ understanding by ensuring they read and comprehend the policy before utilizing the service. To assess the impact of these policies on service adoption, we conduct a randomized experiment, assigning participants to three treatment groups and a control group. Employing the difference-in-differences method, we estimate the causal effect of the policy content. Our findings reveal that the coexistence of privacy and security policies leads to the highest increase in adoption rates. This suggests that our consent policy successfully mitigates biases held by individuals. In conclusion, our study demonstrates the efficacy of the consent policy in reducing misconceptions and fostering greater acceptance of NFC mobile payment services.參考文獻 Ajzen, I. 1985. "From Intentions to Actions: A Theory of Planned Behavior," in Action Control. Springer, pp. 11-39.Al-Tamimi, M., and Al-Haj, A. 2017. "Online Security Protocol for Nfc Mobile Payment Applications," 2017 8th International Conference on Information Technology (ICIT): IEEE, pp. 827-832.Ali, M., Saeed, M. M. S., Ali, M. M., and Haidar, N. 2011. "Determinants of Helmet Use Behaviour among Employed Motorcycle Riders in Yazd, Iran Based on Theory of Planned Behaviour," Injury (42:9), pp. 864-869.Alrawais, A. 2020. "Security Issues in near Field Communications (Nfc)," International Journal of Advanced Computer Science and Applications (11:11).Apple. 2023. "Apple Pay & Privacy." from https://www.apple.com/legal/privacy/data/en/apple-pay/Cambou, B. 2017. "Enhancing Secure Elements—Technology and Architecture," Foundations of Hardware IP Protection), pp. 205-231.Champion, V. L., and Skinner, C. S. 2008. "The Health Belief Model," Health behavior and health education: Theory, research, and practice (4), pp. 45-65.Chenoweth, T., Minch, R., and Gattiker, T. 2009. "Application of Protection Motivation Theory to Adoption of Protective Technologies," 2009 42nd Hawaii International Conference on System Sciences: IEEE, pp. 1-10.Clough, B. A., and Casey, L. M. 2011. "Technological Adjuncts to Increase Adherence to Therapy: A Review," Clinical psychology review (31:5), pp. 697-710.Davis, F. D. 1989. "Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology," MIS quarterly), pp. 319-340.Davis, F. D. 1993. "User Acceptance of Information Technology: System Characteristics, User Perceptions and Behavioral Impacts," International journal of man-machine studies (38:3), pp. 475-487.Dennis, A. R., Yuan, L., Feng, X., Webb, E., and Hsieh, C. J. 2020. "Digital Nudging: Numeric and Semantic Priming in E-Commerce," Journal of management information systems (37:1), pp. 39-65.Fishbein, M., and Ajzen, I. 1975. "Belief, Attitude, Intention and Behaviour: An Introduction to Theory and Research. In Addisonwesley Reading," M.(Ed.)).Grindley, E. J., Zizzi, S. J., and Nasypany, A. M. 2008. "Use of Protection Motivation Theory, Affect, and Barriers to Understand and Predict Adherence to Outpatient Rehabilitation," Physical Therapy (88:12), pp. 1529-1540.Gupta, A., and Arora, N. 2017. "Consumer Adoption of M-Banking: A Behavioral Reasoning Theory Perspective," International Journal of Bank Marketing).Guthrie, C. 2002. "Prospect Theory, Risk Preference, and the Law," Nw. UL Rev. (97), p. 1115.Hew, J.-J., Leong, L.-Y., Tan, G. W.-H., Ooi, K.-B., and Lee, V.