English  |  正體中文  |  简体中文  |  Post-Print筆數 : 27 |  Items with full text/Total items : 113324/144300 (79%)
Visitors : 51131688      Online Users : 867
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version
    政大機構典藏 > 商學院 > 資訊管理學系 > 學位論文 >  Item 140.119/145736
    Please use this identifier to cite or link to this item: https://nccur.lib.nccu.edu.tw/handle/140.119/145736


    Title: 一個用於解決NFC行動付款服務誤解之研究
    An investigation of addressing misconceptions in using NFC mobile payment service
    Authors: 游家和
    Yu, Chia-Ho
    Contributors: 杜雨儒
    Tu, Yu-Ju
    游家和
    Yu, Chia-Ho
    Keywords: NFC行動支付
    誤解
    輕推理論
    隱私政策
    安全政策
    NFC mobile payment
    Misconception
    Nudge
    Privacy policy
    Security policy
    Date: 2023
    Issue Date: 2023-07-06 16:20:05 (UTC+8)
    Abstract: 在COVID-19疫情與快速數位轉型的背景下,近場通訊 (NFC)行動支付服務的使用有了顯著的成長,然而,依舊存在一群人對其持抵制的態度,因此了解其抵制背後的原因並找到有效的解決方案顯得至關重要。除了資安疑慮,對服務的誤解同時也是提升使用率的主要阻礙之一,透過解除這些誤解,我們預計服務的使用率將會得到提升。
    在本研究中採用了輕推 (Nudge) 機制來制定關於資料隱私與安全的同意政策,目標為確保使用者閱讀該政策內容,提升他們對服務的理解。為了評估這些政策對服務使用率的影響,透過進行實驗,將參與者分配到三個實驗組與一個對照組,並藉由雙重差分法,評估政策內容對實驗結果的影響,研究結果顯示,同時具備隱私與安全政策的組別有最顯著的使用率提升。結論,本研究證明了同意政策在減少使用者對NFC行動支付的誤解以及促進服務的使用率上有著明顯的成效與影響。
    Amidst the COVID-19 pandemic and rapid digital transformation, the use of near field communication (NFC) mobile payment services has grown significantly. However, some individuals resist its adoption. Understanding the reasons behind their reluctance and finding an effective solution is paramount. Cybersecurity concerns, in addition to misconceptions, are the primary deterrent to its adoption. By dispelling these misconceptions, we anticipate a boost in the adoption rate of NFC mobile payment services.
    In this study, we employ the nudge mechanism to develop a consent policy, addressing data privacy and security. We aim to enhance the individuals’ understanding by ensuring they read and comprehend the policy before utilizing the service. To assess the impact of these policies on service adoption, we conduct a randomized experiment, assigning participants to three treatment groups and a control group. Employing the difference-in-differences method, we estimate the causal effect of the policy content. Our findings reveal that the coexistence of privacy and security policies leads to the highest increase in adoption rates. This suggests that our consent policy successfully mitigates biases held by individuals. In conclusion, our study demonstrates the efficacy of the consent policy in reducing misconceptions and fostering greater acceptance of NFC mobile payment services.
    Reference: Ajzen, I. 1985. "From Intentions to Actions: A Theory of Planned Behavior," in Action Control. Springer, pp. 11-39.
    Al-Tamimi, M., and Al-Haj, A. 2017. "Online Security Protocol for Nfc Mobile Payment Applications," 2017 8th International Conference on Information Technology (ICIT): IEEE, pp. 827-832.
    Ali, M., Saeed, M. M. S., Ali, M. M., and Haidar, N. 2011. "Determinants of Helmet Use Behaviour among Employed Motorcycle Riders in Yazd, Iran Based on Theory of Planned Behaviour," Injury (42:9), pp. 864-869.
    Alrawais, A. 2020. "Security Issues in near Field Communications (Nfc)," International Journal of Advanced Computer Science and Applications (11:11).
    Apple. 2023. "Apple Pay & Privacy." from https://www.apple.com/legal/privacy/data/en/apple-pay/
    Cambou, B. 2017. "Enhancing Secure Elements—Technology and Architecture," Foundations of Hardware IP Protection), pp. 205-231.
    Champion, V. L., and Skinner, C. S. 2008. "The Health Belief Model," Health behavior and health education: Theory, research, and practice (4), pp. 45-65.
    Chenoweth, T., Minch, R., and Gattiker, T. 2009. "Application of Protection Motivation Theory to Adoption of Protective Technologies," 2009 42nd Hawaii International Conference on System Sciences: IEEE, pp. 1-10.
    Clough, B. A., and Casey, L. M. 2011. "Technological Adjuncts to Increase Adherence to Therapy: A Review," Clinical psychology review (31:5), pp. 697-710.
    Davis, F. D. 1989. "Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology," MIS quarterly), pp. 319-340.
