政大機構典藏-National Chengchi University Institutional Repository(NCCUR):Item 140.119/124713
English  |  正體中文  |  简体中文  |  Post-Print筆數 : 27 |  全文笔数/总笔数 : 113148/144119 (79%)
造访人次 : 50712105      在线人数 : 277
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
搜寻范围 查询小技巧:
  • 您可在西文检索词汇前后加上"双引号",以获取较精准的检索结果
  • 若欲以作者姓名搜寻,建议至进阶搜寻限定作者字段,可获得较完整数据
  • 进阶搜寻
    政大機構典藏 > 商學院 > 資訊管理學系 > 學位論文 >  Item 140.119/124713


    请使用永久网址来引用或连结此文件: https://nccur.lib.nccu.edu.tw/handle/140.119/124713


    题名: 從消費者觀點探討信任與不信任在共享經濟中的角色:以Airbnb為例
    Discussing the role of trust and distrust in sharing economy from consumer viewpoint: The case of Airbnb
    作者: 陳彥安
    Chen, Yen-An
    贡献者: 洪為璽
    楊建民

    Hung, Wei-Hsi
    Yang, Jiann-Min

    陳彥安
    Chen, Yen-An
    关键词: 共享經濟
    信任
    不信任
    關係承諾
    持續使用意圖
    sharing economy
    trust
    distrust
    relationship commitment
    continued use intention
    日期: 2019
    上传时间: 2019-08-07 16:07:27 (UTC+8)
    摘要: 過去信任相關的研究已經很多,但不信任卻近幾年才開始被討論,且大多還是著重於信任研究。因為過去研究者把信任與不信任視為同一維度的兩端,但近年來發現信任與不信任是兩個不同的概念,反應自不同腦區,且可以同時存在。共享經濟興起後,信任議題已經被探討了幾年,但不信任在共享經濟中的研究目前還未找到一個明確的定位。本研究以Airbnb為例,欲探討出顧客信任和不信任共享經濟平台的前因是否有差異,以及其對關係承諾與持續使用意圖的影響程度是否不同,進而探討原因。
    本研究針對使用過Airbnb一次以上的民眾進行問卷調查,總共回收502份問卷,其中456份有效問卷。研究發現,顧客對平台中間商的信任有顯著影響的因素有熟悉度、資訊保護、能力、仁慈、正直與信任傾向;而顧客對平台中間商的不信任有顯著影響的因素有資訊保護、能力與正直。透過雙因素理論可以解釋在此情境下的保健因子有資訊保護、正直與能力,而激勵因子為熟悉度、資訊保護、能力、仁慈、正直與信任傾向。
    此外,研究發現顧客對平台中間商的信任會透過關係承諾中介,才影響持續使用意圖,並不會直接影響持續使用意圖,但顧客對平台中間商的不信任可以直接影響持續使用意圖,由此可知,信任與不信任在共享經濟領域中扮演不同的角色。
    There were many researchers studied “trust” in the past, but “distrust” only started to be discussed in recent years. Yet, most studies were still focused on “trust”. Trust and distrust were believed to be the opposite ends in the same dimension, but recently trust and distrust were found out to be two different concepts which react in different parts of human brain that could coexist.
    Trust issues were studied in years after the popularization of sharing economy, but there is not yet a clear understanding of distrust. With Airbnb for example, this research want to figure out whether the antecedent of the trust or distrust on sharing economy platform exist differently or not, also figuring out how they influence on relationship commitment and continued use intention.
    In this study, we surveyed people who used Airbnb more than once, and collected a total of 502 questionnaires, including 456 valid questionnaires. The study found that some factors have a significant impact on customers’ trust in intermediary, including familiarity, information protection, ability, benevolence, integrity, and trust. The factors that have a significant impact on customers’ distrust in intermediary are information protection, ability and integrity. Through Two-Factor theory, we found out that the hygiene factors in this situation include information protection, integrity and ability. The motivations are familiarity, information protection, ability, kindness, integrity and trust.
    In addition, the study found that customers` trust in intermediary will not affect continued use intention directly, it will affect it through relationship commitment. Yet, the customer`s distrust in intermediary can directly affect continued use intention. It means that trust and distrust play different roles in the sharing economy.
    參考文獻: 一、 中文部分
    1. 36Kr,Uber估值縮水至 620 億美元,但第一季虧損已減半,上網日期2019年1月22日。檢自:
    http://finance.technews.tw/2018/05/25/uber-valuation-shrinks-to-62-billion/
    2. Uber、Airbnb蟬聯美國獨角獸冠亞軍,105家企業總市值約3600億美元,上網日期2019年1月22日。檢自:https://kknews.cc/tech/l649qqb.html
    3. 德國共享經濟市值達台幣7000億元,上網日期2019年1月18日。檢自:https://www.workfun.com.tw/2018/03/7000.html
    4. 吳宗正、吳育東(2000)。LISREL模式應用於行動電話消費者滿意之研究。國立成功大學統計研究所碩士論文。
    二、 英文部分
    1. Abdul, W. K., Gaur, S. S., & Peñaloza, L. N. (2012). The determinants of customer trust in buyer–seller relationships: An empirical investigation in rural India. Australasian Marketing Journal (AMJ), 20(4), 303-313.
    2. Ajzen, I. (1991). The theory of planned behavior. Organizational behavior and human decision processes, 50(2), 179-211.
    3. Ajzen, I., & Madden, T. J. (1986). Prediction of goal-directed behavior: Attitudes, intentions, and perceived behavioral control. Journal of experimental social psychology, 22(5), 453-474.
    4. Akerlof, G. A. (1978). The market for “lemons”: Quality uncertainty and the market mechanism. In Uncertainty in economics (pp. 235-251). Academic Press.
    5. Aladwani, A. M. (2002). The development of two tools for measuring the easiness and usefulness of transactional Web sites. European Journal of Information Systems, 11(3), 223-234.
    6. Albinsson, P. A., & Yasanthi Perera, B. (2012). Alternative marketplaces in the 21st century: Building community through sharing events. Journal of consumer Behaviour, 11(4), 303-315.
    7. Allen, N. J., & Meyer, J. P. (1990). The measurement and antecedents of affective, continuance and normative commitment to the organization. Journal of occupational psychology, 63(1), 1-18.
    8. Anderson, E., & Weitz, B. (1989). Determinants of continuity in conventional industrial channel dyads. Marketing science, 8(4), 310-323.
    9. Anderson, J. P. (1972). Computer security technology planning study (Vol. 1, p. 4). ESD-TR-73-51.
    10. Arnulf, J. K., Dreyer, H. C., & Grenness, C. E. (2005). Trust and knowledge creation: how the dynamics of trust and absorptive capacity may affect supply chain management development projects. International Journal of Logistics: Research and Applications, 8(3), 225-236.
    11. Axelsson, S. (2000). The base-rate fallacy and the difficulty of intrusion detection. ACM Transactions on Information and System Security (TISSEC), 3(3), 186-205.
    12. Baba, M. L. (1999). Dangerous Liasons: Trust, Distrust, and Information Technology in American Work Organizations. Human organization, 58, 331-346.
    13. Barber, B. (1983). The logic and limits of trust.
    14. Belk, R. (2007). Why not share rather than own?. The Annals of the American Academy of Political and Social Science, 611(1), 126-140.
    15. Belk, R. (2009). Sharing. Journal of consumer research, 36(5), 715-734.
    16. Belk, R. (2014). You are what you can access: Sharing and collaborative consumption online. Journal of business research, 67(8), 1595-1600.
    17. Bewsell, G. R. (2012). Distrust, fear and emotional learning: An online auction perspective. Journal of theoretical and applied electronic commerce research, 7(2), 1-12.
    18. Bhattacherjee, A. (2001). Understanding information systems continuance: an expectation-confirmation model. MIS quarterly, 351-370.
    19. Bigley, G. A., & Pearce, J. L. (1998). Straining for shared meaning in organization science: Problems of trust and distrust. Academy of management review, 23(3), 405-421.
    20. Blau, P. M. (1964). Exchange and power in social life. New York: John Wiley and Sons.
    21. Bolton, R. N., Lemon, K. N., & Verhoef, P. C. (2004). The theoretical underpinnings of customer asset management: a framework and propositions for future research. Journal of the Academy of Marketing Science, 32(3), 271-292.
    22. Botsman, R. (2012). The currency of the new economy is trust. Ted Talks.
    23. Botsman, R., & Rogers, R. (2010). Beyond zipcar: Collaborative consumption. Harvard Business Review, 88(10), 30.
    24. Bray, J., Johns, N., & Kilburn, D. (2011). An exploratory study into the factors impeding ethical consumption. Journal of business ethics, 98(4), 597-608.
    25. Brewer, M. B., & Silver, M. (1978). Ingroup bias as a function of task characteristics. European Journal of Social Psychology, 8(3), 393-400.
    26. Butler Jr, J. K. (1991). Toward understanding and measuring conditions of trust: Evolution of a conditions of trust inventory. Journal of management, 17(3), 643-663.
    27. Butler Jr, J. K., & Cantrell, R. S. (1984). A behavioral decision theory approach to modeling dyadic trust in superiors and subordinates. Psychological reports, 55(1), 19-28.
    28. Chai, S., & Kim, M. (2010). What makes bloggers share knowledge? An investigation on the role of trust. International journal of information management, 30(5), 408-415.
    29. Chen, D., Lai, F., & Lin, Z. (2014). A trust model for online peer-to-peer lending: a lender’s perspective. Information Technology and Management, 15(4), 239-254.
    30. Cho, J. (2006). The mechanism of trust and distrust formation and their relational outcomes. Journal of retailing, 82(1), 25-35.
    31. Coleman, T. F., & Li, Y. (2000). A trust region and affine scaling interior point method for nonconvex minimization with linear inequality constraints. Mathematical Programming, 88(1), 1-31.
    32. Company value of Airbnb from 2016 to 2018 (in billion U.S. dollars). Retrieved From https://www.statista.com/statistics/339845/company-value-and-equity-funding-of-airbnb/
    33. Cook, J., & Wall, T. (1980). New work attitude measures of trust, organizational commitment and personal need non‐fulfilment. Journal of occupational psychology, 53(1), 39-52.
    34. Cook, K. S., & Emerson, R. M. (1978). Power, equity and commitment in exchange networks. American sociological review, 721-739.
    35. Crosby, L. A., Evans, K. R., & Cowles, D. (1990). Relationship quality in services selling: an interpersonal influence perspective. Journal of marketing, 54(3), 68-81.
    36. Crosby, L. A., Evans, K. R., & Cowles, D. (1990). Relationship quality in services selling: an interpersonal influence perspective. Journal of marketing, 54(3), 68-81.
    37. Daniels, T. E., & Spafford, E. H. (1999). Identification of host audit data to detect attacks on low-level IP vulnerabilities. Journal of Computer Security, 7(1), 3-35.
    38. Davis, F. D., Bagozzi, R. P., & Warshaw, P. R. (1989). User acceptance of computer technology: a comparison of two theoretical models. Management science, 35(8), 982-1003.
    39. Delone, W. H., & McLean, E. R. (2003). The DeLone and McLean model of information systems success: a ten-year update. Journal of management information systems, 19(4), 9-30.
    40. Denning, D. E. (1987). An intrusion-detection model. IEEE Transactions on software engineering, (2), 222-232.
    41. Denning, D. E., & Branstad, D. K. (1996). A taxonomy for key escrow encryption systems. Communications of the ACM, 39(3), 34-40.
    42. Deutsch, M. (1958). Trust and suspicion. Journal of conflict resolution, 2(4), 265-279.
    43. Deutsch, M. (1960). The effect of motivational orientation upon trust and suspicion. Human relations, 13(2), 123-139.
    44. Deutsch, T. (2003). Brand new: How entrepreneurs earned consumers` trust from Wedgwood to Dell. The Journal of American History, 90(2), 683.
    45. Devaraj, S., Fan, M., & Kohli, R. (2002). Antecedents of B2C channel satisfaction and preference: validating e-commerce metrics. Information systems research, 13(3), 316-333.
    46. Dimoka, A. (2010). What does the brain tell us about trust and distrust? Evidence from a functional neuroimaging study. Mis Quarterly, 373-396.
    47. Doney, P. M., & Cannon, J. P. (1997). An examination of the nature of trust in buyer–seller relationships. Journal of marketing, 61(2), 35-51.
    48. Dwyer, F. R., Schurr, P. H., & Oh, S. (1987). Developing buyer-seller relationships. Journal of marketing, 51(2), 11-27.
    49. Eckhardt, G. M., Belk, R., & Devinney, T. M. (2010). Why don`t consumers consume ethically?. Journal of Consumer Behaviour, 9(6), 426-436.
    50. Einav, L., Farronato, C., & Levin, J. (2016). Peer-to-peer markets. Annual Review of Economics, 8, 615-635.
    51. Eisingerich, A. B., & Bell, S. J. (2008). Perceived service quality and customer trust: does enhancing customers` service knowledge matter?. Journal of service research, 10(3), 256-268.
    52. Ert, E., Fleischer, A., & Magen, N. (2016). Trust and reputation in the sharing economy: The role of personal photos in Airbnb. Tourism Management, 55, 62-73.
    53. Fang, B., Ye, Q., & Law, R. (2016). Effect of sharing economy on tourism industry employment. Annals of Tourism Research, 57(3), 264-267.
    54. Farmer, R. (2013). Share and care alike: What collaborative consumption can mean to families. Richmond Family Magazine. Retrieved from http://richmondfamilymagazine.com/article/share-care-alike/
    55. Farris, G., Senner, E., and Butterfield, D. "Trust, Culture, and Organizational Behavior," Industrial Relations (12), 1973, pp. 144-157.
    56. Felson, M., & Spaeth, J. L. (1978). Community structure and collaborative consumption: A routine activity approach. American behavioral scientist, 21(4), 614-624.
    57. Fishbein, M., & Ajzen, I. (1977). Belief, attitude, intention, and behavior: An introduction to theory and research.
    58. Frincke, D. (2000). Balancing cooperation and risk in intrusion detection. ACM Transactions on Information and System Security (TISSEC), 3(1), 1-29.
