學術產出-Theses

Article View/Open

Publication Export

Google ScholarTM

政大圖書館

Citation Infomation

  • No doi shows Citation Infomation
題名 利用受限因子模型研究 智慧型手機使用者對於風險的行為意圖
A constraint factor model to study the smartphone users` behavior toward risk.
作者 劉榕安
貢獻者 洪叔民
劉榕安
關鍵詞 風險忍受度
感知風險
風險意識
資安風險
資安防護
日期 2015
上傳時間 15-Feb-2016 10:07:33 (UTC+8)
摘要 智慧型手機的出現勢必對傳統的生活模式帶來新的衝擊,產業結構、消費模式、生活模式和社會問題等都有不同程度的改變,而一些資訊安全的威脅也慢慢轉移至智慧型手機上,如何在智慧型手機的便利性和安全性取得平衡點,是不容忽視和逃避的問題。
本研究重點著墨於民眾的風險忍受程度和感知風險程度對於安裝智慧型手機防毒軟體的意圖影響。針對智慧型手機的資安防護等相關文獻中問卷,逐字翻譯並進行反覆前測,檢驗與修正,讓問項有更正確的歸類,進而探討未來智慧型手機防毒軟體發展之方向。其中列入控制變相:風險意識、使用智慧型手機上網的時間、擁有智慧型手機和基本資料等。
研究結果發現,感知風險與風險忍受度個別對於安裝防毒軟體意願均有影響,且風險忍受度會約束感知風險與安裝軟體之間的關係,而感知風險會約束風險忍受度對於安裝轉體之間的關係。
經研究結果提出有關智慧型手機防毒軟體業者行銷手法、資安防護業者建和未來產業發展方向,供各大企業或廠商在與消費者宣傳產品的一些創新建議與想法。
參考文獻 林永宏,2014,從影響行動裝置資安風險並未展現之因素探討未來行動裝置發展之研究,銘傳大學資訊管理碩士在職專班畢業論文
蔡佾潔,2012,資訊能力影響智慧型手機病毒知覺與資訊安全信任之研究,國立中興大學科技管理研究所碩士論文
徐鵬翔,2012,智慧型手機使用滿意度與品牌忠誠度之研究,國立中山大學資訊管理學系碩士論文
吳凱群,鄒仁淳,林娟娟,2012,智慧型手機使用者下載軟體意願之研究-以享樂型應用軟體為例,東吳大學資訊管理學系,文化大學資訊管理學系論文
Hunter D.R. (2002).Risk Perception and Risk Tolerance in Aircraft Pilots. National Technical Information Service, Springfield
Ajzen, I., and Fishbein, M. (1980). Understanding Attitudes and Predicting Social Behavior, Englewood Cliffs, NJ: Prentice-Hall.
Anderson, C. L., and Agarwal, R. (2010). Practicing safe computing: A multimedia empirical examination of home computer user security behavioral intentions. MIS Quarterly, 34(3), 613-643
Arachchilage, N. A. G., and Love S. (2013). A game design framework for avoiding phishing attacks, Computers in Human Behavior 29, 706–714
Baghdassarian S, Milanesi C. (2010). Forecast: mobile application stores, world-wide, 2008-14. Tec Report G00209676. Gartner.
Bettman, J. (1971). The structure of consumer choice processes, Journal of Marketing Research, 8, 465-471.
Chang, K. S. 2013, Can Smartphones Get Virus/Viruses and Malware? iPhone / Android Phone Only as Smart as Their Users in Malware Detection, retrieved on 12/24/2013 from http://kschang.hubpages.com/hub/Do-Smartphones-Get-Viruses-Why-iPhones-Android-Phones-and-Others-Are-Only-as-Smart-as-Their-Users
Chase, R. B., Jacobs, F. R., Aquilano, N. J. (2004). Production and Operations Management: Manufacturing and Services. McGraw-Hill, New York.
Constant, D., Kiesler, S., and Sproull, L. (1994). What`s mine is ours, or is it? A study of attitudes about information sharing, Information Systems Research 5(4), 400-421.
Cox, D. F. (1967). Risk Taking and Information Handling in Consumer Behavior, Harvard University Press, Boston.
