English  |  正體中文  |  简体中文  |  Post-Print筆數 : 27 |  Items with full text/Total items : 114205/145239 (79%)
Visitors : 52526897      Online Users : 440
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version
    Please use this identifier to cite or link to this item: https://nccur.lib.nccu.edu.tw/handle/140.119/81259


    Title: 利用受限因子模型研究 智慧型手機使用者對於風險的行為意圖
    A constraint factor model to study the smartphone users` behavior toward risk.
    Authors: 劉榕安
    Contributors: 洪叔民
    劉榕安
    Keywords: 風險忍受度
    感知風險
    風險意識
    資安風險
    資安防護
    Date: 2015
    Issue Date: 2016-02-15 10:07:33 (UTC+8)
    Abstract: 智慧型手機的出現勢必對傳統的生活模式帶來新的衝擊,產業結構、消費模式、生活模式和社會問題等都有不同程度的改變,而一些資訊安全的威脅也慢慢轉移至智慧型手機上,如何在智慧型手機的便利性和安全性取得平衡點,是不容忽視和逃避的問題。
    本研究重點著墨於民眾的風險忍受程度和感知風險程度對於安裝智慧型手機防毒軟體的意圖影響。針對智慧型手機的資安防護等相關文獻中問卷,逐字翻譯並進行反覆前測,檢驗與修正,讓問項有更正確的歸類,進而探討未來智慧型手機防毒軟體發展之方向。其中列入控制變相:風險意識、使用智慧型手機上網的時間、擁有智慧型手機和基本資料等。
    研究結果發現,感知風險與風險忍受度個別對於安裝防毒軟體意願均有影響,且風險忍受度會約束感知風險與安裝軟體之間的關係,而感知風險會約束風險忍受度對於安裝轉體之間的關係。
    經研究結果提出有關智慧型手機防毒軟體業者行銷手法、資安防護業者建和未來產業發展方向,供各大企業或廠商在與消費者宣傳產品的一些創新建議與想法。
    Reference: 林永宏,2014,從影響行動裝置資安風險並未展現之因素探討未來行動裝置發展之研究,銘傳大學資訊管理碩士在職專班畢業論文
    蔡佾潔,2012,資訊能力影響智慧型手機病毒知覺與資訊安全信任之研究,國立中興大學科技管理研究所碩士論文
    徐鵬翔,2012,智慧型手機使用滿意度與品牌忠誠度之研究,國立中山大學資訊管理學系碩士論文
    吳凱群,鄒仁淳,林娟娟,2012,智慧型手機使用者下載軟體意願之研究-以享樂型應用軟體為例,東吳大學資訊管理學系,文化大學資訊管理學系論文
    Hunter D.R. (2002).Risk Perception and Risk Tolerance in Aircraft Pilots. National Technical Information Service, Springfield
    Ajzen, I., and Fishbein, M. (1980). Understanding Attitudes and Predicting Social Behavior, Englewood Cliffs, NJ: Prentice-Hall.
    Anderson, C. L., and Agarwal, R. (2010). Practicing safe computing: A multimedia empirical examination of home computer user security behavioral intentions. MIS Quarterly, 34(3), 613-643
    Arachchilage, N. A. G., and Love S. (2013). A game design framework for avoiding phishing attacks, Computers in Human Behavior 29, 706–714
    Baghdassarian S, Milanesi C. (2010). Forecast: mobile application stores, world-wide, 2008-14. Tec Report G00209676. Gartner.
    Bettman, J. (1971). The structure of consumer choice processes, Journal of Marketing Research, 8, 465-471.
    Chang, K. S. 2013, Can Smartphones Get Virus/Viruses and Malware? iPhone / Android Phone Only as Smart as Their Users in Malware Detection, retrieved on 12/24/2013 from http://kschang.hubpages.com/hub/Do-Smartphones-Get-Viruses-Why-iPhones-Android-Phones-and-Others-Are-Only-as-Smart-as-Their-Users
    Chase, R. B., Jacobs, F. R., Aquilano, N. J. (2004). Production and Operations Management: Manufacturing and Services. McGraw-Hill, New York.
    Constant, D., Kiesler, S., and Sproull, L. (1994). What`s mine is ours, or is it? A study of attitudes about information sharing, Information Systems Research 5(4), 400-421.
    Cox, D. F. (1967). Risk Taking and Information Handling in Consumer Behavior, Harvard University Press, Boston.
    Cummings, L. L., and Schwab, D. P. (1973). Performance in Organizations. Scott, Foresman and Company, Glenview, IL.
    Dagon, D., Martin, T., Starner, T. (2004). Mobile phones as computing devices: The viruses are coming! IEEE Pervasive Computing, 3(4), 11–15.
    Davis, F. D. (1989). Perceived usefulness, perceived ease of use, and user acceptance of information technologies, MIS Quarterly, 13(3), 319-340.
    Dowling, G. R. (1986). Perceived risk: The concept and its measurement, Psychology & Marketing, 3(3), 193-210.
    Egelman, S., Felt, A. P., and Wagner, D. (2013). Choice architecture and smartphone privacy: There’s a price for that, at The Economics of Information Security and Privacy, ed. Böhme, R., Springer, New York, 211-236.
