學術產出-Theses

Article View/Open

Publication Export

Google ScholarTM

政大圖書館

Citation Infomation

  • No doi shows Citation Infomation
題名 一個用於解決NFC行動付款服務誤解之研究
An investigation of addressing misconceptions in using NFC mobile payment service
作者 游家和
Yu, Chia-Ho
貢獻者 杜雨儒
Tu, Yu-Ju
游家和
Yu, Chia-Ho
關鍵詞 NFC行動支付
誤解
輕推理論
隱私政策
安全政策
NFC mobile payment
Misconception
Nudge
Privacy policy
Security policy
日期 2023
上傳時間 6-Jul-2023 16:20:05 (UTC+8)
摘要 在COVID-19疫情與快速數位轉型的背景下,近場通訊 (NFC)行動支付服務的使用有了顯著的成長,然而,依舊存在一群人對其持抵制的態度,因此了解其抵制背後的原因並找到有效的解決方案顯得至關重要。除了資安疑慮,對服務的誤解同時也是提升使用率的主要阻礙之一,透過解除這些誤解,我們預計服務的使用率將會得到提升。
在本研究中採用了輕推 (Nudge) 機制來制定關於資料隱私與安全的同意政策,目標為確保使用者閱讀該政策內容,提升他們對服務的理解。為了評估這些政策對服務使用率的影響,透過進行實驗,將參與者分配到三個實驗組與一個對照組,並藉由雙重差分法,評估政策內容對實驗結果的影響,研究結果顯示,同時具備隱私與安全政策的組別有最顯著的使用率提升。結論,本研究證明了同意政策在減少使用者對NFC行動支付的誤解以及促進服務的使用率上有著明顯的成效與影響。
Amidst the COVID-19 pandemic and rapid digital transformation, the use of near field communication (NFC) mobile payment services has grown significantly. However, some individuals resist its adoption. Understanding the reasons behind their reluctance and finding an effective solution is paramount. Cybersecurity concerns, in addition to misconceptions, are the primary deterrent to its adoption. By dispelling these misconceptions, we anticipate a boost in the adoption rate of NFC mobile payment services.
In this study, we employ the nudge mechanism to develop a consent policy, addressing data privacy and security. We aim to enhance the individuals’ understanding by ensuring they read and comprehend the policy before utilizing the service. To assess the impact of these policies on service adoption, we conduct a randomized experiment, assigning participants to three treatment groups and a control group. Employing the difference-in-differences method, we estimate the causal effect of the policy content. Our findings reveal that the coexistence of privacy and security policies leads to the highest increase in adoption rates. This suggests that our consent policy successfully mitigates biases held by individuals. In conclusion, our study demonstrates the efficacy of the consent policy in reducing misconceptions and fostering greater acceptance of NFC mobile payment services.
參考文獻 Ajzen, I. 1985. "From Intentions to Actions: A Theory of Planned Behavior," in Action Control. Springer, pp. 11-39.
Al-Tamimi, M., and Al-Haj, A. 2017. "Online Security Protocol for Nfc Mobile Payment Applications," 2017 8th International Conference on Information Technology (ICIT): IEEE, pp. 827-832.
Ali, M., Saeed, M. M. S., Ali, M. M., and Haidar, N. 2011. "Determinants of Helmet Use Behaviour among Employed Motorcycle Riders in Yazd, Iran Based on Theory of Planned Behaviour," Injury (42:9), pp. 864-869.
Alrawais, A. 2020. "Security Issues in near Field Communications (Nfc)," International Journal of Advanced Computer Science and Applications (11:11).
Apple. 2023. "Apple Pay & Privacy." from https://www.apple.com/legal/privacy/data/en/apple-pay/
Cambou, B. 2017. "Enhancing Secure Elements—Technology and Architecture," Foundations of Hardware IP Protection), pp. 205-231.
Champion, V. L., and Skinner, C. S. 2008. "The Health Belief Model," Health behavior and health education: Theory, research, and practice (4), pp. 45-65.