-H. 2019. "The Age of Mobile Social Commerce: An Artificial Neural Network Analysis on Its Resistances," Technological Forecasting and Social Change (144), pp. 311-324.Huh, J. H., Verma, S., Rayala, S. S. V., Bobba, R. B., Beznosov, K., and Kim, H. 2017. "I Don’t Use Apple Pay Because It’s Less Secure...: Perception of Security and Usability in Mobile Tap-and-Pay," Workshop on Usable Security, San Diego, CA.Joachim, V., Spieth, P., and Heidenreich, S. 2018. "Active Innovation Resistance: An Empirical Study on Functional and Psychological Barriers to Innovation Adoption in Different Contexts," Industrial Marketing Management (71), pp. 95-107.Jones, B. D. 1999. "Bounded Rationality," Annual review of political science (2:1), pp. 297-321.Krishna, B., Krishnan, S., and Sebastian, M. 2022. "Examining the Relationship between National Cybersecurity Commitment, Culture, and Digital Payment Usage: An Institutional Trust Theory Perspective," Information Systems Frontiers), pp. 1-29.Kukafka, R., Johnson, S. B., Linfante, A., and Allegrante, J. P. 2003. "Grounding a New Information Technology Implementation Framework in Behavioral Science: A Systematic Analysis of the Literature on It Use," Journal of biomedical informatics (36:3), pp. 218-227.Levy, J. S. 1996. "Loss Aversion, Framing, and Bargaining: The Implications of Prospect Theory for International Conflict," International Political Science Review (17:2), pp. 179-195.Li, J., Wang, J., Wangh, S., and Zhou, Y. 2019. "Mobile Payment with Alipay: An Application of Extended Technology Acceptance Model," IEEE Access (7), pp. 50380-50387.Lian, J.-W., and Yen, D. C. 2014. "Online Shopping Drivers and Barriers for Older Adults: Age and Gender Differences," Computers in human behavior (37), pp. 133-143.Lysyakov, M., and Viswanathan, S. 2022. "Threatened by Ai: Analyzing Users’ Responses to the Introduction of Ai in a Crowd-Sourcing Platform," Available at SSRN 3758338).Neighbors, C., Foster, D. W., and Fossos, N. 2013. "Peer Influences on Addiction," Principles of addiction: Comprehensive addictive behaviours and disorders (1), pp. 323-331.Nepomuceno, M. V., Laroche, M., and Richard, M.-O. 2014. "How to Reduce Perceived Risk When Buying Online: The Interactions between Intangibility, Product Knowledge, Brand Familiarity, Privacy and Security Concerns," Journal of Retailing and Consumer Services (21:4), pp. 619-629.Ram, S. 1987. "A Model of Innovation Resistance," ACR North American Advances).Reisner, M. S. L., Mimiaga, M. J., Skeer, M. M., Perkovich, M. B., Johnson, M. C. V., and Safren, S. A. 2009. "A Review of Hiv Antiretroviral Adherence and Intervention Studies among Hiv–Infected Youth," Topics in HIV medicine: a publication of the International AIDS Society, USA (17:1), p. 14.Rogers, R. W. 1975. "A Protection Motivation Theory of Fear Appeals and Attitude Change1," The journal of psychology (91:1), pp. 93-114.Rudolph, M., Feth, D., and Polst, S. 2018. "Why Users Ignore Privacy Policies–a Survey and Intention Model for Explaining User Privacy Behavior," Human-Computer Interaction. Theories, Methods, and Human Issues: 20th International Conference, HCI International 2018, Las Vegas, NV, USA, July 15–20, 2018, Proceedings, Part I 20: Springer, pp. 587-598.Schüz, B., Li, A. S.-W., Hardinge, A., McEachan, R. R., and Conner, M. 2017. "Socioeconomic Status as a Moderator between Social Cognitions and Physical Activity: Systematic Review and Meta-Analysis Based on the Theory of Planned Behavior," Psychology of Sport and Exercise (30), pp. 186-195.Shaw, K. L. 2015. "Patient Education, Motivation, Compliance, and Adherence to Physical Activity, Exercise, and Rehabilitation,").Shillair, R. 2020. "Protection Motivation Theory," The International Encyclopedia of Media Psychology), pp. 1-3.Shobha, N. S. S., Aruna, K. S. P., Bhagyashree, M. D. P., and Sarita, K. S. J. 2016. "Nfc and Nfc Payments: A Review," 2016 international conference on ICT in business industry & government (ICTBIG): IEEE, pp. 1-7.Silverman, B. G., Hanrahan, N., Huang, L., Rabinowitz, E. F., and Lim, S. 2016. "Artificial Intelligence and Human Behavior Modeling and Simulation