§ 瀏覽學位論文書目資料
  
系統識別號 U0002-0908202111252800
DOI 10.6846/TKU.2021.00218
論文名稱(中文) 以遷移理論探討純網路銀行消費者之忠誠度
論文名稱(英文) Exploring customer loyalty of using internet-only Banking based on Migration Theory
第三語言論文名稱
校院名稱 淡江大學
系所名稱(中文) 資訊管理學系碩士班
系所名稱(英文) Department of Information Management
外國學位學校名稱
外國學位學院名稱
外國學位研究所名稱
學年度 109
學期 2
出版年 110
研究生(中文) 陳愷賢
研究生(英文) Kai-Hsien Chen
學號 608630140
學位類別 碩士
語言別 繁體中文
第二語言別
口試日期 2021-06-10
論文頁數 41頁
口試委員 指導教授 - 吳雅鈴
委員 - 施盛寶
委員 - 李有仁
關鍵字(中) 純網銀
PPM模型
網路外部性
服務創新
感知安全風險
感知脆弱性
慣性
信任
忠誠度
關鍵字(英) Internet-Only Bank
PPM Model
Network Externalities
Service Innovation
Perceived Security Risk
Perceived Vulnerability
Habits
Trust
Loyalty
第三語言關鍵字
學科別分類
中文摘要
隨者全球金融數位化的發展趨勢與科技技術的進步,近年隨著Fintech的發展滲入民眾的生活中,讓金融服務變得更方便且有效率,進入Bank4.0時代,也為傳統銀行業帶來數位轉型的壓力,純網路銀行並不設立實體分行,但實務上會設立實體總行,面對面與使用者溝通協助處理各項問題,所有銀行業務皆透過網路、手機、ATM等裝置執行,為實體總行省下了許多運營成本,相對來說,能將其轉換為利率上的優惠回饋於用戶,但此新興科技仍充滿未知數。
台灣純網銀開放,本研究的目的在於以遷移理論探討消費者之純網路銀行消費者之忠誠度,使用者是否會將傳統銀行的業務轉移至純網銀,本研究採用Bogue(1969)提出的推力-拉力-維繫力模型(Push-Pull-Mooring Model),從拉力效果(網路外部性與服務創新)、推力效果(感知安全風險與脆弱性)、維繫力(慣性與信任)來分析各項變數之間的交互影響,本研究以問卷調查法來驗證與分析,有效問卷為662份,希望透過此研究分析,以提供純網銀業者擬定更完善的金融服務。
英文摘要
Due to the rapid developments of FinTech businesses, more people are relying on Internet-only banking as their only way of doing financial business. It makes financial services more convenient and efficient. Entering the Bank 4.0 era brings pressure for the traditional banking industry to digital transformation. Internet-only bank does not need to establish physical branches, but in practice, a physical head office will be set up to communicate face-to-face with users to help deal with various issues. All banking operations are conducted through the Internet. Mobile phones, ATMs, etc. It also saved a lot of operating costs for the head office. Relatively speaking, the advantages that can be turned into advantages are given back to users, but this emerging technology is full of unknowns.
As the Taiwan internet-only bank opens, the purpose of this study is to adopt the Push-Pull-Mooring (PPM) model proposed by Bogue (1969) to explore consumer loyalty of using internet-only bank services. Furthermore, we identified two push factors, including perceived security risk and vulnerability, two pull factors, including network externalities and service innovation, as well as two mooring factors, including habit and trust. Data collected from 662 customers provide strong support for the research model. It is hoped that the findings can provide the best improvement strategies to satisfy the internet-only bank services for customers ’behavior needs.