Cummings, L. L., and Schwab, D. P. (1973). Performance in Organizations. Scott, Foresman and Company, Glenview, IL.
Dagon, D., Martin, T., Starner, T. (2004). Mobile phones as computing devices: The viruses are coming! IEEE Pervasive Computing, 3(4), 11–15.
Davis, F. D. (1989). Perceived usefulness, perceived ease of use, and user acceptance of information technologies, MIS Quarterly, 13(3), 319-340.
Dowling, G. R. (1986). Perceived risk: The concept and its measurement, Psychology & Marketing, 3(3), 193-210.
Egelman, S., Felt, A. P., and Wagner, D. (2013). Choice architecture and smartphone privacy: There’s a price for that, at The Economics of Information Security and Privacy, ed. Böhme, R., Springer, New York, 211-236.
Enck., W. (2011). Defending users against smartphone apps: Techniques and future directions, ICISS 2011, LYNC 7093, 49-70.
Featherman, M. S., & Pavlou, P. A. (2003). Predicting E-Services Adoption: A Perceived Risk Facets Perspective. International Journal of Human-Computer Studies, 59(4), 451-474.
Felt, A. P., Egelman, S., and Wagner, D. (2012). I’ve got 99 problems, but vibration ain’t one: A survey of smartphone users’ concerns. Proceedings of SPSM’ 12, 33-38.
Felt A, Finifter M, Chin E, Hanna S, and Wagner D. A. (2011). Survey of mobile malware in the wild. Proc. of the 1st ACM workshop on security and privacy in smartphones and mobile devices (SPSM ’11). ACM, 3-14.
Filbeck, G., Hatfield, P., & Horvath, P. (2005). Risk Aversion and Personality Type. The Journal of Behavioral Finance, 6(4), 170-180.
Filbeck, G., and Smith. L. (1996), Learning styles, teaching strategies, and predictors of success for students in corporate finance. Financial Practice and Education, 6(1), 74–85.
Fingas, J., 2013, Android tops 81 percent of smartphone market share in Q3, retrieved on 12/24/2013 from http://www.engadget.com/2013/10/31/strategy-analytics-q3-2013-phone-share/
Gao, T., Rohm, A. J., Sultan, F., and Huang, S. (2012). Antecedents of consumer attitudes toward mobile marketing: A comparative study of youth markets in the United States and China. Thunderbird International Business Review,54, 211-224
Gartner, (2013). Gartner Says Worldwide Mobile Phone Sales Declined 1.7 Percent in 2012, retrieved on 12/28/2013 from: http://www.gartner.com/newsroom/id/2335616
Gartner, (2013). Gartner Says Smartphone Sales Accounted for 55 Percent of Overall Mobile Phone Sales in Third Quarter of 2013, retrieved on 12/28/2013 from: http://www.gartner.com/newsroom/id/2623415
Goldratt, E. M. (1999). Theory of Constraints. North River Press, Great Barrington, MA.
Gross, G. (2007). Groups raise concerns about cybersecurity standards, PC World, April 25.
Howard, J. A., and Sheth, J. N. (1969). The Theory of Buyer Behavior, Wiley, New York.
Hunter, D. R. (2002). Risk Perception and Risk Tolerance in Aircraft Pilots. Retrieved from http://ntl.bts.gov/lib/19000/19800/19856/PB2003100818.pdf
Jiang, P. (2009). Consumer adoption of mobile internet services: An exploratory study. Journal of Promotion Management, 15(3), 418-454.
Johnston, A. C., and Warkentin, M. (2010). Fear appeals and information security behaviors: an empirical study. MIS Quarterly, 34(3), 549-566.
Kim, J. (2012). Developing an empirical model of college students` online shopping behavior. International Journal of Interdisciplinary Social Sciences, 6(10), 81-109.
Lee, H., Cho, H. J., Xu, W., and Fairhurst, A. (2010). The influence of consumer trait and demographics on intention to use retail self-service checkouts, Marketing Intelligence & Planning 28(1), 46-58.
Lu, H., Hsu, C., and Hsu, H. (1993). An empirical study of the effect of perceived risk upon intention to use online applications. Information Management & Computer Security, 13(2), 106-120.
MacKenzie, S. B., Podsakoff, P.M., and Podsakoff, N. P. (2011). Construct measurement and validation procedures in MIS and behavioral research: Integrating new and existing techniques, MIS Quarterly, 35(2), 293-234.
Malkiel, B. A. (1996). Random Walk Down Wall Street, 6th ed. W.W. Norton, New York.
Marketsandmarkets, (2011). Global Smartphone Security Market by Operating Systems, Ownership & Features (2011 – 2016), retrieved on 12/28/2013 from: http://www.marketsandmarkets.com/Market-Reports/world-computer-mobile-antivirus-market-156.html
Matsubara, M. (2012). A long and winding road for cybersecurity cooperation, Harvard Asia Quarterly, 14(1/2), 103-111.
Mylonas, A., Kastania, A., and Gritzalis, D. (2013). Delegate the smartphone user? Security awareness in smartphone platforms. Computers & Security, 34, 47-66
Pavlou, P. A. (2003). Consumer acceptance of electronic commerce: integrating trust and risk with the technology acceptance Model. International Journal of Electronic Commerce, 7(3), 101-134.
Riedl, E. J. (2004). An examination of long-loved asset impairments, The Accounting Review, 79(3), 823-852.
Rogers, R. (1975). A Protection motivation theory of fear appeals and attitude change,” Journal of Psychology, 91, 93-114.
Schaninger, C. M. (1976). Perceived Risk and Personality. Journal of Consumer Research, 3(2), 95-100.
Siemsen, E., Roth, A. V. , Balasubramanian, S. (2008). How motivation, opportunity, and ability drive knowledge sharing: The constraining-factor model, Journal of Operations Management, 26(3), 426-445.
Sitkin, S. B., and Pablo, A. L. (1992). Reconceptualizing the determinants of risk behavior. The Academy of Management Review, 17(1), 9-38.
Symantec Corp. (2013) Internet Security Threat Report 2013, Appendix, Vol. 18 Kay, B., Shah, J., and Verma, A., 2013, Mobile Security: McAfee consumer Trends Report
Tan, S. J. (1999). Strategies for reducing consumers` risk aversion in internet shopping, Journal of Consumer Marketing, 16(2), 163-180.
Terborg, J. R. (1977). Validation and extension of an individual differences model of work performance. Organizational Behavior and Human Performance, 18(2), 188-216.
Venkatesh, V., Thong, J. Y. L., and Xu, X. (2012). Consumer acceptance and use of information technology: Extending the unified theory of acceptance and use of technology, MIS Quarterly, 36 (1), 157-178.
Verkasalo, H., López-Nicolás, C., Molina-Castillo, F. J., and Bouwman, H. (2010). Analysis of users and non-users of smartphone applications, Telematics and Informatics, 27(3), 242-255.
Wang, HY, Liao, C., and Yang, L-H (2013). What Affects Mobile Application Use? The Roles of Consumption Values. International Journal of Marketing Studies, 5(2), 1918-7203.
描述 碩士
國立政治大學
企業管理研究所(MBA學位學程)
103363017
資料來源 http://thesis.lib.nccu.edu.tw/record/#G1033630171
資料類型 thesis
dc.contributor.advisor 洪叔民zh_TW
dc.contributor.author (Authors) 劉榕安zh_TW
dc.creator (作者) 劉榕安zh_TW
dc.date (日期) 2015en_US
dc.date.accessioned 15-Feb-2016 10:07:33 (UTC+8)-
dc.date.available 15-Feb-2016 10:07:33 (UTC+8)-
dc.date.issued (上傳時間) 15-Feb-2016 10:07:33 (UTC+8)-
dc.identifier (Other Identifiers) G1033630171en_US
dc.identifier.uri (URI) http://nccur.lib.nccu.edu.tw/handle/140.119/81259-
dc.description (描述) 碩士zh_TW
dc.description (描述) 國立政治大學zh_TW
dc.description (描述) 企業管理研究所(MBA學位學程)zh_TW
dc.description (描述) 103363017zh_TW
dc.description.abstract (摘要) 智慧型手機的出現勢必對傳統的生活模式帶來新的衝擊,產業結構、消費模式、生活模式和社會問題等都有不同程度的改變,而一些資訊安全的威脅也慢慢轉移至智慧型手機上,如何在智慧型手機的便利性和安全性取得平衡點,是不容忽視和逃避的問題。
本研究重點著墨於民眾的風險忍受程度和感知風險程度對於安裝智慧型手機防毒軟體的意圖影響。針對智慧型手機的資安防護等相關文獻中問卷,逐字翻譯並進行反覆前測,檢驗與修正,讓問項有更正確的歸類,進而探討未來智慧型手機防毒軟體發展之方向。其中列入控制變相:風險意識、使用智慧型手機上網的時間、擁有智慧型手機和基本資料等。
研究結果發現,感知風險與風險忍受度個別對於安裝防毒軟體意願均有影響,且風險忍受度會約束感知風險與安裝軟體之間的關係,而感知風險會約束風險忍受度對於安裝轉體之間的關係。
經研究結果提出有關智慧型手機防毒軟體業者行銷手法、資安防護業者建和未來產業發展方向,供各大企業或廠商在與消費者宣傳產品的一些創新建議與想法。
zh_TW
dc.description.tableofcontents 第一章、緒論 1
第一節、研究背景與目的 1
第二節、智慧型手機 3
第三節、智慧型應用軟體使用狀況 6
第四節、移動裝置的安全性 11
第五節、研究動機與目的 13
第二章、文獻探討 19
第一節、智慧型手機風險 19
第二節、風險行為 20
第三節、資訊安全察覺和風險忍受度 21
第四節、約理論與閾值 21
第五節、控制變數 25
第三章、研究架構與方法 29
第四章、資料分析 32
第一節、變數衡量與問卷設計 32
第二節、樣本資料分析 37
第三節、信度與效度分析 40
第四節、回歸模型分析 51
第五章、結論與建議 58
第一節、研究結論與建議 58
第二節、管理實務意涵與建議 60
第三節、未來研究方向 63
第四節、研究限制 63
第六章、參考文獻 64
zh_TW
dc.format.extent 1722347 bytes-
dc.format.mimetype application/pdf-
dc.source.uri (資料來源) http://thesis.lib.nccu.edu.tw/record/#G1033630171en_US
dc.subject (關鍵詞) 風險忍受度zh_TW
dc.subject (關鍵詞) 感知風險zh_TW
dc.subject (關鍵詞) 風險意識zh_TW
dc.subject (關鍵詞) 資安風險zh_TW
dc.subject (關鍵詞) 資安防護zh_TW
dc.title (題名) 利用受限因子模型研究 智慧型手機使用者對於風險的行為意圖zh_TW
dc.title (題名) A constraint factor model to study the smartphone users` behavior toward risk.en_US
dc.type (資料類型) thesisen_US
dc.relation.reference (參考文獻) 林永宏,2014,從影響行動裝置資安風險並未展現之因素探討未來行動裝置發展之研究,銘傳大學資訊管理碩士在職專班畢業論文
蔡佾潔,2012,資訊能力影響智慧型手機病毒知覺與資訊安全信任之研究,國立中興大學科技管理研究所碩士論文
徐鵬翔,2012,智慧型手機使用滿意度與品牌忠誠度之研究,國立中山大學資訊管理學系碩士論文
吳凱群,鄒仁淳,林娟娟,2012,智慧型手機使用者下載軟體意願之研究-以享樂型應用軟體為例,東吳大學資訊管理學系,文化大學資訊管理學系論文
Hunter D.R. (2002).Risk Perception and Risk Tolerance in Aircraft Pilots. National Technical Information Service, Springfield
Ajzen, I., and Fishbein, M. (1980). Understanding Attitudes and Predicting Social Behavior, Englewood Cliffs, NJ: Prentice-Hall.
Anderson, C. L., and Agarwal, R. (2010). Practicing safe computing: A multimedia empirical examination of home computer user security behavioral intentions. MIS Quarterly, 34(3), 613-643
Arachchilage, N. A. G., and Love S. (2013). A game design framework for avoiding phishing attacks, Computers in Human Behavior 29, 706–714
Baghdassarian S, Milanesi C. (2010). Forecast: mobile application stores, world-wide, 2008-14. Tec Report G00209676. Gartner.
Bettman, J. (1971). The structure of consumer choice processes, Journal of Marketing Research, 8, 465-471.
Chang, K. S. 2013, Can Smartphones Get Virus/Viruses and Malware? iPhone / Android Phone Only as Smart as Their Users in Malware Detection, retrieved on 12/24/2013 from http://kschang.hubpages.com/hub/Do-Smartphones-Get-Viruses-Why-iPhones-Android-Phones-and-Others-Are-Only-as-Smart-as-Their-Users
Chase, R. B., Jacobs, F. R., Aquilano, N. J. (2004). Production and Operations Management: Manufacturing and Services. McGraw-Hill, New York.
Constant, D., Kiesler, S., and Sproull, L. (1994). What`s mine is ours, or is it? A study of attitudes about information sharing, Information Systems Research 5(4), 400-421.
Cox, D. F. (1967). Risk Taking and Information Handling in Consumer Behavior, Harvard University Press, Boston.
Cummings, L. L., and Schwab, D. P. (1973). Performance in Organizations. Scott, Foresman and Company, Glenview, IL.
Dagon, D., Martin, T., Starner, T. (2004). Mobile phones as computing devices: The viruses are coming! IEEE Pervasive Computing, 3(4), 11–15.
Davis, F. D. (1989). Perceived usefulness, perceived ease of use, and user acceptance of information technologies, MIS Quarterly, 13(3), 319-340.
Dowling, G. R. (1986). Perceived risk: The concept and its measurement, Psychology & Marketing, 3(3), 193-210.
Egelman, S., Felt, A. P., and Wagner, D. (2013). Choice architecture and smartphone privacy: There’s a price for that, at The Economics of Information Security and Privacy, ed. Böhme, R., Springer, New York, 211-236.
Enck., W. (2011). Defending users against smartphone apps: Techniques and future directions, ICISS 2011, LYNC 7093, 49-70.
Featherman, M. S., & Pavlou, P. A. (2003). Predicting E-Services Adoption: A Perceived Risk Facets Perspective. International Journal of Human-Computer Studies, 59(4), 451-474.
Felt, A. P., Egelman, S., and Wagner, D. (2012). I’ve got 99 problems, but vibration ain’t one: A survey of smartphone users’ concerns. Proceedings of SPSM’ 12, 33-38.
Felt A, Finifter M, Chin E, Hanna S, and Wagner D. A. (2011). Survey of mobile malware in the wild. Proc. of the 1st ACM workshop on security and privacy in smartphones and mobile devices (SPSM ’11). ACM, 3-14.
Filbeck, G., Hatfield, P., & Horvath, P. (2005). Risk Aversion and Personality Type. The Journal of Behavioral Finance, 6(4), 170-180.
Filbeck, G., and Smith. L. (1996), Learning styles, teaching strategies, and predictors of success for students in corporate finance. Financial Practice and Education, 6(1), 74–85.
Fingas, J., 2013, Android tops 81 percent of smartphone market share in Q3, retrieved on 12/24/2013 from http://www.engadget.com/2013/10/31/strategy-analytics-q3-2013-phone-share/
Gao, T., Rohm, A. J., Sultan, F., and Huang, S. (2012). Antecedents of consumer attitudes toward mobile marketing: A comparative study of youth markets in the United States and China. Thunderbird International Business Review,54, 211-224
Gartner, (2013). Gartner Says Worldwide Mobile Phone Sales Declined 1.7 Percent in 2012, retrieved on 12/28/2013 from: http://www.gartner.com/newsroom/id/2335616
Gartner, (2013). Gartner Says Smartphone Sales Accounted for 55 Percent of Overall Mobile Phone Sales in Third Quarter of 2013, retrieved on 12/28/2013 from: http://www.gartner.com/newsroom/id/2623415
Goldratt, E. M. (1999). Theory of Constraints. North River Press, Great Barrington, MA.
Gross, G. (2007). Groups raise concerns about cybersecurity standards, PC World, April 25.
Howard, J. A., and Sheth, J. N. (1969). The Theory of Buyer Behavior, Wiley, New York.
Hunter, D. R. (2002). Risk Perception and Risk Tolerance in Aircraft Pilots. Retrieved from http://ntl.bts.gov/lib/19000/19800/19856/PB2003100818.pdf
Jiang, P. (2009). Consumer adoption of mobile internet services: An exploratory study. Journal of Promotion Management, 15(3), 418-454.
Johnston, A. C., and Warkentin, M. (2010). Fear appeals and information security behaviors: an empirical study. MIS Quarterly, 34(3), 549-566.
Kim, J. (2012). Developing an empirical model of college students` online shopping behavior. International Journal of Interdisciplinary Social Sciences, 6(10), 81-109.
Lee, H., Cho, H. J., Xu, W., and Fairhurst, A. (2010). The influence of consumer trait and demographics on intention to use retail self-service checkouts, Marketing Intelligence & Planning 28(1), 46-58.
Lu, H., Hsu, C., and Hsu, H. (1993). An empirical study of the effect of perceived risk upon intention to use online applications. Information Management & Computer Security, 13(2), 106-120.
MacKenzie, S. B., Podsakoff, P.M., and Podsakoff, N. P. (2011). Construct measurement and validation procedures in MIS and behavioral research: Integrating new and existing techniques, MIS Quarterly, 35(2), 293-234.
Malkiel, B. A. (1996). Random Walk Down Wall Street, 6th ed. W.W. Norton, New York.
Marketsandmarkets, (2011). Global Smartphone Security Market by Operating Systems, Ownership & Features (2011 – 2016), retrieved on 12/28/2013 from: http://www.marketsandmarkets.com/Market-Reports/world-computer-mobile-antivirus-market-156.html
Matsubara, M. (2012). A long and winding road for cybersecurity cooperation, Harvard Asia Quarterly, 14(1/2), 103-111.
Mylonas, A., Kastania, A., and Gritzalis, D. (2013). Delegate the smartphone user? Security awareness in smartphone platforms. Computers & Security, 34, 47-66
Pavlou, P. A. (2003). Consumer acceptance of electronic commerce: integrating trust and risk with the technology acceptance Model. International Journal of Electronic Commerce, 7(3), 101-134.
Riedl, E. J. (2004). An examination of long-loved asset impairments, The Accounting Review, 79(3), 823-852.
Rogers, R. (1975). A Protection motivation theory of fear appeals and attitude change,” Journal of Psychology, 91, 93-114.
Schaninger, C. M. (1976). Perceived Risk and Personality. Journal of Consumer Research, 3(2), 95-100.
Siemsen, E., Roth, A. V. , Balasubramanian, S. (2008). How motivation, opportunity, and ability drive knowledge sharing: The constraining-factor model, Journal of Operations Management, 26(3), 426-445.
Sitkin, S. B., and Pablo, A. L. (1992). Reconceptualizing the determinants of risk behavior. The Academy of Management Review, 17(1), 9-38.
Symantec Corp. (2013) Internet Security Threat Report 2013, Appendix, Vol. 18 Kay, B., Shah, J., and Verma, A., 2013, Mobile Security: McAfee consumer Trends Report
Tan, S. J. (1999). Strategies for reducing consumers` risk aversion in internet shopping, Journal of Consumer Marketing, 16(2), 163-180.
Terborg, J. R. (1977). Validation and extension of an individual differences model of work performance. Organizational Behavior and Human Performance, 18(2), 188-216.
Venkatesh, V., Thong, J. Y. L., and Xu, X. (2012). Consumer acceptance and use of information technology: Extending the unified theory of acceptance and use of technology, MIS Quarterly, 36 (1), 157-178.
Verkasalo, H., López-Nicolás, C., Molina-Castillo, F. J., and Bouwman, H. (2010). Analysis of users and non-users of smartphone applications, Telematics and Informatics, 27(3), 242-255.
Wang, HY, Liao, C., and Yang, L-H (2013). What Affects Mobile Application Use? The Roles of Consumption Values. International Journal of Marketing Studies, 5(2), 1918-7203.
zh_TW