Chenoweth, T., Minch, R., and Gattiker, T. 2009. "Application of Protection Motivation Theory to Adoption of Protective Technologies," 2009 42nd Hawaii International Conference on System Sciences: IEEE, pp. 1-10.
Clough, B. A., and Casey, L. M. 2011. "Technological Adjuncts to Increase Adherence to Therapy: A Review," Clinical psychology review (31:5), pp. 697-710.
Davis, F. D. 1989. "Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology," MIS quarterly), pp. 319-340.
Davis, F. D. 1993. "User Acceptance of Information Technology: System Characteristics, User Perceptions and Behavioral Impacts," International journal of man-machine studies (38:3), pp. 475-487.
Dennis, A. R., Yuan, L., Feng, X., Webb, E., and Hsieh, C. J. 2020. "Digital Nudging: Numeric and Semantic Priming in E-Commerce," Journal of management information systems (37:1), pp. 39-65.
Fishbein, M., and Ajzen, I. 1975. "Belief, Attitude, Intention and Behaviour: An Introduction to Theory and Research. In Addisonwesley Reading," M.(Ed.)).
Grindley, E. J., Zizzi, S. J., and Nasypany, A. M. 2008. "Use of Protection Motivation Theory, Affect, and Barriers to Understand and Predict Adherence to Outpatient Rehabilitation," Physical Therapy (88:12), pp. 1529-1540.
Gupta, A., and Arora, N. 2017. "Consumer Adoption of M-Banking: A Behavioral Reasoning Theory Perspective," International Journal of Bank Marketing).
Guthrie, C. 2002. "Prospect Theory, Risk Preference, and the Law," Nw. UL Rev. (97), p. 1115.
Hew, J.-J., Leong, L.-Y., Tan, G. W.-H., Ooi, K.-B., and Lee, V.-H. 2019. "The Age of Mobile Social Commerce: An Artificial Neural Network Analysis on Its Resistances," Technological Forecasting and Social Change (144), pp. 311-324.
Huh, J. H., Verma, S., Rayala, S. S. V., Bobba, R. B., Beznosov, K., and Kim, H. 2017. "I Don’t Use Apple Pay Because It’s Less Secure...: Perception of Security and Usability in Mobile Tap-and-Pay," Workshop on Usable Security, San Diego, CA.
Joachim, V., Spieth, P., and Heidenreich, S. 2018. "Active Innovation Resistance: An Empirical Study on Functional and Psychological Barriers to Innovation Adoption in Different Contexts," Industrial Marketing Management (71), pp. 95-107.
Jones, B. D. 1999. "Bounded Rationality," Annual review of political science (2:1), pp. 297-321.
Krishna, B., Krishnan, S., and Sebastian, M. 2022. "Examining the Relationship between National Cybersecurity Commitment, Culture, and Digital Payment Usage: An Institutional Trust Theory Perspective," Information Systems Frontiers), pp. 1-29.
Kukafka, R., Johnson, S. B., Linfante, A., and Allegrante, J. P. 2003. "Grounding a New Information Technology Implementation Framework in Behavioral Science: A Systematic Analysis of the Literature on It Use," Journal of biomedical informatics (36:3), pp. 218-227.
Levy, J. S. 1996. "Loss Aversion, Framing, and Bargaining: The Implications of Prospect Theory for International Conflict," International Political Science Review (17:2), pp. 179-195.
Li, J., Wang, J., Wangh, S., and Zhou, Y. 2019. "Mobile Payment with Alipay: An Application of Extended Technology Acceptance Model," IEEE Access (7), pp. 50380-50387.
Lian, J.-W., and Yen, D. C. 2014. "Online Shopping Drivers and Barriers for Older Adults: Age and Gender Differences," Computers in human behavior (37), pp. 133-143.
Lysyakov, M., and Viswanathan, S. 2022. "Threatened by Ai: Analyzing Users’ Responses to the Introduction of Ai in a Crowd-Sourcing Platform," Available at SSRN 3758338).
Neighbors, C., Foster, D. W., and Fossos, N. 2013. "Peer Influences on Addiction," Principles of addiction: Comprehensive addictive behaviours and disorders (1), pp. 323-331.