for Mental Health Conditions," in Artificial Intelligence in Behavioral and Mental Health Care. Elsevier, pp. 163-183.Simon, H. A. 1957. "A Behavioral Model of Rational Choice," Models of man, social and rational: Mathematical essays on rational human behavior in a social setting), pp. 241-260.Simon, H. A. 1990. "Bounded Rationality," in Utility and Probability. Springer, pp. 15-18.Smelser, N. J., and Baltes, P. B. 2001. International Encyclopedia of the Social & Behavioral Sciences. Elsevier Amsterdam.Story, P., Smullen, D., Acquisti, A., Cranor, L. F., Sadeh, N., and Schaub, F. 2020. "From Intent to Action: Nudging Users Towards Secure Mobile Payments," Proceedings of the 16th Symposium on Usable Privacy and Security (SOUPS 2020), pp. 379-415.Thomas, B., Mimiaga, M. J., Menon, S., Chandrasekaran, V., Murugesan, P., Swaminathan, S., Mayer, K. H., and Safren, S. A. 2009. "Unseen and Unheard: Predictors of Sexual Risk Behavior and Hiv Infection among Men Who Have Sex with Men in Chennai, India," AIDS education and prevention: official publication of the International Society for AIDS Education (21:4), p. 372.Tryon, W. 2014. Cognitive Neuroscience and Psychotherapy: Network Principles for a Unified Theory. Academic Press.Turner, W., and Merriman, L. M. 2005. Clinical Skills in Treating the Foot. Elsevier Health Sciences.Wang, Y., Hahn, C., and Sutrave, K. 2016. "Mobile Payment Security, Threats, and Challenges," 2016 second international conference on mobile and secure services (MobiSecServ): IEEE, pp. 1-5.Wu, K.-W., Huang, S. Y., Yen, D. C., and Popova, I. 2012. "The Effect of Online Privacy Policy on Consumer Privacy Concern and Trust," Computers in human behavior (28:3), pp. 889-897. 描述 碩士
國立政治大學
資訊管理學系
110356033資料來源 http://thesis.lib.nccu.edu.tw/record/#G0110356033 資料類型 thesis dc.contributor.advisor 杜雨儒 zh_TW dc.contributor.advisor Tu, Yu-Ju en_US dc.contributor.author (Authors) 游家和 zh_TW dc.contributor.author (Authors) Yu, Chia-Ho en_US dc.creator (作者) 游家和 zh_TW dc.creator (作者) Yu, Chia-Ho en_US dc.date (日期) 2023 en_US dc.date.accessioned 6-Jul-2023 16:20:05 (UTC+8) - dc.date.available 6-Jul-2023 16:20:05 (UTC+8) - dc.date.issued (上傳時間) 6-Jul-2023 16:20:05 (UTC+8) - dc.identifier (Other Identifiers) G0110356033 en_US dc.identifier.uri (URI) http://nccur.lib.nccu.edu.tw/handle/140.119/145736 - dc.description (描述) 碩士 zh_TW dc.description (描述) 國立政治大學 zh_TW dc.description (描述) 資訊管理學系 zh_TW dc.description (描述) 110356033 zh_TW dc.description.abstract (摘要) 在COVID-19疫情與快速數位轉型的背景下,近場通訊 (NFC)行動支付服務的使用有了顯著的成長,然而,依舊存在一群人對其持抵制的態度,因此了解其抵制背後的原因並找到有效的解決方案顯得至關重要。除了資安疑慮,對服務的誤解同時也是提升使用率的主要阻礙之一,透過解除這些誤解,我們預計服務的使用率將會得到提升。在本研究中採用了輕推 (Nudge) 機制來制定關於資料隱私與安全的同意政策,目標為確保使用者閱讀該政策內容,提升他們對服務的理解。為了評估這些政策對服務使用率的影響,透過進行實驗,將參與者分配到三個實驗組與一個對照組,並藉由雙重差分法,評估政策內容對實驗結果的影響,研究結果顯示,同時具備隱私與安全政策的組別有最顯著的使用率提升。結論,本研究證明了同意政策在減少使用者對NFC行動支付的誤解以及促進服務的使用率上有著明顯的成效與影響。 zh_TW dc.description.abstract (摘要) Amidst the COVID-19 pandemic and rapid digital transformation, the use of near field communication (NFC) mobile payment services has grown significantly. However, some individuals resist its adoption. Understanding the reasons behind their reluctance and finding an effective solution is paramount. Cybersecurity concerns, in addition to misconceptions, are the primary deterrent to its adoption. By dispelling these misconceptions, we anticipate a boost in the adoption rate of NFC mobile payment services.In this study, we employ the nudge mechanism to develop a consent policy, addressing data privacy and security. We aim to enhance the individuals’ understanding by ensuring they read and comprehend the policy before utilizing the service. To assess the impact of these policies on service adoption, we conduct a randomized