    59. Gabarro, J. J. (1978). The development of trust, influence and expectations. Interpersonal behavior: Communication and understanding in relationships, 290-303.
    60. Ganesan, S. (1994). Determinants of long-term orientation in buyer-seller relationships. Journal of marketing, 58(2), 1-19.
    61. Gefen, D. (1997). Building users` trust in freeware providers and the effects of this trust on users` perceptions of usefulness, ease of use and intended use of freeware. Georgia State University.
    62. Gefen, D. (2000). E-commerce: the role of familiarity and trust. Omega, 28(6), 725-737.
    63. Gefen, D., & Silver, M. (1999). Lessons learned from the successful adoption of an ERP system. In Proceedings of the 5th international Conference of the Decision Sciences Institute(pp. 1054-1057).
    64. Gefen, D., & Straub, D. W. (2004). Consumer trust in B2C e-Commerce and the importance of social presence: experiments in e-Products and e-Services. Omega, 32(6), 407-424.
    65. Gefen, D., Benbasat, I., & Pavlou, P. (2008). A research agenda for trust in online environments. Journal of Management Information Systems, 24(4), 275-286.
    66. Gefen, D., Karahanna, E., & Straub, D. W. (2003a). Inexperience and experience with online stores: The importance of TAM and trust. IEEE Transactions on engineering management, 50(3), 307-321.
    67. Gefen, D., Karahanna, E., & Straub, D. W. (2003b). Trust and TAM in online shopping: an integrated model. MIS quarterly, 27(1), 51-90.
    68. Giffin, K. (1967). The contribution of studies of source credibility to a theory of interpersonal trust in the communication process. Psychological bulletin, 68(2), 104.
    69. Gillenson, M. L., & Sherrell, D. L. (2002). Enticing online consumers: an extended technology acceptance perspective. Information & management, 39(8), 705-719.
    70. Gillespie, N., & Dietz, G. (2009). Trust repair after an organization-level failure. Academy of Management Review, 34(1), 127-145.
    71. Good, D. (2000). Individuals, interpersonal relations, and trust. Trust: Making and breaking cooperative relations, 31-48.
    72. Gordon, L. A., & Loeb, M. P. (2002). The economics of information security investment. ACM Transactions on Information and System Security (TISSEC), 5(4), 438-457.
    73. Grovier T. 1994. "An Epistemology of Trust," International Journal of Moral Social Studies (8), pp. 155-174.
    74. Guttman, B., & Roback, E. A. (1995). An introduction to computer security: the NIST handbook. DIANE Publishing.
    75. Hair, J. F., Anderson, R. E., Tatham, R. L., Black, W. (1998). Multivariate Data Analysis with Readings, 5th ed., New Jersey, Prentice Hall.
    76. Hamari, J., Sjöklint, M., & Ukkonen, A. (2016). The sharing economy: Why people participate in collaborative consumption. Journal of the association for information science and technology, 67(9), 2047-2059.
    77. Hardin, R. (1993). The street-level epistemology of trust. Politics & society, 21(4), 505-529.
    78. Hawlitschek, F., Teubner, T., & Weinhardt, C. (2016). Trust in the sharing economy. Die Unternehmung, 70(1), 26-44.
    79. Hofstede, G. (1980). Motivation, leadership, and organization: do American theories apply abroad?. Organizational dynamics, 9(1), 42-63.
    80. Hosmer, L. T. (1995). Trust: The connecting link between organizational theory and philosophical ethics. Academy of management Review, 20(2), 379-403.
    81. Hsiao, R. L. (2003). Technology fears: distrust and cultural persistence in electronic marketplace adoption. The Journal of Strategic Information Systems, 12(3), 169-199.
    82. Hsieh, J. P. A., Rai, A., & Keil, M. (2008). Understanding digital inequality: Comparing continued use behavioral models of the socio-economically advantaged and disadvantaged. MIS quarterly, 97-126.
    83. Herzberg, F., Snyderman, B. B., & Mausner, B. (1966). The Motivation to Work: 2d Ed. J. Wiley.
    84. Jarvenpaa, S. L., Tractinsky, N., & Saarinen, L. (1999). Consumer trust in an Internet store: A cross-cultural validation. Journal of Computer-Mediated Communication, 5(2), JCMC526.
    85. Jones, K., & Leonard, L. N. (2008). Trust in consumer-to-consumer electronic commerce. Information & management, 45(2), 88-95.
    86. Jöreskog, K. G. (1970). A general method for estimating a linear structural equation system. ETS Research Bulletin Series, 1970(2), i-41.
    87. Kaplan, A. M., & Haenlein, M. (2010). Users of the world, unite! The challenges and opportunities of Social Media. Business horizons, 53(1), 59-68.
    88. Kee, H. W., & Knox, R. E. (1970). Conceptual and methodological considerations in the study of trust and suspicion. Journal of conflict resolution, 14(3), 357-366.
    89. Kenning, P., Plassmann, H., & Ahlert, D. (2007). Applications of functional magnetic resonance imaging for market research. Qualitative Market Research: An International Journal, 10(2), 135-152.
    90. Kerlinger, F.N. (1999). Foundations of Behavioral Research (2nd ed.). New York: Holt, Rinehart and Winston Inc.
    91. Kim, C., Tao, W., Shin, N., & Kim, K. S. (2010). An empirical study of customers’ perceptions of security and trust in e-payment systems. Electronic commerce research and applications, 9(1), 84-95.
    92. Kim, D. J., Ferrin, D. L., & Rao, H. R. (2008). A trust-based consumer decision-making model in electronic commerce: The role of trust, perceived risk, and their antecedents. Decision support systems, 44(2), 544-564.
    93. Konrad, A., & Mac, R. (2014). Airbnb cofounders to become first sharing economy billionaires as company nears $10 billion valuation. Forbes, 3, 20. Retrieved from http://www.forbes. com/sites/alexkonrad/2014/03/20/airbnb-cofounders-are-billionaires/
    94. Koufaris, M. (2002). Applying the technology acceptance model and flow theory to online consumer behavior. Information systems research, 13(2), 205-223.
    95. Kramer, R. M. (1999). Trust and distrust in organizations: Emerging perspectives, enduring questions. Annual review of psychology, 50(1), 569-598.
    96. LARSEN, A. 1999. Global security survey: Virus attack. InformationWeek.Com. Retrieved from http://www. informationweek.com/743/security.htm.
    97. Larzelere, R. E., & Huston, T. L. (1980). The dyadic trust scale: Toward understanding interpersonal trust in close relationships. Journal of Marriage and the Family, 595-604.
    98. Lashinsky, A., 2015. Uber: an oral history. Retrieved from http://fortune.com/ 2015/06/03/uber-an-oral-history/
    99. LeDoux, J. (2003). The emotional brain, fear, and the amygdala. Cellular and molecular neurobiology, 23(4-5), 727-738.
    100. Lee, D., Park, J., & Ahn, J. H. (2001). On the explanation of factors affecting e-commerce adoption. ICIS 2001 Proceedings, 14.
    101. Lemon, K. N., Rust, R. T., & Zeithaml, V. A. (2001). What drives customer equity?. Marketing management, 10(1), 20-25.
    102. Leonard, L. N. (2012). Attitude influencers in C2C e-commerce: Buying and selling. Journal of Computer Information Systems, 52(3), 11-17.
    103. Lewicki, R. J., & Bunker, B. B. (1994). Trust in Relationships: A Model of Trust Development and Decline, Max M. Fisher College of Business, Ohio State University.
    104. Lewicki, R. J., McAllister, D. J., & Bies, R. J. (1998). Trust and distrust: New relationships and realities. Academy of management Review, 23(3), 438-458.
    105. Lewis, J. D., & Weigert, A. (1985). Trust as a social reality. Social forces, 63(4), 967-985.
    106. Li, D., Browne, G. J., & Chau, P. Y. (2006). An empirical investigation of web site use using a commitment‐based model. Decision Sciences, 37(3), 427-444.
    107. Li, D., Browne, G. J., & Wetherbe, J. C. (2006). Why do internet users stick with a specific web site? A relationship perspective. International journal of electronic commerce, 10(4), 105-141.
    108. Liang, H., Laosethakul, K., Lloyd, S. J., & Xue, Y. (2005). Information systems and health care-I: trust, uncertainty, and online prescription filling. Communications of the Association for Information Systems, 15(1), 2.
    109. Lu, Y., Zhang, L., & Wang, B. (2009). A multidimensional and hierarchical model of mobile service quality. Electronic Commerce Research and Applications, 8(5), 228-240.
    110. Lu, Y., Zhao, L., & Wang, B. (2010). From virtual community members to C2C e-commerce buyers: Trust in virtual communities and its effect on consumers’ purchase intention. Electronic Commerce Research and Applications, 9(4), 346-360.
    111. Luhmann, N. (2018). Trust and power. John Wiley & Sons.
    112. Mathieu, J. E., & Zajac, D. M. (1990). A review and meta-analysis of the antecedents, correlates, and consequences of organizational commitment. Psychological bulletin, 108(2), 171.
    113. Mayer, R. C., & Davis, J. H. (1999). The effect of the performance appraisal system on trust for management: A field quasi-experiment. Journal of applied psychology, 84(1), 123.
    114. Mayer, R. C., Davis, J. H., & Schoorman, F. D. (1995). An integrative model of organizational trust. Academy of management review, 20(3), 709-734.
    115. McAllister, D. J. (1995). Affect-and cognition-based trust as foundations for interpersonal cooperation in organizations. Academy of management journal, 38(1), 24-59..