Nepomuceno, M. V., Laroche, M., and Richard, M.-O. 2014. "How to Reduce Perceived Risk When Buying Online: The Interactions between Intangibility, Product Knowledge, Brand Familiarity, Privacy and Security Concerns," Journal of Retailing and Consumer Services (21:4), pp. 619-629.
Ram, S. 1987. "A Model of Innovation Resistance," ACR North American Advances).
Reisner, M. S. L., Mimiaga, M. J., Skeer, M. M., Perkovich, M. B., Johnson, M. C. V., and Safren, S. A. 2009. "A Review of Hiv Antiretroviral Adherence and Intervention Studies among Hiv–Infected Youth," Topics in HIV medicine: a publication of the International AIDS Society, USA (17:1), p. 14.
Rogers, R. W. 1975. "A Protection Motivation Theory of Fear Appeals and Attitude Change1," The journal of psychology (91:1), pp. 93-114.
Rudolph, M., Feth, D., and Polst, S. 2018. "Why Users Ignore Privacy Policies–a Survey and Intention Model for Explaining User Privacy Behavior," Human-Computer Interaction. Theories, Methods, and Human Issues: 20th International Conference, HCI International 2018, Las Vegas, NV, USA, July 15–20, 2018, Proceedings, Part I 20: Springer, pp. 587-598.
Schüz, B., Li, A. S.-W., Hardinge, A., McEachan, R. R., and Conner, M. 2017. "Socioeconomic Status as a Moderator between Social Cognitions and Physical Activity: Systematic Review and Meta-Analysis Based on the Theory of Planned Behavior," Psychology of Sport and Exercise (30), pp. 186-195.
Shaw, K. L. 2015. "Patient Education, Motivation, Compliance, and Adherence to Physical Activity, Exercise, and Rehabilitation,").
Shillair, R. 2020. "Protection Motivation Theory," The International Encyclopedia of Media Psychology), pp. 1-3.
Shobha, N. S. S., Aruna, K. S. P., Bhagyashree, M. D. P., and Sarita, K. S. J. 2016. "Nfc and Nfc Payments: A Review," 2016 international conference on ICT in business industry & government (ICTBIG): IEEE, pp. 1-7.
Silverman, B. G., Hanrahan, N., Huang, L., Rabinowitz, E. F., and Lim, S. 2016. "Artificial Intelligence and Human Behavior Modeling and Simulation for Mental Health Conditions," in Artificial Intelligence in Behavioral and Mental Health Care. Elsevier, pp. 163-183.
Simon, H. A. 1957. "A Behavioral Model of Rational Choice," Models of man, social and rational: Mathematical essays on rational human behavior in a social setting), pp. 241-260.
Simon, H. A. 1990. "Bounded Rationality," in Utility and Probability. Springer, pp. 15-18.
Smelser, N. J., and Baltes, P. B. 2001. International Encyclopedia of the Social & Behavioral Sciences. Elsevier Amsterdam.
Story, P., Smullen, D., Acquisti, A., Cranor, L. F., Sadeh, N., and Schaub, F. 2020. "From Intent to Action: Nudging Users Towards Secure Mobile Payments," Proceedings of the 16th Symposium on Usable Privacy and Security (SOUPS 2020), pp. 379-415.
Thomas, B., Mimiaga, M. J., Menon, S., Chandrasekaran, V., Murugesan, P., Swaminathan, S., Mayer, K. H., and Safren, S. A. 2009. "Unseen and Unheard: Predictors of Sexual Risk Behavior and Hiv Infection among Men Who Have Sex with Men in Chennai, India," AIDS education and prevention: official publication of the International Society for AIDS Education (21:4), p. 372.
Tryon, W. 2014. Cognitive Neuroscience and Psychotherapy: Network Principles for a Unified Theory. Academic Press.
Turner, W., and Merriman, L. M. 2005. Clinical Skills in Treating the Foot. Elsevier Health Sciences.
Wang, Y., Hahn, C., and Sutrave, K. 2016. "Mobile Payment Security, Threats, and Challenges," 2016 second international conference on mobile and secure services (MobiSecServ): IEEE, pp. 1-5.
Wu, K.-W., Huang, S. Y., Yen, D. C., and Popova, I. 2012. "The Effect of Online Privacy Policy on Consumer Privacy Concern and Trust," Computers in human behavior (28:3), pp. 889-897.
描述 碩士
國立政治大學
資訊管理學系
110356033
資料來源 http://thesis.lib.nccu.edu.tw/record/#G0110356033
資料類型 thesis
dc.contributor.advisor 杜雨儒zh_TW
dc.contributor.advisor Tu, Yu-Juen_US
dc.contributor.author (Authors) 游家和zh_TW
dc.contributor.author (Authors) Yu, Chia-Hoen_US
dc.creator (作者) 游家和zh_TW
dc.creator (作者) Yu, Chia-Hoen_US
dc.date (日期) 2023en_US
dc.date.accessioned 6-Jul-2023 16:20:05 (UTC+8)-
dc.date.available 6-Jul-2023 16:20:05 (UTC+8)-
dc.date.issued (上傳時間) 6-Jul-2023 16:20:05 (UTC+8)-
dc.identifier (Other Identifiers) G0110356033en_US
dc.identifier.uri (URI) http://nccur.lib.nccu.edu.tw/handle/140.119/145736-
dc.description (描述) 碩士zh_TW
dc.description (描述) 國立政治大學zh_TW
dc.description (描述) 資訊管理學系zh_TW
dc.description (描述) 110356033zh_TW
dc.description.abstract (摘要) 在COVID-19疫情與快速數位轉型的背景下,近場通訊 (NFC)行動支付服務的使用有了顯著的成長,然而,依舊存在一群人對其持抵制的態度,因此了解其抵制背後的原因並找到有效的解決方案顯得至關重要。除了資安疑慮,對服務的誤解同時也是提升使用率的主要阻礙之一,透過解除這些誤解,我們預計服務的使用率將會得到提升。
在本研究中採用了輕推 (Nudge) 機制來制定關於資料隱私與安全的同意政策,目標為確保使用者閱讀該政策內容,提升他們對服務的理解。為了評估這些政策對服務使用率的影響,透過進行實驗,將參與者分配到三個實驗組與一個對照組,並藉由雙重差分法,評估政策內容對實驗結果的影響,研究結果顯示,同時具備隱私與安全政策的組別有最顯著的使用率提升。結論,本研究證明了同意政策在減少使用者對NFC行動支付的誤解以及促進服務的使用率上有著明顯的成效與影響。
zh_TW
dc.description.abstract (摘要) Amidst the COVID-19 pandemic and rapid digital transformation, the use of near field communication (NFC) mobile payment services has grown significantly. However, some individuals resist its adoption. Understanding the reasons behind their reluctance and finding an effective solution is paramount. Cybersecurity concerns, in addition to misconceptions, are the primary deterrent to its adoption. By dispelling these misconceptions, we anticipate a boost in the adoption rate of NFC mobile payment services.
In this study, we employ the nudge mechanism to develop a consent policy, addressing data privacy and security. We aim to enhance the individuals’ understanding by ensuring they read and comprehend the policy before utilizing the service. To assess the impact of these policies on service adoption, we conduct a randomized experiment, assigning participants to three treatment groups and a control group. Employing the difference-in-differences method, we estimate the causal effect of the policy content. Our findings reveal that the coexistence of privacy and security policies leads to the highest increase in adoption rates. This suggests that our consent policy successfully mitigates biases held by individuals. In conclusion, our study demonstrates the efficacy of the consent policy in reducing misconceptions and fostering greater acceptance of NFC mobile payment services.
en_US
dc.description.tableofcontents CHAPTER 1 Introduction 1
CHAPTER 2 Literature Review 3
2.1 NFC Mobile Payment Adoption in COVID-19 3
2.2 Future Development of NFC Mobile Payment 3
2.3 Related Work for Rational Reasons 4
2.3.1 Technology acceptance model (TAM) 5
2.3.2 Innovation Diffusion Theory (IDT) 5
2.3.3 Theory of Reasoned Action (TRA) 6
2.3.4 Theory of Planned Behavior (TPB) 6
2.3.5 Summary of TAM, IDT, TRA, and TPB 7
2.4 Related Work for Irrational Reasons 8
2.4.1 Bounded Rationality 8
2.4.2 Prospect Theory 9
2.4.3 Protection Motivation Theory (PMT) 9
2.4.4 Innovation Resistance Theory (IRT) 10
2.4.5 NFC Mobile Payment Service in PMT 12
CHAPTER 3 Hypotheses Development 13
3.1 Misconception on NFC Mobile Payment Service 13
3.1.1 Privacy Misconceptions 13
3.1.2 Security Misconceptions 14
3.2 Nudge and Consent Feature 14
CHAPTER 4 Experiment 16
4.1 Policy and Consent Feature Development 16
4.1.1 Privacy Development 16
4.1.2 Security Development 17
4.2 Experiment Design 19
4.2.1 Experimental Design and Procedure 19
4.2.2 Application Design 23
4.3 Participants 29
4.4 Data Analysis 29
4.4.1 Statistical Method 29
4.4.2 Regression Model 30
4.4.3 Data Description 31
4.4.4 Result Analysis 33
4.5 Summary of Result 38
4.6 Demographic Description 40
CHAPTER 5 Discussion 43
5.1 Key Findings 43
5.2 Limitations and Future Research Opportunities 44
CHAPTER 6 Conclusion 46
References 47
Appendix 51
A1 User Profile Form 51
A2 Demographic profiles 52
A3 Descriptive Statistics before Experiment 54
A4 Descriptive Statistics after Experiment 54
zh_TW
dc.format.extent 1739553 bytes-
dc.format.mimetype application/pdf-
dc.source.uri (資料來源) http://thesis.lib.nccu.edu.tw/record/#G0110356033en_US
dc.subject (關鍵詞) NFC行動支付zh_TW
dc.subject (關鍵詞) 誤解zh_TW
dc.subject (關鍵詞) 輕推理論zh_TW
dc.subject (關鍵詞) 隱私政策zh_TW
dc.subject (關鍵詞) 安全政策zh_TW
dc.subject (關鍵詞) NFC mobile paymenten_US
dc.subject (關鍵詞) Misconceptionen_US
dc.subject (關鍵詞) Nudgeen_US
dc.subject (關鍵詞) Privacy policyen_US
dc.subject (關鍵詞) Security policyen_US
dc.title (題名) 一個用於解決NFC行動付款服務誤解之研究zh_TW
dc.title (題名) An investigation of addressing misconceptions in using NFC mobile payment serviceen_US
dc.type (資料類型) thesisen_US
dc.relation.reference (參考文獻) Ajzen, I. 1985. "From Intentions to Actions: A Theory of Planned Behavior," in Action Control. Springer, pp. 11-39.
Al-Tamimi, M., and Al-Haj, A. 2017. "Online Security Protocol for Nfc Mobile Payment Applications," 2017 8th International Conference on Information Technology (ICIT): IEEE, pp. 827-832.
Ali, M., Saeed, M. M. S., Ali, M. M., and Haidar, N. 2011. "Determinants of Helmet Use Behaviour among Employed Motorcycle Riders in Yazd, Iran Based on Theory of Planned Behaviour," Injury (42:9), pp. 864-869.
Alrawais, A. 2020. "Security Issues in near Field Communications (Nfc)," International Journal of Advanced Computer Science and Applications (11:11).
Apple. 2023. "Apple Pay & Privacy." from https://www.apple.com/legal/privacy/data/en/apple-pay/
Cambou, B. 2017. "Enhancing Secure Elements—Technology and Architecture," Foundations of Hardware IP Protection), pp. 205-231.
Champion, V. L., and Skinner, C. S. 2008. "The Health Belief Model," Health behavior and health education: Theory, research, and practice (4), pp. 45-65.
Chenoweth, T., Minch, R., and Gattiker, T. 2009. "Application of Protection Motivation Theory to Adoption of Protective Technologies," 2009 42nd Hawaii International Conference on System Sciences: IEEE, pp. 1-10.
Clough, B. A., and Casey, L. M. 2011. "Technological Adjuncts to Increase Adherence to Therapy: A Review," Clinical psychology review (31:5), pp. 697-710.