experiment, assigning participants to three treatment groups and a control group. Employing the difference-in-differences method, we estimate the causal effect of the policy content. Our findings reveal that the coexistence of privacy and security policies leads to the highest increase in adoption rates. This suggests that our consent policy successfully mitigates biases held by individuals. In conclusion, our study demonstrates the efficacy of the consent policy in reducing misconceptions and fostering greater acceptance of NFC mobile payment services. en_US dc.description.tableofcontents CHAPTER 1 Introduction 1CHAPTER 2 Literature Review 32.1 NFC Mobile Payment Adoption in COVID-19 32.2 Future Development of NFC Mobile Payment 32.3 Related Work for Rational Reasons 42.3.1 Technology acceptance model (TAM) 52.3.2 Innovation Diffusion Theory (IDT) 52.3.3 Theory of Reasoned Action (TRA) 62.3.4 Theory of Planned Behavior (TPB) 62.3.5 Summary of TAM, IDT, TRA, and TPB 72.4 Related Work for Irrational Reasons 82.4.1 Bounded Rationality 82.4.2 Prospect Theory 92.4.3 Protection Motivation Theory (PMT) 92.4.4 Innovation Resistance Theory (IRT) 102.4.5 NFC Mobile Payment Service in PMT 12CHAPTER 3 Hypotheses Development 133.1 Misconception on NFC Mobile Payment Service 133.1.1 Privacy Misconceptions 133.1.2 Security Misconceptions 143.2 Nudge and Consent Feature 14CHAPTER 4 Experiment 164.1 Policy and Consent Feature Development 164.1.1 Privacy Development 164.1.2 Security Development 174.2 Experiment Design 194.2.1 Experimental Design and Procedure 194.2.2 Application Design 234.3 Participants 294.4 Data Analysis 294.4.1 Statistical Method 294.4.2 Regression Model 304.4.3 Data Description 314.4.4 Result Analysis 334.5 Summary of Result 384.6 Demographic Description 40CHAPTER 5 Discussion 435.1 Key Findings 435.2 Limitations and Future Research Opportunities 44CHAPTER 6 Conclusion 46References 47Appendix 51A1 User Profile Form 51A2 Demographic profiles 52A3 Descriptive Statistics before Experiment 54A4 Descriptive Statistics after Experiment 54 zh_TW dc.format.extent 1739553 bytes - dc.format.mimetype application/pdf - dc.source.uri (資料來源) http://thesis.lib.nccu.edu.tw/record/#G0110356033 en_US dc.subject (關鍵詞) NFC行動支付 zh_TW dc.subject (關鍵詞) 誤解 zh_TW dc.subject (關鍵詞) 輕推理論 zh_TW dc.subject (關鍵詞) 隱私政策 zh_TW dc.subject (關鍵詞) 安全政策 zh_TW dc.subject (關鍵詞) NFC mobile payment en_US dc.subject (關鍵詞) Misconception en_US dc.subject (關鍵詞) Nudge en_US dc.subject (關鍵詞) Privacy policy en_US dc.subject (關鍵詞) Security policy en_US dc.title (題名) 一個用於解決NFC行動付款服務誤解之研究 zh_TW dc.title (題名) An investigation of addressing misconceptions in using NFC mobile payment service en_US dc.type (資料類型) thesis en_US dc.relation.reference (參考文獻) Ajzen, I. 1985. "From Intentions to Actions: A Theory of Planned Behavior," in Action Control. Springer, pp. 11-39.Al-Tamimi, M., and Al-Haj, A. 2017. "Online Security Protocol for Nfc Mobile Payment Applications," 2017 8th International Conference on Information Technology (ICIT): IEEE, pp. 827-832.Ali, M., Saeed, M. M. S., Ali, M. M., and Haidar, N. 2011. "Determinants of Helmet Use Behaviour among Employed Motorcycle Riders in Yazd, Iran Based on Theory of Planned Behaviour," Injury (42:9), pp. 864-869.Alrawais, A. 2020. "Security Issues in near Field Communications (Nfc)," International Journal of Advanced Computer Science and Applications (11:11).Apple. 