    Enck., W. (2011). Defending users against smartphone apps: Techniques and future directions, ICISS 2011, LYNC 7093, 49-70.
    Featherman, M. S., & Pavlou, P. A. (2003). Predicting E-Services Adoption: A Perceived Risk Facets Perspective. International Journal of Human-Computer Studies, 59(4), 451-474.
    Felt, A. P., Egelman, S., and Wagner, D. (2012). I’ve got 99 problems, but vibration ain’t one: A survey of smartphone users’ concerns. Proceedings of SPSM’ 12, 33-38.
    Felt A, Finifter M, Chin E, Hanna S, and Wagner D. A. (2011). Survey of mobile malware in the wild. Proc. of the 1st ACM workshop on security and privacy in smartphones and mobile devices (SPSM ’11). ACM, 3-14.
    Filbeck, G., Hatfield, P., & Horvath, P. (2005). Risk Aversion and Personality Type. The Journal of Behavioral Finance, 6(4), 170-180.
    Filbeck, G., and Smith. L. (1996), Learning styles, teaching strategies, and predictors of success for students in corporate finance. Financial Practice and Education, 6(1), 74–85.
    Fingas, J., 2013, Android tops 81 percent of smartphone market share in Q3, retrieved on 12/24/2013 from http://www.engadget.com/2013/10/31/strategy-analytics-q3-2013-phone-share/
    Gao, T., Rohm, A. J., Sultan, F., and Huang, S. (2012). Antecedents of consumer attitudes toward mobile marketing: A comparative study of youth markets in the United States and China. Thunderbird International Business Review,54, 211-224
    Gartner, (2013). Gartner Says Worldwide Mobile Phone Sales Declined 1.7 Percent in 2012, retrieved on 12/28/2013 from: http://www.gartner.com/newsroom/id/2335616
    Gartner, (2013). Gartner Says Smartphone Sales Accounted for 55 Percent of Overall Mobile Phone Sales in Third Quarter of 2013, retrieved on 12/28/2013 from: http://www.gartner.com/newsroom/id/2623415
    Goldratt, E. M. (1999). Theory of Constraints. North River Press, Great Barrington, MA.
    Gross, G. (2007). Groups raise concerns about cybersecurity standards, PC World, April 25.
    Howard, J. A., and Sheth, J. N. (1969). The Theory of Buyer Behavior, Wiley, New York.
    Hunter, D. R. (2002). Risk Perception and Risk Tolerance in Aircraft Pilots. Retrieved from http://ntl.bts.gov/lib/19000/19800/19856/PB2003100818.pdf
    Jiang, P. (2009). Consumer adoption of mobile internet services: An exploratory study. Journal of Promotion Management, 15(3), 418-454.
    Johnston, A. C., and Warkentin, M. (2010). Fear appeals and information security behaviors: an empirical study. MIS Quarterly, 34(3), 549-566.
    Kim, J. (2012). Developing an empirical model of college students` online shopping behavior. International Journal of Interdisciplinary Social Sciences, 6(10), 81-109.
    Lee, H., Cho, H. J., Xu, W., and Fairhurst, A. (2010). The influence of consumer trait and demographics on intention to use retail self-service checkouts, Marketing Intelligence & Planning 28(1), 46-58.
    Lu, H., Hsu, C., and Hsu, H. (1993). An empirical study of the effect of perceived risk upon intention to use online applications. Information Management & Computer Security, 13(2), 106-120.
    MacKenzie, S. B., Podsakoff, P.M., and Podsakoff, N. P. (2011). Construct measurement and validation procedures in MIS and behavioral research: Integrating new and existing techniques, MIS Quarterly, 35(2), 293-234.
    Malkiel, B. A. (1996). Random Walk Down Wall Street, 6th ed. W.W. Norton, New York.
    Marketsandmarkets, (2011). Global Smartphone Security Market by Operating Systems, Ownership & Features (2011 – 2016), retrieved on 12/28/2013 from: http://www.marketsandmarkets.com/Market-Reports/world-computer-mobile-antivirus-market-156.html