    116. McKnight, D. H., & Chervany, N. (2001). While trust is cool and collected, distrust is fiery and frenzied: A model of distrust concepts. Amcis 2001 proceedings, 171.
    117. McKnight, D. H., Choudhury, V., & Kacmar, C. (2000). Trust in e-commerce vendors: a two-stage model. ICIS 2000 Proceedings, 54.
    118. McKnight, D. H., Choudhury, V., & Kacmar, C. (2002). Developing and validating trust measures for e-commerce: An integrative typology. Information systems research, 13(3), 334-359.
    119. McKnight, D. H., Cummings, L. L., & Chervany, N. L. (1998). Initial trust formation in new organizational relationships. Academy of Management review, 23(3), 473-490.
    120. McKnight, D. H., Kacmar, C. J., & Choudhury, V. (2004). Dispositional trust and distrust distinctions in predicting high-and low-risk internet expert advice site perceptions. E-Service, 3(2), 35-58.
    121. Meyer, J. P., & Allen, N. J. (1984). Testing the" side-bet theory" of organizational commitment: Some methodological considerations. Journal of applied psychology, 69(3), 372.
    122. Mishler, W., & Rose, R. (1997). Trust, distrust and skepticism: Popular evaluations of civil and political institutions in post-communist societies. The journal of politics, 59(2), 418-451.
    123. Möhlmann, M. (2016). Digital trust and peer-to-peer collaborative consumption platforms: a mediation analysis. Available at SSRN 2813367.
    124. Morgan, R. M., & Hunt, S. D. (1994). The commitment-trust theory of relationship marketing. Journal of marketing, 58(3), 20-38.
    125. Mueller, R. O. (1996). Basic principles of structural equation modeling—An introduction to LISREL and EQS. New York: Springer-Verlag.
    126. Muralidhar, K., Batra, D., & Kirs, P. J. (1995). Accessibility, security, and accuracy in statistical databases: The case for the multiplicative fixed data perturbation approach. Management Science, 41(9), 1549-1564.
    127. Osborn, S., Sandhu, R., & Munawer, Q. (2000). Configuring role-based access control to enforce mandatory and discretionary access control policies. ACM Transactions on Information and System Security (TISSEC), 3(2), 85-106.
    128. Ou, C. X., & Sia, C. L. (2010). Consumer trust and distrust: An issue of website design. International Journal of Human-Computer Studies, 68(12), 913-934.
    129. Palmatier, R. W., Dant, R. P., Grewal, D., & Evans, K. R. (2006). Factors influencing the effectiveness of relationship marketing: a meta-analysis. Journal of marketing, 70(4), 136-153.
    130. Parasuraman, A., Zeithaml, V. A., & Berry, L. L. (1988). Servqual: A multiple-item scale for measuring consumer perc. Journal of retailing, 64(1), 12.
    131. Pavlou, P. (2001). Integrating trust in electronic commerce with the technology acceptance model: model development and validation. Amcis 2001 proceedings, 159.
    132. Pavlou, P. A., & Gefen, D. (2004). Building effective online marketplaces with institution-based trust. Information systems research, 15(1), 37-59.
    133. Peyravian, M., Roginsky, A., & Zunic, N. (1999). Hash-based encryption system. Computers & Security, 4(18), 345-350.
    134. Pfleeger, C. P., & Pfleeger, S. L. (2002). Security in computing. Prentice Hall Professional Technical Reference.
    135. Price, J. A. (1975). Sharing: The integration of intimate economies. Anthropologica, 3-27.
    136. Price, J., Ratke, N., & Moen, M. A. (1980). Understanding attitudes and predicting social behavior..
    137. Reichheld, F. F., & Schefter, P. (2000). E-loyalty: your secret weapon on the web. Harvard business review, 78(4), 105-113.
    138. Riker, W. H. (1971). The nature of trust. In J. T. Tedeschi (Ed.), Perspectives on social power (pp. 63– 81). Chicago: Aldine.
    139. Ring, P. S., & Van de Ven, A. H. (1992). Structuring cooperative relationships between organizations. Strategic management journal, 13(7), 483-498.
    140. Robert, L. P., Denis, A. R., & Hung, Y. T. C. (2009). Individual swift trust and knowledge-based trust in face-to-face and virtual team members. Journal of Management Information Systems, 26(2), 241-279.
    141. Robinson, S. L. (1996). Trust and breach of the psychological contract. Administrative science quarterly, 41(4).
    142. Rosenburg, H. Occupations and Values, Free Press, Glencoe, IL, 1957.
    143. Ross, W., & LaCroix, J. (1996). Multiple meanings of trust in negotiation theory and research: A literature review and integrative model. International Journal of Conflict Management, 7(4), 314-360.
    144. Rotter, J. B. (1967). A new scale for the measurement of interpersonal trust 1. Journal of personality, 35(4), 651-665.
    145. Rotter, J. B. (1971). Generalized expectancies for interpersonal trust. American psychologist, 26(5), 443.
    146. Rousseau, D. M., Sitkin, S. B., Burt, R. S., & Camerer, C. (1998). Not so different after all: A cross-discipline view of trust. Academy of management review, 23(3), 393-404.
    147. Sandhu, R. S. (1998). Role-based access control. In Advances in computers (Vol. 46, pp. 237-286). Elsevier.
    148. Schneier, B. (2007). Applied cryptography: protocols, algorithms, and source code in C. john wiley & sons.
    149. Schurr, P. H., & Ozanne, J. L. (1985). Influences on exchange processes: Buyers` preconceptions of a seller`s trustworthiness and bargaining toughness. Journal of consumer research, 11(4), 939-953.
    150. Shapiro, S. P. (1987). The social control of impersonal trust. American journal of Sociology, 93(3), 623-658.
    151. Singh, J., & Sirdeshmukh, D. (2000). Agency and trust mechanisms in consumer satisfaction and loyalty judgments. Journal of the Academy of marketing Science, 28(1), 150-167.
    152. Sitkin, S. B., & Roth, N. L. (1993). Explaining the limited effectiveness of legalistic “remedies” for trust/distrust. Organization science, 4(3), 367-392.
    153. Slonim, J., Chiasson, T., Gates, C., & McAllister, M. (2001). An extensible, human-centric framework that promotes universal access to electronic commerce. In Electronic Commerce Technologies (pp. 116-126). Springer, Berlin, Heidelberg.
    154. So, K. K. F., Oh, H., & Min, S. (2018). Motivations and constraints of Airbnb consumers: Findings from a mixed-methods approach. Tourism Management, 67, 224-236.
    155. Schwab, D.P., 2005. Research Methods for Organizational Studies, (2nd ed.) Mahwah, NJ: Lawrence Erlbaum Associates.
    156. Stack, L. C. (1978). Trust. In H. London & J. E. Exner, Jr. (Eds.), Dimensionality of personality (pp. 561–599). New York: Wiley
    157. Stack, L.C. "Trust," in: Dimensionality of Personality H. London and J.E.J. Exner (eds.), Wiley, New York, 1988, pp. 561-599.
    158. Stokes, K., Clarence, E., Anderson, L., & Rinne, A. (2014). Making sense of the UK collaborative economy (pp. 1-47). London: Nesta.
    159. Sundararajan, A. (2016). The sharing economy: The end of employment and the rise of crowd-based capitalism. Mit Press.
    160. Swift, T. (2001). Trust, reputation and corporate accountability to stakeholders. Business Ethics: A European Review, 10(1), 16-26.
    161. Sztompka, P. (1999). Trust: A sociological theory. Cambridge University Press.
    162. Tang, Z., Hu, Y., & Smith, M. D. (2008). Gaining trust through online privacy protection: Self-regulation, mandatory standards, or caveat emptor. Journal of Management Information Systems, 24(4), 153-173.
    163. Tardy, C. H. (1988). Interpersonal evaluations: Measuring attraction and trust. A handbook for the study of human communication, 269-283.
    164. Teubner, T., Hawlitschek, F., & Gimpel, H. (2016). Motives in the sharing economy: An empirical investigation of drivers and impediments of peer-to-peer sharing. Working paper.
    165. Thompson, L., & Spanier, G. B. (1983). The end of marriage and acceptance of marital termination. Journal of Marriage and the Family, 103-113.
    166. Trotter, A. (2002). Plagiarism controversy engulfs Kansas school. Education week, 21(29), 5.
    167. Ullmann-Margalit, E. (2004). Trust, Distrust, and In Between. Russell Sage Foundation.
    168. Van der Heijden, H., Verhagen, T., & Creemers, M. (2003). Understanding online purchase intentions: contributions from technology and trust perspectives. European journal of information systems, 12(1), 41-48.
    169. Vigna, G., & Kemmerer, R. A. (1999). NetSTAT: A network-based intrusion detection system. Journal of computer security, 7(1), 37-71.
    170. Vlaar, P. W., Van den Bosch, F. A., & Volberda, H. W. (2007). On the evolution of trust, distrust, and formal coordination and control in interorganizational relationships: Toward an integrative framework. Group & Organization Management, 32(4), 407-428.
    171. Wang, C., & Zhang, P. (2012). The evolution of social commerce: The people, management, technology, and information dimensions. CAIS, 31(5).
    172. Watson, R. T., Pitt, L. F., & Kavan, C. B. (1998). Measuring information systems service quality: lessons from two longitudinal case studies. MIS quarterly, 61-79.