第三語言摘要
論文目次
第一章 緒論1
1.1研究動機與背景1
1.2研究目的3
第二章 文獻探討4
2.1純網路銀行4
2.2人口遷移理論與推力-拉力-維繫力理論5
2.2.1推力效果6
2.2.2拉力效果6
2.2.3維繫力效果7
2.3感知資訊安全與脆弱性風險7
2.4網路外部性8
2.5服務創新8
2.6慣性9
2.7信任轉移理論9
2.8忠誠度10
第三章 研究方法11
3.1研究模型11
3.2研究流程11
3.3研究假說12
3.3.1推力效果(Push Factors)12
3.3.2感知安全風險(Perceived security risk)12
3.3.3感知脆弱性(Perceived vulnerability)12
3.3.4拉力效果(Pull Factors)12
3.3.5網路外部性(Network Externality)12
3.3.6服務創新(Service Innovation)13
3.3.7維繫力效果(Mooring Factors)14
3.3.8慣性(Habits)14
3.3.9信任(Trust)14
3.4研究設計15
3.4.1研究對象15
3.4.2資料蒐集16
3.4.3研究問卷發展16
第四章 研究分析與結果19
4.1 資料分析方法	19
4.2問卷樣本資料分析19
4.3測量模型分析22
4.4結構模型分析24
4.5本研究假說結果驗證25
第五章 研究限制與建議26
5.1研究結果與討論26
5.2理論意涵27
5.3實務意涵28
5.4研究限制與建議28
第六章 參考文獻29
附錄研究問卷之問項38

表目錄
表2-1 純網銀與數位銀行比較表 本研究自行整理5
表4-1 一般性統計資料20
表4-2 性效度評估:個構面敘述性統計22
表4-3 驗證性因素和交叉負荷22
表4-4 區別效度評估:各構面相關係數矩陣與AVE平方根值23
表4-5 假說內容驗證結果25

圖目錄
圖3-1 研究模型:PPM模型 11
圖4-4 結構模型分析24
參考文獻
1.陳秋媚.(2019)。以推力-拉力-維繫力理論探討消費者對智慧商店之轉換意圖。國立中山大學資訊管理學系研究所碩士論文,高雄市。
2.林彥均.(2020)。以信任轉移及現狀偏誤探討純網銀使用意圖─以LINE Bank為例。國立中山大學資訊管理學系研究所碩士論文,高雄市。
3.劉曉薇. (2019). Re: 純網路銀行對銀行業的影響研析。Message posted to
https://www.bankchb.com/chb_2a_resource/leap_do/gallery/1561621701711/68-6-%E5%B0%88%E9%A1%8C%E8%AD%AF%E8%BF%B0.pdf
4.Andeson, J. C., Gerbing, D. W.(1988).Structural equation modeling in practice: a review and recommended two-step approach, “ Psychological Bulletin, 103, 441-423
5.Assael, H.(1998).Consumer behavior and marketing action. Boston Massachusetts: PWS-Kelling.
6.Aarts, H., Verplanken, B., & Knippenberg, A. (1998). Predicting behavior from actions in the past: Repeated decision making or a matter of habit? Journal of Applied Social Psychology, 28(15), 1355–1374.
7.Ahn, S.J. and Lee, S.H. (2019), “The effect of consumers’ perceived value on acceptance of an Internet-only bank service”, Sustainability, 11(17), 1-9.
8.Aladwani, A. M. (2001).Online Banking: a field of drivers, development challenges, and expectations. International Journal of Information Management,21(3), 213-255.
9.Arpaci, I., Kilicer, K., & Bardakci, S. (2015). Effects of security and privacy concerns on educational use of cloud services. Computers in Human Behavior, 45, 93-98.
10.Aldas-Manzano, J., Ruiz-Mafe, C., Sanz-Blas, S., & Lassala-Navarre, C. (2011). Internet banking loyalty: Evaluating the role of trust, satisfaction, perceived risk and frequency of use. The Service Industries Journal, 31(7), 1165–1190.
11.Anderson, J.C. and Narus, J.A. (1990). “A model of distribution firm and manufacturer firmworking partnerships”, Journal of Marketing, 54, 42-58.
12.Anwar, M., He, W., Ash, I., Yuan, X., Li, L., & Xu, L. (2017). Gender difference and employees' cybersecurity behaviors. Computers in Human Behavior, 69, 437-443. 