2023. "Apple Pay & Privacy." from https://www.apple.com/legal/privacy/data/en/apple-pay/Cambou, B. 2017. "Enhancing Secure Elements—Technology and Architecture," Foundations of Hardware IP Protection), pp. 205-231.Champion, V. L., and Skinner, C. S. 2008. "The Health Belief Model," Health behavior and health education: Theory, research, and practice (4), pp. 45-65.Chenoweth, T., Minch, R., and Gattiker, T. 2009. "Application of Protection Motivation Theory to Adoption of Protective Technologies," 2009 42nd Hawaii International Conference on System Sciences: IEEE, pp. 1-10.Clough, B. A., and Casey, L. M. 2011. "Technological Adjuncts to Increase Adherence to Therapy: A Review," Clinical psychology review (31:5), pp. 697-710.Davis, F. D. 1989. "Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology," MIS quarterly), pp. 319-340.Davis, F. D. 1993. "User Acceptance of Information Technology: System Characteristics, User Perceptions and Behavioral Impacts," International journal of man-machine studies (38:3), pp. 475-487.Dennis, A. R., Yuan, L., Feng, X., Webb, E., and Hsieh, C. J. 2020. "Digital Nudging: Numeric and Semantic Priming in E-Commerce," Journal of management information systems (37:1), pp. 39-65.Fishbein, M., and Ajzen, I. 1975. "Belief, Attitude, Intention and Behaviour: An Introduction to Theory and Research. In Addisonwesley Reading," M.(Ed.)).Grindley, E. J., Zizzi, S. J., and Nasypany, A. M. 2008. "Use of Protection Motivation Theory, Affect, and Barriers to Understand and Predict Adherence to Outpatient Rehabilitation," Physical Therapy (88:12), pp. 1529-1540.Gupta, A., and Arora, N. 2017. "Consumer Adoption of M-Banking: A Behavioral Reasoning Theory Perspective," International Journal of Bank Marketing).Guthrie, C. 2002. "Prospect Theory, Risk Preference, and the Law," Nw. UL Rev. (97), p. 1115.Hew, J.-J., Leong, L.-Y., Tan, G. W.-H., Ooi, K.-B., and Lee, V.-H. 2019. "The Age of Mobile Social Commerce: An Artificial Neural Network Analysis on Its Resistances," Technological Forecasting and Social Change (144), pp. 311-324.Huh, J. H., Verma, S., Rayala, S. S. V., Bobba, R. B., Beznosov, K., and Kim, H. 2017. "I Don’t Use Apple Pay Because It’s Less Secure...: Perception of Security and Usability in Mobile Tap-and-Pay," Workshop on Usable Security, San Diego, CA.Joachim, V., Spieth, P., and Heidenreich, S. 2018. "Active Innovation Resistance: An Empirical Study on Functional and Psychological Barriers to Innovation Adoption in Different Contexts," Industrial Marketing Management (71), pp. 95-107.Jones, B. D. 1999. "Bounded Rationality," Annual review of political science (2:1), pp. 297-321.Krishna, B., Krishnan, S., and Sebastian, M. 2022. "Examining the Relationship between National Cybersecurity Commitment, Culture, and Digital Payment Usage: An Institutional Trust Theory Perspective," Information Systems Frontiers), pp. 1-29.Kukafka, R., Johnson, S. B., Linfante, A., and Allegrante, J. P. 2003. "Grounding a New Information Technology Implementation Framework in Behavioral Science: A Systematic Analysis of the Literature on It Use," Journal of biomedical informatics (36:3), pp. 218-227.Levy, J. S. 1996. "Loss Aversion, Framing, and Bargaining: The Implications of Prospect Theory for International Conflict," International Political Science Review (17:2), pp. 179-195.Li, J., Wang, J., Wangh, S., and Zhou, Y. 2019. "Mobile Payment with Alipay: An Application of Extended Technology Acceptance Model," IEEE Access (7), pp. 50380-50387.Lian, J.-W., and Yen, D. C. 2014. "Online Shopping Drivers and Barriers for Older Adults: Age and Gender Differences," Computers in human behavior (37), pp. 133-143.Lysyakov, M., and Viswanathan, S. 2022. "Threatened by Ai: Analyzing Users’ Responses to the Introduction of Ai in a Crowd-Sourcing Platform," Available at SSRN 3758338).Neighbors, C., Foster, D. W., and Fossos, N. 2013. "Peer Influences on Addiction," Principles of addiction: Comprehensive addictive behaviours and disorders (1), pp. 323-331.Nepomuceno, M. V., Laroche, M., and Richard, M.-O. 2014. "How to Reduce Perceived Risk When Buying Online: The Interactions between Intangibility, Product Knowledge, Brand Familiarity, Privacy and Security Concerns," Journal of Retailing and Consumer Services (21:4), pp. 619-629.Ram, S. 1987. "A Model of Innovation Resistance," ACR North American Advances).Reisner, M. S. L., Mimiaga, M. J., Skeer, M. M., Perkovich, M. B., Johnson, M. C. V., and Safren, S. A. 2009. "A Review of Hiv Antiretroviral Adherence and Intervention Studies among Hiv–Infected Youth," Topics in HIV medicine: a publication of the International AIDS Society, USA (17:1), p. 14.Rogers, R. W. 1975. "A Protection Motivation Theory of Fear Appeals and Attitude Change1," The journal of psychology (91:1), pp. 93-114.Rudolph, M., Feth, D., and Polst, S. 2018. "Why Users Ignore Privacy Policies–a Survey and Intention Model for Explaining User Privacy Behavior," Human-Computer Interaction. Theories, Methods, and Human Issues: 20th International Conference, HCI International 2018, Las Vegas, NV, USA, July 15–20, 2018, Proceedings, Part I 20: Springer, pp. 587-598.Schüz, B., Li, A. S.-W., Hardinge, A., McEachan, R. R., and Conner, M. 2017. "Socioeconomic Status as a Moderator between Social Cognitions and Physical Activity: Systematic Review and Meta-Analysis Based on the Theory of Planned Behavior," Psychology of Sport and Exercise (30), pp. 186-195.Shaw, K. L. 2015. "Patient Education, Motivation, Compliance, and Adherence to Physical Activity, Exercise, and Rehabilitation,").Shillair, R. 2020. "Protection Motivation Theory," The International Encyclopedia of Media Psychology), pp. 1-3.Shobha, N. S. S., Aruna, K. S. P., Bhagyashree, M. D. P., and Sarita, K. S. J. 2016. "Nfc and Nfc Payments: A Review," 2016 international conference on ICT in business industry & government (ICTBIG): IEEE, pp. 1-7.Silverman, B. G., Hanrahan, N., Huang, L., Rabinowitz, E. F., and Lim, S. 2016. "Artificial Intelligence and Human Behavior Modeling and Simulation for Mental Health Conditions," in Artificial Intelligence in Behavioral and Mental Health Care. Elsevier, pp. 163-183.Simon, H. A. 1957. "A Behavioral Model of Rational Choice," Models of man, social and rational: Mathematical essays on rational human behavior in a social setting), pp. 241-260.Simon, H. A. 1990. "Bounded Rationality," in Utility and Probability. Springer, pp. 15-18.Smelser, N. J., and Baltes, P. B. 2001. International Encyclopedia of the Social & Behavioral Sciences. Elsevier Amsterdam.Story, P., Smullen, D., Acquisti, A., Cranor, L. F., Sadeh, N., and Schaub, F. 2020. "From Intent to Action: Nudging Users Towards Secure Mobile Payments," Proceedings of the 16th Symposium on Usable Privacy and Security (SOUPS 2020), pp. 379-415.Thomas, B., Mimiaga, M. J., Menon, S., Chandrasekaran, V., Murugesan, P., Swaminathan, S., Mayer, K. H., and Safren, S. A. 2009. "Unseen and Unheard: Predictors of Sexual Risk Behavior and Hiv Infection among Men Who Have Sex with Men in Chennai, India," AIDS education and prevention: official publication of the International Society for AIDS Education (21:4), p. 372.Tryon, W. 2014. Cognitive Neuroscience and Psychotherapy: Network Principles for a Unified Theory. Academic Press.Turner, W., and Merriman, L. M. 2005. Clinical Skills in Treating the Foot. Elsevier Health Sciences.Wang, Y., Hahn, C., and Sutrave, K. 2016. "Mobile Payment Security, Threats, and Challenges," 2016 second international conference on mobile and secure services (MobiSecServ): IEEE, pp. 1-5.Wu, K.-W., Huang, S. Y., Yen, D. C., and Popova, I. 2012. "The Effect of Online Privacy Policy on Consumer Privacy Concern and Trust," Computers in human behavior (28:3), pp. 889-897. zh_TW