    173. Webb, W. M., & Worchel, P. (1986). Trust and distrust. Psychology of intergroup relations, 213-228.
    174. Weber, T. A. (2014). Intermediation in a sharing economy: insurance, moral hazard, and rent extraction. Journal of Management Information Systems, 31(3), 35-71.
    175. Williams, M. (2001). In whom we trust: Group membership as an affective context for trust development. Academy of management review, 26(3), 377-396.
    176. Williams, M. (2007). Building genuine trust through interpersonal emotion management: A threat regulation model of trust and collaboration across boundaries. Academy of Management Review, 32(2), 595-621..
    177. Williamson, O. (1985). Williamson OE The Economic Institutions of Capitalism.
    178. Wixom, B. H., & Todd, P. A. (2005). A theoretical integration of user satisfaction and technology acceptance. Information systems research, 16(1), 85-102.
    179. Worchel, P. (1979). Trust and distrust. The social psychology of intergroup relations, 174, 187.
    180. Wrightsman, L. S. (1991). Interpersonal trust and attitudes toward human nature.
    181. Yang, S. U., Kang, M., & Cha, H. (2015). A study on dialogic communication, trust, and distrust: Testing a scale for measuring organization–public dialogic communication (OPDC). Journal of Public Relations Research, 27(2), 175-192.
    182. Yao-Hua Tan, W. T. (2000). Toward a generic model of trust for electronic commerce. International journal of electronic commerce, 5(2), 61-74.
    183. Yoon, H. S., & Occeña, L. G. (2015). Influencing factors of trust in consumer-to-consumer electronic commerce with gender and age. International Journal of Information Management, 35(3), 352-363.
    184. Zand, D. E. (1972). Trust and managerial problem solving. Administrative science quarterly, 229-239.
    185. Zervas, G., Proserpio, D., & Byers, J. W. (2017). The rise of the sharing economy: Estimating the impact of Airbnb on the hotel industry. Journal of marketing research, 54(5), 687-705.
    186. Zucker, L. G. (1986). Production of trust: Institutional sources of economic structure, 1840-1920. Research in organizational behavior, 8, 53-111.

    187. Wiseman, S. (1986, April). A secure capability computer system. In 1986 IEEE Symposium on Security and Privacy(pp. 86-86). IEEE.
    188. Avolio, B., Yammarino, F.J., & Bass, B.M., 1991. Identifying Common Methods Variance with Data Collected from a Single Source: An Unresolved Sticky Issue, Journal of Management, 17(3) : 571-587.
    189. Simmons, G. J. (1993, December). Cryptanalysis and protocol failures. In Proceedings of the 1st ACM conference on Computer and communications security (pp. 213-214). ACM.
    190. Cofta, P. (2006, August). Distrust. In Proceedings of the 8th international conference on Electronic commerce: The new e-commerce: innovations for conquering current barriers, obstacles and limitations to conducting successful business on the internet (pp. 250-258). ACM.
    191. McKnight, D. H., & Choudhury, V. (2006, August). Distrust and trust in B2C e-commerce: Do they differ?. In Proceedings of the 8th international conference on Electronic commerce: The new e-commerce: innovations for conquering current barriers, obstacles and limitations to conducting successful business on the internet (pp. 482-491). ACM.
    192. Lieberman, J. K. (1981). The litigious society (pp. 8-25). New York: Basic Books.
    描述: 碩士
    國立政治大學
    資訊管理學系
    106356028
    資料來源: http://thesis.lib.nccu.edu.tw/record/#G0106356028
    数据类型: thesis
    DOI: 10.6814/NCCU201900485
    显示于类别:[資訊管理學系] 學位論文

    文件中的档案:

    档案 大小格式浏览次数
    602801.pdf1964KbAdobe PDF20检视/开启


    在政大典藏中所有的数据项都受到原著作权保护.


    社群 sharing

    著作權政策宣告 Copyright Announcement
    1.本網站之數位內容為國立政治大學所收錄之機構典藏,無償提供學術研究與公眾教育等公益性使用,惟仍請適度,合理使用本網站之內容,以尊重著作權人之權益。商業上之利用,則請先取得著作權人之授權。
    The digital content of this website is part of National Chengchi University Institutional Repository. It provides free access to academic research and public education for non-commercial use. Please utilize it in a proper and reasonable manner and respect the rights of copyright owners. For commercial use, please obtain authorization from the copyright owner in advance.

    2.本網站之製作,已盡力防止侵害著作權人之權益,如仍發現本網站之數位內容有侵害著作權人權益情事者,請權利人通知本網站維護人員(nccur@nccu.edu.tw),維護人員將立即採取移除該數位著作等補救措施。
    NCCU Institutional Repository is made to protect the interests of copyright owners. If you believe that any material on the website infringes copyright, please contact our staff(nccur@nccu.edu.tw). We will remove the work from the repository and investigate your claim.
    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - 回馈