    Davis, F. D. 1993. "User Acceptance of Information Technology: System Characteristics, User Perceptions and Behavioral Impacts," International journal of man-machine studies (38:3), pp. 475-487.
    Dennis, A. R., Yuan, L., Feng, X., Webb, E., and Hsieh, C. J. 2020. "Digital Nudging: Numeric and Semantic Priming in E-Commerce," Journal of management information systems (37:1), pp. 39-65.
    Fishbein, M., and Ajzen, I. 1975. "Belief, Attitude, Intention and Behaviour: An Introduction to Theory and Research. In Addisonwesley Reading," M.(Ed.)).
    Grindley, E. J., Zizzi, S. J., and Nasypany, A. M. 2008. "Use of Protection Motivation Theory, Affect, and Barriers to Understand and Predict Adherence to Outpatient Rehabilitation," Physical Therapy (88:12), pp. 1529-1540.
    Gupta, A., and Arora, N. 2017. "Consumer Adoption of M-Banking: A Behavioral Reasoning Theory Perspective," International Journal of Bank Marketing).
    Guthrie, C. 2002. "Prospect Theory, Risk Preference, and the Law," Nw. UL Rev. (97), p. 1115.
    Hew, J.-J., Leong, L.-Y., Tan, G. W.-H., Ooi, K.-B., and Lee, V.-H. 2019. "The Age of Mobile Social Commerce: An Artificial Neural Network Analysis on Its Resistances," Technological Forecasting and Social Change (144), pp. 311-324.
    Huh, J. H., Verma, S., Rayala, S. S. V., Bobba, R. B., Beznosov, K., and Kim, H. 2017. "I Don’t Use Apple Pay Because It’s Less Secure...: Perception of Security and Usability in Mobile Tap-and-Pay," Workshop on Usable Security, San Diego, CA.
    Joachim, V., Spieth, P., and Heidenreich, S. 2018. "Active Innovation Resistance: An Empirical Study on Functional and Psychological Barriers to Innovation Adoption in Different Contexts," Industrial Marketing Management (71), pp. 95-107.
    Jones, B. D. 1999. "Bounded Rationality," Annual review of political science (2:1), pp. 297-321.
    Krishna, B., Krishnan, S., and Sebastian, M. 2022. "Examining the Relationship between National Cybersecurity Commitment, Culture, and Digital Payment Usage: An Institutional Trust Theory Perspective," Information Systems Frontiers), pp. 1-29.
    Kukafka, R., Johnson, S. B., Linfante, A., and Allegrante, J. P. 2003. "Grounding a New Information Technology Implementation Framework in Behavioral Science: A Systematic Analysis of the Literature on It Use," Journal of biomedical informatics (36:3), pp. 218-227.
    Levy, J. S. 1996. "Loss Aversion, Framing, and Bargaining: The Implications of Prospect Theory for International Conflict," International Political Science Review (17:2), pp. 179-195.
    Li, J., Wang, J., Wangh, S., and Zhou, Y. 2019. "Mobile Payment with Alipay: An Application of Extended Technology Acceptance Model," IEEE Access (7), pp. 50380-50387.
    Lian, J.-W., and Yen, D. C. 2014. "Online Shopping Drivers and Barriers for Older Adults: Age and Gender Differences," Computers in human behavior (37), pp. 133-143.
    Lysyakov, M., and Viswanathan, S. 2022. "Threatened by Ai: Analyzing Users’ Responses to the Introduction of Ai in a Crowd-Sourcing Platform," Available at SSRN 3758338).
    Neighbors, C., Foster, D. W., and Fossos, N. 2013. "Peer Influences on Addiction," Principles of addiction: Comprehensive addictive behaviours and disorders (1), pp. 323-331.
    Nepomuceno, M. V., Laroche, M., and Richard, M.-O. 2014. "How to Reduce Perceived Risk When Buying Online: The Interactions between Intangibility, Product Knowledge, Brand Familiarity, Privacy and Security Concerns," Journal of Retailing and Consumer Services (21:4), pp. 619-629.
    Ram, S. 1987. "A Model of Innovation Resistance," ACR North American Advances).
    Reisner, M. S. L., Mimiaga, M. J., Skeer, M. M., Perkovich, M. B., Johnson, M. C. V., and Safren, S. A. 2009. "A Review of Hiv Antiretroviral Adherence and Intervention Studies among Hiv–Infected Youth," Topics in HIV medicine: a publication of the International AIDS Society, USA (17:1), p. 14.
    Rogers, R. W. 1975. "A Protection Motivation Theory of Fear Appeals and Attitude Change1," The journal of psychology (91:1), pp. 93-114.
    Rudolph, M., Feth, D., and Polst, S. 2018. "Why Users Ignore Privacy Policies–a Survey and Intention Model for Explaining User Privacy Behavior," Human-Computer Interaction. Theories, Methods, and Human Issues: 20th International Conference, HCI International 2018, Las Vegas, NV, USA, July 15–20, 2018, Proceedings, Part I 20: Springer, pp. 587-598.
    Schüz, B., Li, A. S.-W., Hardinge, A., McEachan, R. R., and Conner, M. 2017. "Socioeconomic Status as a Moderator between Social Cognitions and Physical Activity: Systematic Review and Meta-Analysis Based on the Theory of Planned Behavior," Psychology of Sport and Exercise (30), pp. 186-195.
    Shaw, K. L. 2015. "Patient Education, Motivation, Compliance, and Adherence to Physical Activity, Exercise, and Rehabilitation,").
    Shillair, R. 2020. "Protection Motivation Theory," The International Encyclopedia of Media Psychology), pp. 1-3.
    Shobha, N. S. S., Aruna, K. S. P., Bhagyashree, M. D. P., and Sarita, K. S. J. 2016. "Nfc and Nfc Payments: A Review," 2016 international conference on ICT in business industry & government (ICTBIG): IEEE, pp. 1-7.
    Silverman, B. G., Hanrahan, N., Huang, L., Rabinowitz, E. F., and Lim, S. 2016. "Artificial Intelligence and Human Behavior Modeling and Simulation for Mental Health Conditions," in Artificial Intelligence in Behavioral and Mental Health Care. Elsevier, pp. 163-183.
    Simon, H. A. 1957. "A Behavioral Model of Rational Choice," Models of man, social and rational: Mathematical essays on rational human behavior in a social setting), pp. 241-260.
    Simon, H. A. 1990. "Bounded Rationality," in Utility and Probability. Springer, pp. 15-18.
    Smelser, N. J., and Baltes, P. B. 2001. International Encyclopedia of the Social & Behavioral Sciences. Elsevier Amsterdam.
    Story, P., Smullen, D., Acquisti, A., Cranor, L. F., Sadeh, N., and Schaub, F. 2020. "From Intent to Action: Nudging Users Towards Secure Mobile Payments," Proceedings of the 16th Symposium on Usable Privacy and Security (SOUPS 2020), pp. 379-415.
    Thomas, B., Mimiaga, M. J., Menon, S., Chandrasekaran, V., Murugesan, P., Swaminathan, S., Mayer, K. H., and Safren, S. A. 2009. "Unseen and Unheard: Predictors of Sexual Risk Behavior and Hiv Infection among Men Who Have Sex with Men in Chennai, India," AIDS education and prevention: official publication of the International Society for AIDS Education (21:4), p. 372.
    Tryon, W. 2014. Cognitive Neuroscience and Psychotherapy: Network Principles for a Unified Theory. Academic Press.
    Turner, W., and Merriman, L. M. 2005. Clinical Skills in Treating the Foot. Elsevier Health Sciences.
    Wang, Y., Hahn, C., and Sutrave, K. 2016. "Mobile Payment Security, Threats, and Challenges," 2016 second international conference on mobile and secure services (MobiSecServ): IEEE, pp. 1-5.
    Wu, K.-W., Huang, S. Y., Yen, D. C., and Popova, I. 2012. "The Effect of Online Privacy Policy on Consumer Privacy Concern and Trust," Computers in human behavior (28:3), pp. 889-897.
    Description: 碩士
    國立政治大學
    資訊管理學系
    110356033
    Source URI: http://thesis.lib.nccu.edu.tw/record/#G0110356033
    Data Type: thesis
    Appears in Collections:[資訊管理學系] 學位論文

    Files in This Item:

    File Description SizeFormat
    603301.pdf1698KbAdobe PDF20View/Open


    All items in 政大典藏 are protected by copyright, with all rights reserved.


    社群 sharing

    著作權政策宣告 Copyright Announcement
    1.本網站之數位內容為國立政治大學所收錄之機構典藏,無償提供學術研究與公眾教育等公益性使用,惟仍請適度,合理使用本網站之內容,以尊重著作權人之權益。商業上之利用,則請先取得著作權人之授權。
    The digital content of this website is part of National Chengchi University Institutional Repository. It provides free access to academic research and public education for non-commercial use. Please utilize it in a proper and reasonable manner and respect the rights of copyright owners. For commercial use, please obtain authorization from the copyright owner in advance.

    2.本網站之製作,已盡力防止侵害著作權人之權益,如仍發現本網站之數位內容有侵害著作權人權益情事者,請權利人通知本網站維護人員(nccur@nccu.edu.tw),維護人員將立即採取移除該數位著作等補救措施。
    NCCU Institutional Repository is made to protect the interests of copyright owners. If you believe that any material on the website infringes copyright, please contact our staff(nccur@nccu.edu.tw). We will remove the work from the repository and investigate your claim.
    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback