淡江大學覺生紀念圖書館 (TKU Library)

系統識別號 U0002-2106201103072700
中文論文名稱 影響雲端運算應用的因素-整合TAM、TPB、IDT和資安風險
英文論文名稱 Factors influencing the adoption of cloud computing:An integration of TAM, TPB, IDT, and security risk
校院名稱 淡江大學
系所名稱(中) 管理科學研究所企業經營碩士在職專班
系所名稱(英) Executive Master's Program of Business Administration in Management Sciences
學年度 99
學期 2
出版年 100
研究生中文姓名 張秀琦
研究生英文姓名 Shiou-Chi Chang
學號 798620521
學位類別 碩士
語文別 英文
口試日期 2011-05-28
論文頁數 57頁
口試委員 指導教授-陳水蓮
中文關鍵字 雲端運算  TAM  TPB  IDT  資安風險 
英文關鍵字 Cloud computing  TAM  TPB  IDT  security risk 
學科別分類 學科別社會科學管理學
中文摘要 雲端運算現在是個非常熱門的議題,許多國際性或是大型企業的正積極搶佔雲端商機。正當各企業紛紛投身其中之際,亦曾聽聞一些網路用戶可能會因擔心個資安全是否遭惡意侵犯,而選擇避免使用雲端運算的相關功能。目前,與雲端運算相關的文章、資訊中,多數量產業上的技術應用(羅森塔爾, 2010),幾乎未有針對使用者的接受意願進行研究, 因此,此次研究的目的即是結合TAM、TPB、IDT 和資安風險等因素,探討企業關心的最終使用者接受程度。研究過程中,透過一家專業的市調公司在台灣收集了1,069份有效問卷作最後的分析的數據。
英文摘要 “Cloud computing” is topical and frequently discussed, with numerous international companies actively and preparing. Nevertheless, some users worry about private information loss and personal secret infringement, and avoid using cloud computing. Currently available articles, blogs, and forums focus on applying clouds to industries (Rosenthal, et al., 2010) but without regard for the user's intention. The purpose of this research is to integrate TAM, TPB, IDT, and security risk to investigate factors influencing the adoption of cloud computing as integration. A professional market questionnaire investigation company in Taiwan collected the research data. Retrieved 1069 useful questionnaires were used as the data for the final analysis.
The research findings reveal that the perceived ease of use, perceived usefulness, relative advantage, and compatibility influence attitudes toward the behavior of cloud computing. The security risk, compatibility, attitudes toward the behavior, subjective norm, and perceived behavioral control influence the behavioral intention of cloud computing. Finally, this research offers suggestions for future researchers.
論文目次 Chapter1. Introduction 1
1.1 Overview 1
1.2 Research Purpose 5
1.3 Research Process 7
Chapter2. Literature Review and Research Hypotheses 8
2.1 Cloud computing 8
2.2 Technology acceptance model (TAM) 10
2.3 Innovation diffusion theory (IDT), or diffusion of innovations (DOI) 11
2.4 The theory of planned behavior (TPB) 12
2.5 Security risk 14
2.6 Research hypotheses development 17
Chapter3. Research Methodology 25
3.1 Conceptual research framework 25
3.2 Questionnaire Design 26
3.3 Measurement 26
3.4 Data collection 27
3.5 Analysis method 28
Chapter4. Data Analysis and Results 29
4.1 Descriptive statistics analysis 29
4.2 Measurement accuracy analysis statistics 31
4.3 Hypotheses testing 37
Chapter5. Conclusion 40
5.1 Discussion 40
5.2 Implication 43
5.3 Limitations and future research 44
Reference 45
Appendix 56

Figure 1.1 Research Process 7
Figure 3.1. Conceptual Framework 25
Figure 4.1 Hypotheses testing: structure equal model 38

Table 2.1 Definition of the variables 24
Table 3.1 Corresponding literature sources of the measure items 27
Table 4.1 Respondents’ Profiles 30
Table 4.2 Descriptive Statistics Analysis 31
Table 4.3 Measurement accuracy analysis statistic 34
Table 4.4 Correlation matrix of dimensions 36
Table 4.5 Threshold of △chi-square 36
Table 4.6 Structure Equal Model Estimates 39
Table 5.1 Research Results 41
參考文獻 Agarwal, R., & Prasad, J. (1999), Are individual differences germane to the acceptance of new information technologies. Decision Sciences, 30(2), 361-391.
Ajzen, I., & Fishbein, M. (1980), Understanding attitudes and predicting social behavior, Englewood-Cliffs, NJ: Prentice Hall.
Ajzen, I. (1985), From intentions to actions: a theory of planned behavior, in: J. Kuhl, J. Beckmann (Eds.), In Action Control: From cognition to Behavior, Springer Verlag, New York, 11-39.
Ajzen, I. (1991), The Theory of Planned Behavior. Organizational Behavior and Human Decision Processes, 50(2), 179-211.
Ajzen, I. (2002), Perceived behavioral control, self-efficacy, locus of control, and the theory of planned behavior. Journal of Applied Social Psychology, 32(4), 665-683.
Ba-Alawi, A.A. (2003), Marketing e-rail in Yemen, 2nd Arab Conference on the Marketing in the Arab World, the Opportunities and Challenges, Doha, 6-8 October, 2003, 324-336.
Babcock, C. (2010), Management Strategies for the Cloud Revolution. San Francisco:
The McGraw-Hill Companies.
Bagozzi, R. P., & Yi, Y., et al, (1988), Assessing Construct Validity in Organizational Research. Administrative Science Quarterly, 36(3), 421-430.
Bestavros, A. (2000), Banking industry walks ‘tightrope’ in personalization of web services. Bank Syst Technol, 37(1), 54-56.
Bhattacherjee (2001a), An empirical analysis of the antecedents of electronic commerce service continuance. Decision Support Systems, 32(2), 201-214.
Bhattacherjee (2001b), Understanding information systems continuance. An expectation-confirmation model. MIS Quarterly, 25(3), 351-370.
Brodkin, J. (2008), Gartner: Seven cloud-computing security risks. Network World, July 02.
Browne, C. A., & Woolley, J. D. (2004), Preschoolers’ magical explanations for violations of physical, social, and mental laws. Journal of Cognition and Development, 5 (2), 239–260.
Buyya, R., Pandey, S., & Vecchiola, C. (2009), Cloudbus toolkit for market-oriented cloud computing. LNCS, 5931, 24-44.
Chiasson, M. W., & Lovato, C. L. (2001), Factors influencing the formation of a user’s perceptions and use of a DSS software innovation. The DATA BASE for Advances in Information Systems, 323, 16-35.
Cronbach, L. J. (1951), Coefficient alpha and the Internal Structure of Tests. Psychometrika, 16(3), 297-334.
Davis, F. D. (1986), A Technology Acceptance Model for Empirically Testing New End User Information Systems: Theory and Results. Unpublished Doctoral Dissertation. Massachusetts Institute of Technology.
Davis, F. D. (1989), Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology. MIS Quarterly, 13(3), 319-340.
DeFelice, A., & Leon, J. F. (2010), Cloud Computing. Journal of Accountancy New York, 210(4), 50-56.
Dika, S. (2003), The Effects of Self-Processes and Social Capital on the Educational Outcomes of High School Students, Virginia Polytechnic Institute and State University.
Eriksson, K., Kerem, K., & Nilsson, D. (2005), Customer acceptance of Internet banking in Estonia. International Journal of Bank Marketing, 23(2), 200-216.
Executive Yuan (2010), http://eyvisit.ey.gov.tw/ct.asp?xItem=70157&ctNode=146&mp=11
Fishbein, M., & Ajzen, I. (1975), Belief, Attitude, Intention and Behavior: An Introduction to Theory and Research. Addison-Wesley, Reading, MA.
Fornell, C. L., & Larcker, D. F. (1981), Evaluating structural equation models with unobservable variables and measurement error. Journal of Marketing Research, 18(1), 39-50.
Furnell, S. M., & Karweni, T. (1999), Security implications of electronic commerce: a survey of consumers and businesses. Internet Research, 9(5), 372-382.
Goldsmith, R. E., & Desborde, R. (1990), Further Validation of an Opinion Leadership Scale. Journal of Business Research, Forthcoming.
Gunderloy, M. (2009), Is your information under the mattress or in the ATM? Web Worker Daily, July 2008. (accessed March 17, 2009).
Hair, J. F. Jr., Anderson, R. E., Tatham, R. L., & Black, W. C. (1998). Multivariate Data Analysis. Upper Saddle River, NJ: Prentice Hall.
Hammond, S. (2008), Cloud computing: IT of the future or powderpuff? Enterprise Innovation, October-November, 33-34.
Hightower, J. E., Zehfuss, K. P., Fox, D. A., & Parauka, F. M. (2002), Summer habitat selection by Gulf sturgeon in the Choctawhatchee River, Florida. In: Proc. 4th Internat. Symp. on Sturgeon. H. Rosenthal (Ed.) J. Appl. Ichthyol. (current volume).
Hu, L., Ying, S., Jia, X., & Zhao, K. (2009), Towards an approach of semantic access control for cloud computing. LNCS, 5931, 145-156.
Hu, P. J., Chau, P. Y. K., Sheng, O. R. L., & Tam, K. Y. (1999) Examining the technology acceptance model using physician acceptance of telemedicine technology. Journal of Management Information Systems, 16(2), 91-112.
Hurt, H., Joseph, K., & Cook, C. (1997), Scales for the Measurement of Innovativeness. Human Communication Research, 4, 58-65.
Jacoby, J., & Kaplan, L. (1972), The Components of Perceived Risk, in Venkatesan, M.(Ed.). Proceedings of the 3rd Annual Conference, Association for Consumer Research, Champaign, IL,382-393
Jarvenpaa, S. L., Tractinsky, N., & Vitale, M. (2000), Consumer Trust in an Internet Store. Information Technology and Management, 1(1/2), 45-71.
Kalakota, R., & Whinston A. B. (1997), Electronic commerce: A Manager’s Guide. Reading, MA: Addison Wesley.
Kline, J. N., Waldschmidt, T. J., Businga, T. R., Lemish, J. E., Weinstock, J. V., Thorne, P. S., & Krieg, A. M. (1998), Cutting Edge: Modulation of Airway Inflammation by CpG Oligodeoxynucleotides in a Murine Model of Asthma. The American Association of Immunologists, 160, 255-259.
Kztzna, H., & Jr. (2010), On the privacy of cloud computing. International Journal of Management & Information Systems, 14(2), 1-12.
Lee, M. C. (2008), Factors influencing the adoption of internet banking: An integration of TAM and TPB with perceived risk and perceived benefit. Electronic Commerce Research and Applications, 8, 130-141.
Lee, M. C. (2009), Predicting and explaining the adoption of online trading: An empirical study in Taiwan. Decision Support Systems, 47,133–142.
Lee, M. C. (2009), Understanding the behavioural intention to play online games An extension of the theory of planned behaviour. Online Information Review, 33(5), 849-872.
Lee, M. C. (2010), Explaining and predicting users’ continuance intention toward e-learning: An extension of the expectation–confirmation model. Computers & Education, 54, 506–516.
Lee, S. M. & Chen, L. (2010), The Impact Of Flow On Online Consumer Behavior. The Journal of Computer Information Systems, 50(4), 1.
Legris, P., Ingham, J., & Collerette, P. (2003), Why do people use information technology? A critical review of the technology acceptance model. Information & Managements, 40(3), 191-204.
Liao, S. (1999), The adoption of virtual banking: an empirical study. International Journal of Information Management, 19(1), 63-74.
Liao, C., & Chen, J. L., et al (2007), Theory of planned behavior (TPB) and customer satisfaction in the continued use of e-service. An integrated model. Computers in Human Behavior, 23(6), 2804-2822.
Littler, D., & Melanthiou, D. (2006), Consumer perceptions of risk and uncertainty and the implications for behaviour towards innovative retail services: the case of internet banking. Journal Retailing Consum Serv, 13(6), 431-443.
MacCallurn, R. C., & Hong, S. (1997), Power analysis in covariance structure modeling using. Multivariate Behavioral Research, 32(2), 193-210.
Marston, S., Li, Z., Bandyopadhyay, S., Zhang, J., & Ghalsasi, A. (2011), Cloud computing – The business perspective. Decision Support Systems, 51(1), 176.
Mathieson, K., Peacock, E., & Chin, W. W. (2001), Extending the technology acceptance model: the influence of perceived user resources. Database for Advances in Information Systems, 32(3), 86-111.
McCarthy, J. (1960), Recursive functions of symbolic expressions and their computation by machine. Communications of the ACM, 3(4), 184-195.
Midgley, D. F., & Dowling, G. R. (1978), Innovativeness: The Concept and Its Measurement. Journal of Consumer Research, 4, 229-242.
Mirzaei, N. (2008), Cloud Computing. Indiana University.
Miller, M. (2009), Cloud Computing: Web-Based Applications That Change the Way Your Work and Collaborate Online. Indiana: Que Publishing.
