政大機構典藏-National Chengchi University Institutional Repository(NCCUR):Item 140.119/81259
English  |  正體中文  |  简体中文  |  Post-Print筆數 : 27 |  全文筆數/總筆數 : 114205/145239 (79%)
造訪人次 : 52625258      線上人數 : 991
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
搜尋範圍 查詢小技巧:
  • 您可在西文檢索詞彙前後加上"雙引號",以獲取較精準的檢索結果
  • 若欲以作者姓名搜尋,建議至進階搜尋限定作者欄位,可獲得較完整資料
  • 進階搜尋
    請使用永久網址來引用或連結此文件: https://nccur.lib.nccu.edu.tw/handle/140.119/81259


    題名: 利用受限因子模型研究 智慧型手機使用者對於風險的行為意圖
    A constraint factor model to study the smartphone users` behavior toward risk.
    作者: 劉榕安
    貢獻者: 洪叔民
    劉榕安
    關鍵詞: 風險忍受度
    感知風險
    風險意識
    資安風險
    資安防護
    日期: 2015
    上傳時間: 2016-02-15 10:07:33 (UTC+8)
    摘要: 智慧型手機的出現勢必對傳統的生活模式帶來新的衝擊,產業結構、消費模式、生活模式和社會問題等都有不同程度的改變,而一些資訊安全的威脅也慢慢轉移至智慧型手機上,如何在智慧型手機的便利性和安全性取得平衡點,是不容忽視和逃避的問題。
    本研究重點著墨於民眾的風險忍受程度和感知風險程度對於安裝智慧型手機防毒軟體的意圖影響。針對智慧型手機的資安防護等相關文獻中問卷,逐字翻譯並進行反覆前測,檢驗與修正,讓問項有更正確的歸類,進而探討未來智慧型手機防毒軟體發展之方向。其中列入控制變相:風險意識、使用智慧型手機上網的時間、擁有智慧型手機和基本資料等。
    研究結果發現,感知風險與風險忍受度個別對於安裝防毒軟體意願均有影響,且風險忍受度會約束感知風險與安裝軟體之間的關係,而感知風險會約束風險忍受度對於安裝轉體之間的關係。
    經研究結果提出有關智慧型手機防毒軟體業者行銷手法、資安防護業者建和未來產業發展方向,供各大企業或廠商在與消費者宣傳產品的一些創新建議與想法。
    參考文獻: 林永宏,2014,從影響行動裝置資安風險並未展現之因素探討未來行動裝置發展之研究,銘傳大學資訊管理碩士在職專班畢業論文
    蔡佾潔,2012,資訊能力影響智慧型手機病毒知覺與資訊安全信任之研究,國立中興大學科技管理研究所碩士論文
    徐鵬翔,2012,智慧型手機使用滿意度與品牌忠誠度之研究,國立中山大學資訊管理學系碩士論文
    吳凱群,鄒仁淳,林娟娟,2012,智慧型手機使用者下載軟體意願之研究-以享樂型應用軟體為例,東吳大學資訊管理學系,文化大學資訊管理學系論文
    Hunter D.R. (2002).Risk Perception and Risk Tolerance in Aircraft Pilots. National Technical Information Service, Springfield
    Ajzen, I., and Fishbein, M. (1980). Understanding Attitudes and Predicting Social Behavior, Englewood Cliffs, NJ: Prentice-Hall.
    Anderson, C. L., and Agarwal, R. (2010). Practicing safe computing: A multimedia empirical examination of home computer user security behavioral intentions. MIS Quarterly, 34(3), 613-643
    Arachchilage, N. A. G., and Love S. (2013). A game design framework for avoiding phishing attacks, Computers in Human Behavior 29, 706–714
    Baghdassarian S, Milanesi C. (2010). Forecast: mobile application stores, world-wide, 2008-14. Tec Report G00209676. Gartner.
    Bettman, J. (1971). The structure of consumer choice processes, Journal of Marketing Research, 8, 465-471.
    Chang, K. S. 2013, Can Smartphones Get Virus/Viruses and Malware? iPhone / Android Phone Only as Smart as Their Users in Malware Detection, retrieved on 12/24/2013 from http://kschang.hubpages.com/hub/Do-Smartphones-Get-Viruses-Why-iPhones-Android-Phones-and-Others-Are-Only-as-Smart-as-Their-Users
    Chase, R. B., Jacobs, F. R., Aquilano, N. J. (2004). Production and Operations Management: Manufacturing and Services. McGraw-Hill, New York.
    Constant, D., Kiesler, S., and Sproull, L. (1994). What`s mine is ours, or is it? A study of attitudes about information sharing, Information Systems Research 5(4), 400-421.
    Cox, D. F. (1967). Risk Taking and Information Handling in Consumer Behavior, Harvard University Press, Boston.
    Cummings, L. L., and Schwab, D. P. (1973). Performance in Organizations. Scott, Foresman and Company, Glenview, IL.
    Dagon, D., Martin, T., Starner, T. (2004). Mobile phones as computing devices: The viruses are coming! IEEE Pervasive Computing, 3(4), 11–15.
    Davis, F. D. (1989). Perceived usefulness, perceived ease of use, and user acceptance of information technologies, MIS Quarterly, 13(3), 319-340.
    Dowling, G. R. (1986). Perceived risk: The concept and its measurement, Psychology & Marketing, 3(3), 193-210.
    Egelman, S., Felt, A. P., and Wagner, D. (2013). Choice architecture and smartphone privacy: There’s a price for that, at The Economics of Information Security and Privacy, ed. Böhme, R., Springer, New York, 211-236.