13.Avlonitis, G.J., Papastathopoulou, P.G. & Gounaris, S.P. (2001). ‘An empirically‐based typology of product innovativeness for new financial services: success and failure scenarios’, Journal of Product Innovation Management, 18(5), 324-342.
14.Bansal, H. S., Taylor, S. F., & James, Y. S. (2005). “Migrating” to new service providers: Toward a unifying framework of consumers' switching behaviors. Journal of the Academy of Marketing Science, 33(1), 96–115.
15.Bansal, Harvir S; Taylor, Shirley F; Yannik St James. (2005)."Migrating" to New Service Providers: Toward a Unifying Framework of Consumers' Switching Behaviors. Journal of the Academy of Marketing Science; New York, 33(1),  96-115.
16.Bogue, D.J.(1969). Principles of Demography, New York.
17.Bogue, D.J.(1969).Principles of demography: New York, John Wiley & Sons Inc.
18.Boyle, P. and Halfacree, K. (1998), Migration and Gender in the Developed World, Longman, New York.
19.Bessant, J., Tidd, J., Threat, T., 2015. Innovation and Entrepreneurship, 3rd ed (WILEY).
20.Bhattacherjee, A., & Park, S. C. (2014). Why end-users move to the cloud: A migration-theoretic analysis. European Journal of Information Systems, 23(3), 357-372.
21.Barrett, M., Davidson, E., Prabhu, J., Vargo, S.L. (2015). Service innovation in the digital age: key contributions and future directions. MIS Q. 39, 135–154.
22.Baregheh, A., Rowley, J., Sambrook, S., (2009). Towards a multidisciplinary definition of innovation. Manag. Decis. 47, 1323–1339.
23.Brickson, S. L. (2005). Organizational identity orientation: Making the link between organizational identity and organizations’ relations with stakeholders. Administrative Science Quarterly, 50, 576–609.
24.Casalo, L. V., Flavian, C., & Guinaliu, M. (2007). The role of security, privacy, usability and reputation in the development of online banking. Online Information Review, 31(5), 583–603. doi:10.1108/14684520710832315.
25.Crossler, R. E. (2010). Protection motivation theory: understanding determinants to back up personal data. In Proceedings of the 43rd Hawaii international conference on system sciences, 1–10.
26.Chang, V., Baudier, P., Zhang, H., Xu, Q., Zhang, J., Arami, M., (2020). How Blockchain can impact financial services – The overview, challenges, and recommendations from expert interviewees. Technol. Forecast. Soc. Change 158, 120166. https://doi.org/10.1016/j.techfore.2020.120166.
27.Chapman, C.S. (2005). ‘Not because they are new: Developing the contribution of enterprise resource planning systems to management control research’, Accounting, Organizations and Society, 30(7), 685-68.
28.Cheng, F. C., & Lai, W. H. (2012). The impact of cloud computing technology on legal infrastructure within the internet—focusing on the protection of information privacy.
29.Chen X, Huang Q, Davison R, Hua Z. (2015). What drives trust transfer? The moderating roles of seller specific and general institutional mechanisms. Int J Electron Commer, 20(2), 261–289
30.Chin, W. W. (1998). Commentary: Issues and opinion on structural equation modeling. MIS Quarterly, 22(1), vii-xvi. 
31.Chenoweth, T., Minch, R. & Gattiker, T. (2009). Application of protection motivation theory to the adoption of protective technologies. In Proceedings of the 42nd Hawaii international conference on system sciences, 1–10.
32.Chao-Min Chiu, Hsiang-Lan Cheng, Hsin-Yi Huang, Chieh-Fan Chen(2013). Exploring individuals’ subjective well-being and loyalty towards social network sites from the perspective of network externalities: The Facebook case, International Journal of Information Management, 33(3), 539-552
33.Day, G. (1969). A two-dimensional concept of brand loyalty. Journal of Advertising Research, 9, 29–36.
34.Damanpour, F., Walker, R.M., Avellaneda, C.N. (2009). Combinative effects of innovation types and organizational performance: a longitudinal study of service organizations.J. Manag. Stud. 46, 650–675.
35.D. Gozman, J. Liebenau, J. Mangan. (2018).The innovation mechanisms of fintech startups: insights from SWIFT’s innotribe competition, J. Manage. Inform. Syst. ,35(1) , 145–179.
36.D. Lee, R. Larose, N. Rifon. (2008). Keeping our network safe: A model of online protection behavior. Behaviour and Information Technology, 27 (5) , 445-454.
37.Davis, F. D. (1989). Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS Quarterly, 319-340.
38.Dick, A. S., & Basu, K. (1994). Customer loyalty: Toward an integrated conceptual framework. Journal of the Academy of Marketing Science, 22(2), 99–114.
39.Dutton, J. E., Dukerich, J. M., & Harquail, C. V. (1994). Organizational images and member identification. Administrative Science Quarterly, 39(2), 239–263.
40.Egger, A. (2006). ‘Intangibility and perceived risk in online environments’, Academy of Marketing, London: University of Middlesex.
41.Evanschitzky, H., Iyer, G. R., Plassmann, H., Niessing, J., & Meffert, H. (2006). The relative strength of affective commitment in securing loyalty in service relationships. Journal of Business Research, 59, 1207–1213.
42.Fornell, C.,& Larcker, D. F. (1981).Evaluating structural equation models with unobservable variables and measurement error. Journal of marketing research, 18(1), 39-50. 
43.Featherman, M. S., Miyazaki, A. D.,& Sprott, D. E.(2010). Reducing online privacy risk to facilitate e-service adoption: the influence of perceived ease of use and corporate credibility. Journal of service marketing.
44.Furnell, S.M., and Karweni, T. (1999), “Security implications of electronic commerce: a survey of consumers and business”, Electronic Networking Applications and Policy, 9(5), 372-82.
45.Gefen, D.(2003). TAM or just plain habit: A look at experienced online shoppers. Journal of Organization and End User Computing(JOEUC),15(3), 1-13.
46.Green, J.R. & Scotchmer, S. (1995). ‘On the division of profit in sequential innovation’, The RAND Journal of Economics, 26(1), 20-33.
47.Greenfield, H.I.(2005).Consumer Interia. American Journal of Economics and Sociology,64(4), 1085-1089.
48.Gefen D, Benbasat I, Pavlou PA .(2008). A research agenda for trust in online environments. J Manag Inf Syst, 24(4), 275–286.
49.Hampton, K. N., Sessions, L., & Ja Her, E. (2011). Core networks, social isolation, and new media: Internet and mobile phone use, network size, and diversity. Information, Communication & Society, 14(1), 130–155.
50.Haslam, S. A. (2001). Psychology in organizations: The social identity approach. Thousand Oaks, CA: Sage.
51.Hoffman, D. L., Novak, T. P., & Peralta, M. (1999). Building consumer trust online. Communications of the ACM, 42(4), 80–85.
52.Hogg, M. A., & Mullin, B.-A. (1999). Joining groups to reduce uncertainty: Subjective uncertainty reduction and group identification. In D. Abrams, & M.A. Hogg (Eds.), Social identity and social cognition (pp. 249–279). Oxford, UK: Blackwell.
53.Jackson, J.A. (1986), Migration, Longman, New York.
54.Jacoby, J., & Chestnut, R. (1978). Brand loyalty: Measurement and management. 
55.Katz, M. L., & Shapiro, C. (1985). Network externalities, competition, and compatibility. American Economic Review, 75, 424–440.
56.Kline, R. B.(1998). Structural equation modeling.
57.Kahn, B. E. (1995). Consumer variety-seeking among goods and services. Journal of Retailing and Consumer Services, 2(3), 139-148.
58.Kolsaker, A. and Payne, C. (2002). “Engendering trust in e-commerce: a study of gender-based concerns”, Marketing Intelligence and Planning, 20 (4), 206-14.
59.Khan, B. M. (2009). Consumers and their brands: Deciphering dimensions of loyalty. International Journal of Business Insights & Transformation, 2(1), 84–92.
60.King, B.(2018).Bank4.0: Banking Everywhere, Never at a Bank: Wiley.
61.Kim, D.J. (2008). Self-perception-based versus transference-based trust determinants in computer-mediated transactions: a cross-cultural comparison study. J Manag Inf Syst, 24(4), 13–45.
62.Kwek Choon Ling, Lau Teck Chai and Tan Hoi Piew. (2010). The Effects of Shopping Orientations, Online Trust and Prior Online Purchase Experience toward Customers' Online Purchase Intention , International Business Research, 3(3), 63-76.
63.Langerak, F., Hultink, E.J. & Robben, H.S. (2004). ‘The impact of market orientation, product advantage, and launch proficiency on new product performance and organizational performance, Journal of Product Innovation Management, 21(2), 79-94.
64.Lee, E. S. (1966). A theory of migration. Demography, 3(1), 47–57.
65.Lee, J.M., & Kim, H-J. (2020). Determinants of adoption and continuance intentions toward Internet-only banks. International journal of bank marketing. 
66.Lewis, G, J. (1982). Human Migration: A geographical Perspective. London; Bellhaven, 23-34.
67.Liao, C., Palvia, P., & Lin, H.-N. (2006). The roles of habit and website quality in e-commerce. International Journal of Information Management, 26(6), 469–483.
68.Lin J, Lu Y, Wang B, Wei KK (2011b). The role of inter-channel trust transfer in establishing mobile commerce trust. Electron Commer Res Appl, 10(6),615–625.
69.Longino, C. F. (1992). The forest and the trees: Micro-level considerations in the study of geographic mobility in old age. Elderly migration and population redistribution, 23–34.
70.Limayem, Moez and Hirt, Sabine Gabriele.(2003). "Force of Habit and Information Systems Usage: Theory and Initial Validation," Journal of the Association for Information Systems, 4(1), Article 3.
71.Lin, C. P., & Bhattacherjee, A. (2008). Elucidating individual intention to use interactive information technologies: The role of network externalities. International Journal of Electronic Commerce, 13, 85–108.
72.Lin SW, Liu YC (2012) The effects of motivations, trust, and privacy concern in social networking. Serv Bus, 6(4), 411–424.
73.Lee KC, Kang I, McKnight H. (2007). Transfer from offline trust to key online perceptions: an empirical study. IEEE Trans Eng Manag, 54(4), 729–741.
74.Lin, K. Y., & Lu, H. P. (2011). Why people use social networking sites: An empirical study integrating network externalities and motivation theory. Computers in Human Behavior, 27, 1152–1161.
75.Lin J, Lu Y, Wang B, Wei KK. (2011b). The role of inter-channel trust transfer in establishing mobile commerce trust. Electron Commer Res Appl, 10(6), 615–625
76.Linck, K., Pousttchi, K., & Wiedemann, D. G. (2006). Security issues in mobile payment from the customer viewpoint.
77.Li, H., Wu, J., Gao, Y., & Shi, Y. (2016). Examining individuals' adoption of healthcare wearable devices: An empirical study from privacy calculus perspective. International Journal of Medical Informatics, 88, 8–17.
78.Mael, F., & Ashforth, B. E. (1992). Alumni and their alma mater: A partial test of the reformulated model of organizational identification. Journal of Organization Behavior, 13, 103–123.
79.Mandhachitara,R., & Poolthong,Y.(2011).Amodel of customer loyalty and corporate social responsibility. Journal of Services Marketing, 25(2), 122–133.
80.McCole, P. and Palmer, A. (2001). ‘A critical evaluation of the role of trust in direct marketing over the internet’,World Marketing Congress, University of Cardiff, Wales.
81.McKnight, D.H., Choudhury, V. and Kacmar, C. (2002). ‘Developing and validating trust measures for e-commerce: An integrative typology’, Information Systems Research, 13(3), 334-359.
82.Mei-Hsiang Wang & Tarng-Yao Yang. (2016). Investigating the success of knowledge management: An empirical study of small- and medium-sized enterprises Asia Pacific Management Review, Vol 21(2), 79-91.
83.Moon, B. (1995). Paradigms in migration research: exploring 'moorings' as a schema. Progress in Human Geography, 19(4), 504–524.
84.Moore, J.F. (1993).「Predators and prey: A new ecology of competition.」, Harvard Business Review, 71(3), 75–86.
85.Moorman, C., Deshpande´, R. and Zaltman, G. (1993). “Factors affecting trust in market research relationships”, Journal of Marketing, 57, 81-101.
86.Muthoka, N.I., Oluoch, O. and Muiruri, P.M. (2018). “The influence of branchless financial innovation on market capitalization of commercial banks listed in NSE, Kenya”, International Journal of Academic Research in Accounting, Finance and Management Sciences, 8(4), 120-130.
87.Mohamed, N., & Ahmad, I. (2012). Information privacy concerns, antecedents and privacy measure use in social networking sites: Evidence from Malaysia. Computers in Human Behavior, 28(6), 2366–2375.
88.Moorman, C., Zaltman, G. and Deshpande, R. (1992). “Relationships between providers and users of market research: the dynamics of trust within and between organizations”, Journal of Marketing Research, 29, 314-28.
89.Mayer RC, Davis JH, Schoorman FD. (1995). An integrative model of organizational trust. Acad Manag Rev 20(3), 709–734.
90.Mustafa, K. and Waheed, A. (2016). “Impact of alternative factors on the usage of telco-led branchless banking services: empirical evidence from Pakistan”, The Journal of Internet Banking and Commerce, 21(3), 1-19.
91.Muthoka, N.I., Oluoch, O. and Muiruri, P.M. (2018). “The influence of branchless financial innovation on market capitalization of commercial banks listed in NSE, Kenya”, International Journal of Academic Research in Accounting, Finance and Management Sciences, 8(4), 120-130.
92.Nunnally, N.R. (1978). Stream renovation: an alternative to channelization. Environmental Management,2(5), 403-411.
93.Oliver, R. L. (1999). Whence consumer loyalty? Journal of Marketing, 63(4), 33–44.
94.Perks H, Halliday SV. (2003). Sources, signs, and signaling for last trust creation in organizational relationships. Euro Manag J, 21(3), 338–350.
95.Polites, G. L., & Karahanna, E. (2012). Shackled to the Status Quo: The Inhibiting Effects of Incumbent System Habit, Switching Costs, and Inertia on New System Acceptance. MIS Quarterly, 36(1), 21-42.
96.Philippon, T., (2016). The fintech opportunity. Natl Bureau Econ Res. https://doi.org/10.3386/w22476.
97.Ringle, C. M., Wende, S., & Becker, J. M. (2015). SmartPLS 3. Boenningstedt. SmartPLS GmbH.
98.	Rogers, E. M. (1983). Diffusion of Innovation (3rd edition): New York: The Press
99.Rachmawati, R., Farda, N.M., Rijanta, R. and Setiyono, B. (2019). “The advantages and analysis of the location of branchless banking in urban and rural areas in Yogyakarta special region, Indonesia”, Journal of Urban and Regional Analysis, 11(1), 53-68.
100.Roos, I. (1999). Switching processes in customer relationships. Journal of Service Research, 2(1), 68-85.
101.Pontiggia, A., & Virili, F. (2010). Network effects in technology acceptance:  Laboratory experimental evidence. International Journal of Information Management, 30(1), 68–77.
102.Ravenstein, E. G. (1885). The laws of migration. Journal of the Statistical Society of London, 48(2), 167–235.
103.Rachmawati, R., Farda, N.M.,Rijanta, R. and Setiyono, B. (2019). “The advantages and analysis of the location of branchless banking in urban and rural areas in Yogyakarta special region, Indonesia”, Journal of Urban and Regional Analysis, 11(1), 53-68.
104.S. Smith. (2015). What is Fintech?: A Simple Explanation, Ashburnham Insurance.
105.Santoso, B. and Ahmad, K. (2016). “Islamic microfinance branchless banking model in Indonesia”, Intellectual Discourse, 24, 409-433.
106.Schindler, J.W. (2017). Fintech and Financial innovation: Drivers and Depth(SSRN Scholarly Paper No. ID 3029731). Social Science Research Network, Rochester, NY https://doi.org/10.17016/FEDS.2017.081.
107.Shih, Y.Y. and Fang, K. (2004). “The use of a decomposed theory of planned behavior to study Internet banking in Taiwan”, Internet Research, 14(3), 213-223.
108.Shuang Cheng, Sang-Joon Lee, Beomjin Choi.(2019). An empirical investigation of users’ voluntary switching intention for mobile personal cloud storage services based on the push-pull-mooring framework, Computers in Human Behavior, 92, 198-215.
109.Stewart, K. J. (2003) Trust transfer on the World Wide Web. Organ Sci, 14(1), 5–17.
110.Slater, S.F. & Narver, J.C. (1993). ‘Product-market strategy and performance: an analysis of the Miles and Snow strategy types’, European Journal of Marketing, 27(10), 33-51.
111.Srinivasan, S. S., Anderson, R., & Ponnavolu, K. (2002). Customer loyalty in eCommerce: An exploration of its antecedents and consequences. Journal of Retailing, 78(1), 41–50.
112.Su, C.-.W., Qin, M., Tao, R., Shao, X.-.F., Albu, L.L., Umar, M. (2020b). Can Bitcoin hedge the risks of geopolitical events? Technol. Forecast. Soc. Change 159, 120182. https://doi.org/10.1016/j.techfore.2020.120182.
113.T. Dinev, P. Hart. (2004). Internet privacy concerns and their antecedents – Measurement validity and a regression model.Behavior and Information Technology, 23 (6), 413-422.
114.Tao Zhou, Yaobin Lu. (2011). Examining mobile instant messaging user loyalty from the perspectives of network externalities and flow experience. Computers in Human Behavior, 27(2), 883-889.
115.Triandis, H. (1980). Values, attitudes, and interpersonal behavior. Nebraska symposium on motivation. Nebraska symposium on motivation.
116.Verhagen, T., Meents, S. and Tan, Y.H. (2006). ‘Perceived risk and trust associated with purchasing at electronic.
117.Verhagen, T., Tan, Y.H. and Meents, S. (2004). ‘An empirical exploration of trust and risk associated with purchasing at electronic marketplaces’, 17th Bled eCommerce Conference eGlobal, Bled, Slovenia, 21-23.
118.Verplanken, B., & Aarts, H. (1999). Habit, attitude, and planned behavior: Is habit an empty construct or an interesting case of goal-directed automaticity? European Review of Social Psychology, 10(1), 101–134.
119.Wang, Mei-Hsiang, Tarng-Yao Yang. (2016). “Investigating the Success of Knowledge Management: An Empirical Study of Small- and Medium-Sized Enterprises,” Asia Pacific Management Review, 21(2), 79-91.
120.Wang, P., Fang, B., & Yun, X. (2005). A new User Habit Based Approach for Early Warning of worms. In International Conference on Computational and Information Science, 212-219. 
121.Wattal, S., Racherla, P., & Mandviwalla, M. (2010). Network externalities and technology use: A quantitative analysis of intraorganizational blogs. Journal of Management Information Systems, 27(1), 145–174.
122.Wu CW, Huarng KH, Fiegantara S, Wu P-C . (2012). The impact of online customer satisfaction on the yahoo auction in Taiwan. Serv Bus 6(4), 473–487
123.York, NY: John Wiley and Sons, Inc.
124.Zhou, T., & Lu, Y. (2011). Examining mobile instant messaging user loyalty from the perspectives of network externalities and flow experience. Computers in Human Behavior, 27(2), 883–889.
論文全文使用權限
校內
校內紙本論文立即公開
同意電子論文全文授權校園內公開
校內電子論文立即公開
校外
同意授權
校外電子論文立即公開

如有問題,歡迎洽詢!
圖書館數位資訊組 (02)2621-5656 轉 2487 或 來信