Moore, G. C. (1991), Development of an instrument to measure the perceptions of adopting an information technology innovation. Information System Research, 2(3), 192-222.
Moore, G. C., & Benbasat, I. (1991), Development of an Instrument to Measure the Perceptions of Adopting an Information Technology Innovation. Information Systems Research 2(3), 192-222.
Moore, G. C., & Benbasat, I. (2001), Development of an Instrument to Measure the Perceptions of Adopting an Information Technology Innovation. Information Systems Research, 2(3), 192-222.
North, E. J., Mostert, P. G., & du Plessis, P. J. (2003), Cybershopping: concerns of the South African consumer. Journal of Family Ecology and Consumer Sciences, 31, 58-66.
NIST (2009), NIST definition of cloud computing v15, NIST, Editor. National Institute of Standards and Technology: Gaithersburg, MD.
Nunnally, J. C. (1978), Psychometric Theory, New York:McGraw-hill
Peter, J. P., & Tarpey, L. (1975), A comparative Analysis of Three Consumer Strategies. Journal of Consumer Research,12, 29-37.
Reavley, N. (2005), Securing online banking. Card Technology Today, 17(10), 12-3.
Rogers, E. M. (1983), Diffusion of Innovations. (3rd). The Free Press, New York.
Rogers, E. M. (1995), Diffusion of Innovations. (4th). Free Press, New York.
Rogers, E. M. (2003), Diffusion of innovations. (5th). New York: Free Press.
Rosenthal, A., Mork, P., Li, M. H., Stanford, J., Koester, D., & Reynolds, P. (2010), Cloud computing: A new business paradigm for biomedical information sharing. Journal of Biomedical Informatics, 43, 342–353.
Scale, M. E. (2009), Cloud computing and collaboration. Library Hi Tech News, 9, 10-13.
Shacklett, M. (2010), Cloud Computing. WORLDTRADE 100, January.
Stone, R. N., & Gronhaug, K. (1993), Perceived Risk: Further Considerations for the Marketing Discipline. European Journal of Marketing, 27(3), 39.
Sultan, N. (2010), Cloud computing for education: A new dawn? International Journal of Information Management, 30(2), 109.
Taiwan’s Cloud Computing Consortium (2010), http://www.twcloud.org.tw
Taylor, S., & Todd, P. A. (1995a), Assessing IT Usage: The Role of Prior Experience, MIS Quarterly, 19(2), 561-570.
Taylor, S., & Todd, P. A. (1995b). Understanding Information Technology Usage: A Test of Competing Models. Information Systems Research, 6(4), 144-176.
Teng, F., & Magoulès, F. (2010), A new game theoretical resource allocation algorithm for cloud computing. LNCS, 6104, 321-330.
Tornatzky, L. G., & Klein, K. J. (1982), Innovation Characteristics and Innovation Adoption-Implementation: A Meta-Analysis of Findings. IEEE Transactions on Engineering Management, 29(1), 28-45.
Upson, S. (2011), Cloud Computing. IEEE Spectrum. New York, 48(1), 43.
Velte, A. T., Velte, T. J., & Elsenpeter, R. (2010), Cloud Computing: A Practical Approach. San Francisco: The McGraw-Hill Companies.
Venkatesh, V., & Morris, M. G. (2000), Why don't men ever stop to ask for directions? Gender, social influences, and their role in technology acceptance and usage behavior. MIS Quarterly, 24(1), 115-139.
Venkatesh,V., Morris, M. G., Davis, G. B.& Davis, F. D. (2003), User acceptance of information technology: Toward a unified view1. MIS Quarterly, 27(4), 425-478.
Venkatesh, V., & Davis, F. D. (1996), A model of the antecedents of perceived ease of use: development and test. Decision Sciences, 27, 451-481.
Vouk, M. A. (2008), Cloud computing-Issues, Research and Implementation. Journal of Computing and Information Technology, 16(4), 235-246.
Wu, X., & Wang, S. (2005), What drives mobile commerce? An empirical evaluation of the revised technology acceptance model. Information & Management, 42(5), 719-730.
  • 同意紙本無償授權給館內讀者為學術之目的重製使用,於2011-06-23公開。
  • 同意授權瀏覽/列印電子全文服務,於2011-06-23起公開。

  • 若您有任何疑問,請與我們聯絡!
    圖書館: 請來電 (02)2621-5656 轉 2487 或 來信 dss@mail.tku.edu.tw