    Enck., W. (2011). Defending users against smartphone apps: Techniques and future directions, ICISS 2011, LYNC 7093, 49-70.
    Featherman, M. S., & Pavlou, P. A. (2003). Predicting E-Services Adoption: A Perceived Risk Facets Perspective. International Journal of Human-Computer Studies, 59(4), 451-474.
    Felt, A. P., Egelman, S., and Wagner, D. (2012). I’ve got 99 problems, but vibration ain’t one: A survey of smartphone users’ concerns. Proceedings of SPSM’ 12, 33-38.
    Felt A, Finifter M, Chin E, Hanna S, and Wagner D. A. (2011). Survey of mobile malware in the wild. Proc. of the 1st ACM workshop on security and privacy in smartphones and mobile devices (SPSM ’11). ACM, 3-14.
    Filbeck, G., Hatfield, P., & Horvath, P. (2005). Risk Aversion and Personality Type. The Journal of Behavioral Finance, 6(4), 170-180.
    Filbeck, G., and Smith. L. (1996), Learning styles, teaching strategies, and predictors of success for students in corporate finance. Financial Practice and Education, 6(1), 74–85.
    Fingas, J., 2013, Android tops 81 percent of smartphone market share in Q3, retrieved on 12/24/2013 from http://www.engadget.com/2013/10/31/strategy-analytics-q3-2013-phone-share/
    Gao, T., Rohm, A. J., Sultan, F., and Huang, S. (2012). Antecedents of consumer attitudes toward mobile marketing: A comparative study of youth markets in the United States and China. Thunderbird International Business Review,54, 211-224
    Gartner, (2013). Gartner Says Worldwide Mobile Phone Sales Declined 1.7 Percent in 2012, retrieved on 12/28/2013 from: http://www.gartner.com/newsroom/id/2335616
    Gartner, (2013). Gartner Says Smartphone Sales Accounted for 55 Percent of Overall Mobile Phone Sales in Third Quarter of 2013, retrieved on 12/28/2013 from: http://www.gartner.com/newsroom/id/2623415
    Goldratt, E. M. (1999). Theory of Constraints. North River Press, Great Barrington, MA.
    Gross, G. (2007). Groups raise concerns about cybersecurity standards, PC World, April 25.
    Howard, J. A., and Sheth, J. N. (1969). The Theory of Buyer Behavior, Wiley, New York.
    Hunter, D. R. (2002). Risk Perception and Risk Tolerance in Aircraft Pilots. Retrieved from http://ntl.bts.gov/lib/19000/19800/19856/PB2003100818.pdf
    Jiang, P. (2009). Consumer adoption of mobile internet services: An exploratory study. Journal of Promotion Management, 15(3), 418-454.
    Johnston, A. C., and Warkentin, M. (2010). Fear appeals and information security behaviors: an empirical study. MIS Quarterly, 34(3), 549-566.
    Kim, J. (2012). Developing an empirical model of college students` online shopping behavior. International Journal of Interdisciplinary Social Sciences, 6(10), 81-109.
    Lee, H., Cho, H. J., Xu, W., and Fairhurst, A. (2010). The influence of consumer trait and demographics on intention to use retail self-service checkouts, Marketing Intelligence & Planning 28(1), 46-58.
    Lu, H., Hsu, C., and Hsu, H. (1993). An empirical study of the effect of perceived risk upon intention to use online applications. Information Management & Computer Security, 13(2), 106-120.
    MacKenzie, S. B., Podsakoff, P.M., and Podsakoff, N. P. (2011). Construct measurement and validation procedures in MIS and behavioral research: Integrating new and existing techniques, MIS Quarterly, 35(2), 293-234.
    Malkiel, B. A. (1996). Random Walk Down Wall Street, 6th ed. W.W. Norton, New York.
    Marketsandmarkets, (2011). Global Smartphone Security Market by Operating Systems, Ownership & Features (2011 – 2016), retrieved on 12/28/2013 from: http://www.marketsandmarkets.com/Market-Reports/world-computer-mobile-antivirus-market-156.html
    Matsubara, M. (2012). A long and winding road for cybersecurity cooperation, Harvard Asia Quarterly, 14(1/2), 103-111.
    Mylonas, A., Kastania, A., and Gritzalis, D. (2013). Delegate the smartphone user? Security awareness in smartphone platforms. Computers & Security, 34, 47-66
    Pavlou, P. A. (2003). Consumer acceptance of electronic commerce: integrating trust and risk with the technology acceptance Model. International Journal of Electronic Commerce, 7(3), 101-134.
    Riedl, E. J. (2004). An examination of long-loved asset impairments, The Accounting Review, 79(3), 823-852.
    Rogers, R. (1975). A Protection motivation theory of fear appeals and attitude change,” Journal of Psychology, 91, 93-114.
    Schaninger, C. M. (1976). Perceived Risk and Personality. Journal of Consumer Research, 3(2), 95-100.
    Siemsen, E., Roth, A. V. , Balasubramanian, S. (2008). How motivation, opportunity, and ability drive knowledge sharing: The constraining-factor model, Journal of Operations Management, 26(3), 426-445.
    Sitkin, S. B., and Pablo, A. L. (1992). Reconceptualizing the determinants of risk behavior. The Academy of Management Review, 17(1), 9-38.
    Symantec Corp. (2013) Internet Security Threat Report 2013, Appendix, Vol. 18 Kay, B., Shah, J., and Verma, A., 2013, Mobile Security: McAfee consumer Trends Report
    Tan, S. J. (1999). Strategies for reducing consumers` risk aversion in internet shopping, Journal of Consumer Marketing, 16(2), 163-180.
    Terborg, J. R. (1977). Validation and extension of an individual differences model of work performance. Organizational Behavior and Human Performance, 18(2), 188-216.
    Venkatesh, V., Thong, J. Y. L., and Xu, X. (2012). Consumer acceptance and use of information technology: Extending the unified theory of acceptance and use of technology, MIS Quarterly, 36 (1), 157-178.
    Verkasalo, H., López-Nicolás, C., Molina-Castillo, F. J., and Bouwman, H. (2010). Analysis of users and non-users of smartphone applications, Telematics and Informatics, 27(3), 242-255.
    Wang, HY, Liao, C., and Yang, L-H (2013). What Affects Mobile Application Use? The Roles of Consumption Values. International Journal of Marketing Studies, 5(2), 1918-7203.
    描述: 碩士
    國立政治大學
    企業管理研究所(MBA學位學程)
    103363017
    資料來源: http://thesis.lib.nccu.edu.tw/record/#G1033630171
    資料類型: thesis
    顯示於類別:[企業管理研究所(MBA學位學程)] 學位論文

    文件中的檔案:

    檔案 大小格式瀏覽次數
    017101.pdf1681KbAdobe PDF2122檢視/開啟


    在政大典藏中所有的資料項目都受到原著作權保護.


    社群 sharing

    著作權政策宣告 Copyright Announcement
    1.本網站之數位內容為國立政治大學所收錄之機構典藏,無償提供學術研究與公眾教育等公益性使用,惟仍請適度,合理使用本網站之內容,以尊重著作權人之權益。商業上之利用,則請先取得著作權人之授權。
    The digital content of this website is part of National Chengchi University Institutional Repository. It provides free access to academic research and public education for non-commercial use. Please utilize it in a proper and reasonable manner and respect the rights of copyright owners. For commercial use, please obtain authorization from the copyright owner in advance.

    2.本網站之製作,已盡力防止侵害著作權人之權益,如仍發現本網站之數位內容有侵害著作權人權益情事者,請權利人通知本網站維護人員(nccur@nccu.edu.tw),維護人員將立即採取移除該數位著作等補救措施。
    NCCU Institutional Repository is made to protect the interests of copyright owners. If you believe that any material on the website infringes copyright, please contact our staff(nccur@nccu.edu.tw). We will remove the work from the repository and investigate your claim.
    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - 回饋