Davis, F. D. 1989. "Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology," MIS quarterly), pp. 319-340.
Davis, F. D. 1993. "User Acceptance of Information Technology: System Characteristics, User Perceptions and Behavioral Impacts," International journal of man-machine studies (38:3), pp. 475-487.
Dennis, A. R., Yuan, L., Feng, X., Webb, E., and Hsieh, C. J. 2020. "Digital Nudging: Numeric and Semantic Priming in E-Commerce," Journal of management information systems (37:1), pp. 39-65.
Fishbein, M., and Ajzen, I. 1975. "Belief, Attitude, Intention and Behaviour: An Introduction to Theory and Research. In Addisonwesley Reading," M.(Ed.)).
Grindley, E. J., Zizzi, S. J., and Nasypany, A. M. 2008. "Use of Protection Motivation Theory, Affect, and Barriers to Understand and Predict Adherence to Outpatient Rehabilitation," Physical Therapy (88:12), pp. 1529-1540.
Gupta, A., and Arora, N. 2017. "Consumer Adoption of M-Banking: A Behavioral Reasoning Theory Perspective," International Journal of Bank Marketing).
Guthrie, C. 2002. "Prospect Theory, Risk Preference, and the Law," Nw. UL Rev. (97), p. 1115.
Hew, J.-J., Leong, L.-Y., Tan, G. W.-H., Ooi, K.-B., and Lee, V.-H. 2019. "The Age of Mobile Social Commerce: An Artificial Neural Network Analysis on Its Resistances," Technological Forecasting and Social Change (144), pp. 311-324.
Huh, J. H., Verma, S., Rayala, S. S. V., Bobba, R. B., Beznosov, K., and Kim, H. 2017. "I Don’t Use Apple Pay Because It’s Less Secure...: Perception of Security and Usability in Mobile Tap-and-Pay," Workshop on Usable Security, San Diego, CA.
Joachim, V., Spieth, P., and Heidenreich, S. 2018. "Active Innovation Resistance: An Empirical Study on Functional and Psychological Barriers to Innovation Adoption in Different Contexts," Industrial Marketing Management (71), pp. 95-107.
Jones, B. D. 1999. "Bounded Rationality," Annual review of political science (2:1), pp. 297-321.
Krishna, B., Krishnan, S., and Sebastian, M. 2022. "Examining the Relationship between National Cybersecurity Commitment, Culture, and Digital Payment Usage: An Institutional Trust Theory Perspective," Information Systems Frontiers), pp. 1-29.
Kukafka, R., Johnson, S. B., Linfante, A., and Allegrante, J. P. 2003. "Grounding a New Information Technology Implementation Framework in Behavioral Science: A Systematic Analysis of the Literature on It Use," Journal of biomedical informatics (36:3), pp. 218-227.
Levy, J. S. 1996. "Loss Aversion, Framing, and Bargaining: The Implications of Prospect Theory for International Conflict," International Political Science Review (17:2), pp. 179-195.
Li, J., Wang, J., Wangh, S., and Zhou, Y. 2019. "Mobile Payment with Alipay: An Application of Extended Technology Acceptance Model," IEEE Access (7), pp. 50380-50387.
Lian, J.-W., and Yen, D. C. 2014. "Online Shopping Drivers and Barriers for Older Adults: Age and Gender Differences," Computers in human behavior (37), pp. 133-143.
Lysyakov, M., and Viswanathan, S. 2022. "Threatened by Ai: Analyzing Users’ Responses to the Introduction of Ai in a Crowd-Sourcing Platform," Available at SSRN 3758338).
Neighbors, C., Foster, D. W., and Fossos, N. 2013. "Peer Influences on Addiction," Principles of addiction: Comprehensive addictive behaviours and disorders (1), pp. 323-331.
Nepomuceno, M. V., Laroche, M., and Richard, M.-O. 2014. "How to Reduce Perceived Risk When Buying Online: The Interactions between Intangibility, Product Knowledge, Brand Familiarity, Privacy and Security Concerns," Journal of Retailing and Consumer Services (21:4), pp. 619-629.
Ram, S. 1987. "A Model of Innovation Resistance," ACR North American Advances).
Reisner, M. S. L., Mimiaga, M. J., Skeer, M. M., Perkovich, M. B., Johnson, M. C. V., and Safren, S. A. 2009. "A Review of Hiv Antiretroviral Adherence and Intervention Studies among Hiv–Infected Youth," Topics in HIV medicine: a publication of the International AIDS Society, USA (17:1), p. 14.
Rogers, R. W. 1975. "A Protection Motivation Theory of Fear Appeals and Attitude Change1," The journal of psychology (91:1), pp. 93-114.
Rudolph, M., Feth, D., and Polst, S. 2018. "Why Users Ignore Privacy Policies–a Survey and Intention Model for Explaining User Privacy Behavior," Human-Computer Interaction. Theories, Methods, and Human Issues: 20th International Conference, HCI International 2018, Las Vegas, NV, USA, July 15–20, 2018, Proceedings, Part I 20: Springer, pp. 587-598.
Schüz, B., Li, A. S.-W., Hardinge, A., McEachan, R. R., and Conner, M. 2017. "Socioeconomic Status as a Moderator between Social Cognitions and Physical Activity: Systematic Review and Meta-Analysis Based on the Theory of Planned Behavior," Psychology of Sport and Exercise (30), pp. 186-195.
Shaw, K. L. 2015. "Patient Education, Motivation, Compliance, and Adherence to Physical Activity, Exercise, and Rehabilitation,").
Shillair, R. 2020. "Protection Motivation Theory," The International Encyclopedia of Media Psychology), pp. 1-3.
Shobha, N. S. S., Aruna, K. S. P., Bhagyashree, M. D. P., and Sarita, K. S. J. 2016. "Nfc and Nfc Payments: A Review," 2016 international conference on ICT in business industry & government (ICTBIG): IEEE, pp. 1-7.
Silverman, B. G., Hanrahan, N., Huang, L., Rabinowitz, E. F., and Lim, S. 2016. "Artificial Intelligence and Human Behavior Modeling and Simulation for Mental Health Conditions," in Artificial Intelligence in Behavioral and Mental Health Care. Elsevier, pp. 163-183.
Simon, H. A. 1957. "A Behavioral Model of Rational Choice," Models of man, social and rational: Mathematical essays on rational human behavior in a social setting), pp. 241-260.
Simon, H. A. 1990. "Bounded Rationality," in Utility and Probability. Springer, pp. 15-18.
Smelser, N. J., and Baltes, P. B. 2001. International Encyclopedia of the Social & Behavioral Sciences. Elsevier Amsterdam.
Story, P., Smullen, D., Acquisti, A., Cranor, L. F., Sadeh, N., and Schaub, F. 2020. "From Intent to Action: Nudging Users Towards Secure Mobile Payments," Proceedings of the 16th Symposium on Usable Privacy and Security (SOUPS 2020), pp. 379-415.
Thomas, B., Mimiaga, M. J., Menon, S., Chandrasekaran, V., Murugesan, P., Swaminathan, S., Mayer, K. H., and Safren, S. A. 2009. "Unseen and Unheard: Predictors of Sexual Risk Behavior and Hiv Infection among Men Who Have Sex with Men in Chennai, India," AIDS education and prevention: official publication of the International Society for AIDS Education (21:4), p. 372.
Tryon, W. 2014. Cognitive Neuroscience and Psychotherapy: Network Principles for a Unified Theory. Academic Press.
Turner, W., and Merriman, L. M. 2005. Clinical Skills in Treating the Foot. Elsevier Health Sciences.
Wang, Y., Hahn, C., and Sutrave, K. 2016. "Mobile Payment Security, Threats, and Challenges," 2016 second international conference on mobile and secure services (MobiSecServ): IEEE, pp. 1-5.
Wu, K.-W., Huang, S. Y., Yen, D. C., and Popova, I. 2012. "The Effect of Online Privacy Policy on Consumer Privacy Concern and Trust," Computers in human behavior (28:3), pp. 889-897.
zh_TW