    Matsubara, M. (2012). A long and winding road for cybersecurity cooperation, Harvard Asia Quarterly, 14(1/2), 103-111.
    Mylonas, A., Kastania, A., and Gritzalis, D. (2013). Delegate the smartphone user? Security awareness in smartphone platforms. Computers & Security, 34, 47-66
    Pavlou, P. A. (2003). Consumer acceptance of electronic commerce: integrating trust and risk with the technology acceptance Model. International Journal of Electronic Commerce, 7(3), 101-134.
    Riedl, E. J. (2004). An examination of long-loved asset impairments, The Accounting Review, 79(3), 823-852.
    Rogers, R. (1975). A Protection motivation theory of fear appeals and attitude change,” Journal of Psychology, 91, 93-114.
    Schaninger, C. M. (1976). Perceived Risk and Personality. Journal of Consumer Research, 3(2), 95-100.
    Siemsen, E., Roth, A. V. , Balasubramanian, S. (2008). How motivation, opportunity, and ability drive knowledge sharing: The constraining-factor model, Journal of Operations Management, 26(3), 426-445.
    Sitkin, S. B., and Pablo, A. L. (1992). Reconceptualizing the determinants of risk behavior. The Academy of Management Review, 17(1), 9-38.
    Symantec Corp. (2013) Internet Security Threat Report 2013, Appendix, Vol. 18 Kay, B., Shah, J., and Verma, A., 2013, Mobile Security: McAfee consumer Trends Report
    Tan, S. J. (1999). Strategies for reducing consumers` risk aversion in internet shopping, Journal of Consumer Marketing, 16(2), 163-180.
    Terborg, J. R. (1977). Validation and extension of an individual differences model of work performance. Organizational Behavior and Human Performance, 18(2), 188-216.
    Venkatesh, V., Thong, J. Y. L., and Xu, X. (2012). Consumer acceptance and use of information technology: Extending the unified theory of acceptance and use of technology, MIS Quarterly, 36 (1), 157-178.
    Verkasalo, H., López-Nicolás, C., Molina-Castillo, F. J., and Bouwman, H. (2010). Analysis of users and non-users of smartphone applications, Telematics and Informatics, 27(3), 242-255.
    Wang, HY, Liao, C., and Yang, L-H (2013). What Affects Mobile Application Use? The Roles of Consumption Values. International Journal of Marketing Studies, 5(2), 1918-7203.
    Description: 碩士
    國立政治大學
    企業管理研究所(MBA學位學程)
    103363017
    Source URI: http://thesis.lib.nccu.edu.tw/record/#G1033630171
    Data Type: thesis
    Appears in Collections:[企業管理研究所(MBA學位學程)] 學位論文

    Files in This Item:

    File SizeFormat
    017101.pdf1681KbAdobe PDF2122View/Open


    All items in 政大典藏 are protected by copyright, with all rights reserved.


    社群 sharing

    著作權政策宣告 Copyright Announcement
    1.本網站之數位內容為國立政治大學所收錄之機構典藏,無償提供學術研究與公眾教育等公益性使用,惟仍請適度,合理使用本網站之內容,以尊重著作權人之權益。商業上之利用,則請先取得著作權人之授權。
    The digital content of this website is part of National Chengchi University Institutional Repository. It provides free access to academic research and public education for non-commercial use. Please utilize it in a proper and reasonable manner and respect the rights of copyright owners. For commercial use, please obtain authorization from the copyright owner in advance.

    2.本網站之製作,已盡力防止侵害著作權人之權益,如仍發現本網站之數位內容有侵害著作權人權益情事者,請權利人通知本網站維護人員(nccur@nccu.edu.tw),維護人員將立即採取移除該數位著作等補救措施。
    NCCU Institutional Repository is made to protect the interests of copyright owners. If you believe that any material on the website infringes copyright, please contact our staff(nccur@nccu.edu.tw). We will remove the work from the repository and investigate your claim.
    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback