系統識別號 | U0002-2106201103072700 |
---|---|
DOI | 10.6846/TKU.2011.00755 |
論文名稱(中文) | 影響雲端運算應用的因素-整合TAM、TPB、IDT和資安風險 |
論文名稱(英文) | Factors influencing the adoption of cloud computing:An integration of TAM, TPB, IDT, and security risk |
第三語言論文名稱 | |
校院名稱 | 淡江大學 |
系所名稱(中文) | 管理科學研究所企業經營碩士在職專班 |
系所名稱(英文) | Executive Master's Program of Business Administration in Management Sciences |
外國學位學校名稱 | |
外國學位學院名稱 | |
外國學位研究所名稱 | |
學年度 | 99 |
學期 | 2 |
出版年 | 100 |
研究生(中文) | 張秀琦 |
研究生(英文) | Shiou-Chi Chang |
學號 | 798620521 |
學位類別 | 碩士 |
語言別 | 英文 |
第二語言別 | |
口試日期 | 2011-05-28 |
論文頁數 | 57頁 |
口試委員 |
指導教授
-
陳水蓮(slchen@mail.tku.edu.tw)
委員 - 康信鴻 委員 - 李旭華 |
關鍵字(中) |
雲端運算 TAM TPB IDT 資安風險 |
關鍵字(英) |
Cloud computing TAM TPB IDT security risk |
第三語言關鍵字 | |
學科別分類 | |
中文摘要 |
雲端運算現在是個非常熱門的議題,許多國際性或是大型企業的正積極搶佔雲端商機。正當各企業紛紛投身其中之際,亦曾聽聞一些網路用戶可能會因擔心個資安全是否遭惡意侵犯,而選擇避免使用雲端運算的相關功能。目前,與雲端運算相關的文章、資訊中,多數量產業上的技術應用(羅森塔爾, 2010),幾乎未有針對使用者的接受意願進行研究, 因此,此次研究的目的即是結合TAM、TPB、IDT 和資安風險等因素,探討企業關心的最終使用者接受程度。研究過程中,透過一家專業的市調公司在台灣收集了1,069份有效問卷作最後的分析的數據。 研究結果顯示知覺易用、知覺有用、相對優勢、相容性將影響使用者接受雲端運算概念的行為態度。資安風險、相容性、行為態度、主觀標準、知覺行為控制會影響到雲端運算應用的行為意圖。最後,結論中亦提出對後進研究者未來研究方向的相關建議。 |
英文摘要 |
“Cloud computing” is topical and frequently discussed, with numerous international companies actively and preparing. Nevertheless, some users worry about private information loss and personal secret infringement, and avoid using cloud computing. Currently available articles, blogs, and forums focus on applying clouds to industries (Rosenthal, et al., 2010) but without regard for the user's intention. The purpose of this research is to integrate TAM, TPB, IDT, and security risk to investigate factors influencing the adoption of cloud computing as integration. A professional market questionnaire investigation company in Taiwan collected the research data. Retrieved 1069 useful questionnaires were used as the data for the final analysis. The research findings reveal that the perceived ease of use, perceived usefulness, relative advantage, and compatibility influence attitudes toward the behavior of cloud computing. The security risk, compatibility, attitudes toward the behavior, subjective norm, and perceived behavioral control influence the behavioral intention of cloud computing. Finally, this research offers suggestions for future researchers. |
第三語言摘要 | |
論文目次 |
Chapter1. Introduction 1 1.1 Overview 1 1.2 Research Purpose 5 1.3 Research Process 7 Chapter2. Literature Review and Research Hypotheses 8 2.1 Cloud computing 8 2.2 Technology acceptance model (TAM) 10 2.3 Innovation diffusion theory (IDT), or diffusion of innovations (DOI) 11 2.4 The theory of planned behavior (TPB) 12 2.5 Security risk 14 2.6 Research hypotheses development 17 Chapter3. Research Methodology 25 3.1 Conceptual research framework 25 3.2 Questionnaire Design 26 3.3 Measurement 26 3.4 Data collection 27 3.5 Analysis method 28 Chapter4. Data Analysis and Results 29 4.1 Descriptive statistics analysis 29 4.2 Measurement accuracy analysis statistics 31 4.3 Hypotheses testing 37 Chapter5. Conclusion 40 5.1 Discussion 40 5.2 Implication 43 5.3 Limitations and future research 44 Reference 45 Appendix 56 LIST OF FIGURE Figure 1.1 Research Process 7 Figure 3.1. Conceptual Framework 25 Figure 4.1 Hypotheses testing: structure equal model 38 LIST OF TABLE Table 2.1 Definition of the variables 24 Table 3.1 Corresponding literature sources of the measure items 27 Table 4.1 Respondents’ Profiles 30 Table 4.2 Descriptive Statistics Analysis 31 Table 4.3 Measurement accuracy analysis statistic 34 Table 4.4 Correlation matrix of dimensions 36 Table 4.5 Threshold of △chi-square 36 Table 4.6 Structure Equal Model Estimates 39 Table 5.1 Research Results 41 |
參考文獻 |
Agarwal, R., & Prasad, J. (1999), Are individual differences germane to the acceptance of new information technologies. Decision Sciences, 30(2), 361-391. Ajzen, I., & Fishbein, M. (1980), Understanding attitudes and predicting social behavior, Englewood-Cliffs, NJ: Prentice Hall. Ajzen, I. (1985), From intentions to actions: a theory of planned behavior, in: J. Kuhl, J. Beckmann (Eds.), In Action Control: From cognition to Behavior, Springer Verlag, New York, 11-39. Ajzen, I. (1991), The Theory of Planned Behavior. Organizational Behavior and Human Decision Processes, 50(2), 179-211. Ajzen, I. (2002), Perceived behavioral control, self-efficacy, locus of control, and the theory of planned behavior. Journal of Applied Social Psychology, 32(4), 665-683. Ba-Alawi, A.A. (2003), Marketing e-rail in Yemen, 2nd Arab Conference on the Marketing in the Arab World, the Opportunities and Challenges, Doha, 6-8 October, 2003, 324-336. Babcock, C. (2010), Management Strategies for the Cloud Revolution. San Francisco: The McGraw-Hill Companies. Bagozzi, R. P., & Yi, Y., et al, (1988), Assessing Construct Validity in Organizational Research. Administrative Science Quarterly, 36(3), 421-430. Bestavros, A. (2000), Banking industry walks ‘tightrope’ in personalization of web services. Bank Syst Technol, 37(1), 54-56. Bhattacherjee (2001a), An empirical analysis of the antecedents of electronic commerce service continuance. Decision Support Systems, 32(2), 201-214. Bhattacherjee (2001b), Understanding information systems continuance. An expectation-confirmation model. MIS Quarterly, 25(3), 351-370. Brodkin, J. (2008), Gartner: Seven cloud-computing security risks. Network World, July 02. Browne, C. A., & Woolley, J. D. (2004), Preschoolers’ magical explanations for violations of physical, social, and mental laws. Journal of Cognition and Development, 5 (2), 239–260. Buyya, R., Pandey, S., & Vecchiola, C. (2009), Cloudbus toolkit for market-oriented cloud computing. LNCS, 5931, 24-44. Chiasson, M. W., & Lovato, C. L. (2001), Factors influencing the formation of a user’s perceptions and use of a DSS software innovation. The DATA BASE for Advances in Information Systems, 323, 16-35. Cronbach, L. J. (1951), Coefficient alpha and the Internal Structure of Tests. Psychometrika, 16(3), 297-334. Davis, F. D. (1986), A Technology Acceptance Model for Empirically Testing New End User Information Systems: Theory and Results. Unpublished Doctoral Dissertation. Massachusetts Institute of Technology. Davis, F. D. (1989), Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology. MIS Quarterly, 13(3), 319-340. DeFelice, A., & Leon, J. F. (2010), Cloud Computing. Journal of Accountancy New York, 210(4), 50-56. Dika, S. (2003), The Effects of Self-Processes and Social Capital on the Educational Outcomes of High School Students, Virginia Polytechnic Institute and State University. Eriksson, K., Kerem, K., & Nilsson, D. (2005), Customer acceptance of Internet banking in Estonia. International Journal of Bank Marketing, 23(2), 200-216. Executive Yuan (2010), http://eyvisit.ey.gov.tw/ct.asp?xItem=70157&ctNode=146&mp=11 Fishbein, M., & Ajzen, I. (1975), Belief, Attitude, Intention and Behavior: An Introduction to Theory and Research. Addison-Wesley, Reading, MA. Fornell, C. L., & Larcker, D. F. (1981), Evaluating structural equation models with unobservable variables and measurement error. Journal of Marketing Research, 18(1), 39-50. Furnell, S. M., & Karweni, T. (1999), Security implications of electronic commerce: a survey of consumers and businesses. Internet Research, 9(5), 372-382. Goldsmith, R. E., & Desborde, R. (1990), Further Validation of an Opinion Leadership Scale. Journal of Business Research, Forthcoming. Gunderloy, M. (2009), Is your information under the mattress or in the ATM? Web Worker Daily, July 2008. (accessed March 17, 2009). Hair, J. F. Jr., Anderson, R. E., Tatham, R. L., & Black, W. C. (1998). Multivariate Data Analysis. Upper Saddle River, NJ: Prentice Hall. Hammond, S. (2008), Cloud computing: IT of the future or powderpuff? Enterprise Innovation, October-November, 33-34. Hightower, J. E., Zehfuss, K. P., Fox, D. A., & Parauka, F. M. (2002), Summer habitat selection by Gulf sturgeon in the Choctawhatchee River, Florida. In: Proc. 4th Internat. Symp. on Sturgeon. H. Rosenthal (Ed.) J. Appl. Ichthyol. (current volume). Hu, L., Ying, S., Jia, X., & Zhao, K. (2009), Towards an approach of semantic access control for cloud computing. LNCS, 5931, 145-156. Hu, P. J., Chau, P. Y. K., Sheng, O. R. L., & Tam, K. Y. (1999) Examining the technology acceptance model using physician acceptance of telemedicine technology. Journal of Management Information Systems, 16(2), 91-112. Hurt, H., Joseph, K., & Cook, C. (1997), Scales for the Measurement of Innovativeness. Human Communication Research, 4, 58-65. Jacoby, J., & Kaplan, L. (1972), The Components of Perceived Risk, in Venkatesan, M.(Ed.). Proceedings of the 3rd Annual Conference, Association for Consumer Research, Champaign, IL,382-393 Jarvenpaa, S. L., Tractinsky, N., & Vitale, M. (2000), Consumer Trust in an Internet Store. Information Technology and Management, 1(1/2), 45-71. Kalakota, R., & Whinston A. B. (1997), Electronic commerce: A Manager’s Guide. Reading, MA: Addison Wesley. Kline, J. N., Waldschmidt, T. J., Businga, T. R., Lemish, J. E., Weinstock, J. V., Thorne, P. S., & Krieg, A. M. (1998), Cutting Edge: Modulation of Airway Inflammation by CpG Oligodeoxynucleotides in a Murine Model of Asthma. The American Association of Immunologists, 160, 255-259. Kztzna, H., & Jr. (2010), On the privacy of cloud computing. International Journal of Management & Information Systems, 14(2), 1-12. Lee, M. C. (2008), Factors influencing the adoption of internet banking: An integration of TAM and TPB with perceived risk and perceived benefit. Electronic Commerce Research and Applications, 8, 130-141. Lee, M. C. (2009), Predicting and explaining the adoption of online trading: An empirical study in Taiwan. Decision Support Systems, 47,133–142. Lee, M. C. (2009), Understanding the behavioural intention to play online games An extension of the theory of planned behaviour. Online Information Review, 33(5), 849-872. Lee, M. C. (2010), Explaining and predicting users’ continuance intention toward e-learning: An extension of the expectation–confirmation model. Computers & Education, 54, 506–516. Lee, S. M. & Chen, L. (2010), The Impact Of Flow On Online Consumer Behavior. The Journal of Computer Information Systems, 50(4), 1. Legris, P., Ingham, J., & Collerette, P. (2003), Why do people use information technology? A critical review of the technology acceptance model. Information & Managements, 40(3), 191-204. Liao, S. (1999), The adoption of virtual banking: an empirical study. International Journal of Information Management, 19(1), 63-74. Liao, C., & Chen, J. L., et al (2007), Theory of planned behavior (TPB) and customer satisfaction in the continued use of e-service. An integrated model. Computers in Human Behavior, 23(6), 2804-2822. Littler, D., & Melanthiou, D. (2006), Consumer perceptions of risk and uncertainty and the implications for behaviour towards innovative retail services: the case of internet banking. Journal Retailing Consum Serv, 13(6), 431-443. MacCallurn, R. C., & Hong, S. (1997), Power analysis in covariance structure modeling using. Multivariate Behavioral Research, 32(2), 193-210. Marston, S., Li, Z., Bandyopadhyay, S., Zhang, J., & Ghalsasi, A. (2011), Cloud computing – The business perspective. Decision Support Systems, 51(1), 176. Mathieson, K., Peacock, E., & Chin, W. W. (2001), Extending the technology acceptance model: the influence of perceived user resources. Database for Advances in Information Systems, 32(3), 86-111. McCarthy, J. (1960), Recursive functions of symbolic expressions and their computation by machine. Communications of the ACM, 3(4), 184-195. Midgley, D. F., & Dowling, G. R. (1978), Innovativeness: The Concept and Its Measurement. Journal of Consumer Research, 4, 229-242. Mirzaei, N. (2008), Cloud Computing. Indiana University. Miller, M. (2009), Cloud Computing: Web-Based Applications That Change the Way Your Work and Collaborate Online. Indiana: Que Publishing. Moore, G. C. (1991), Development of an instrument to measure the perceptions of adopting an information technology innovation. Information System Research, 2(3), 192-222. Moore, G. C., & Benbasat, I. (1991), Development of an Instrument to Measure the Perceptions of Adopting an Information Technology Innovation. Information Systems Research 2(3), 192-222. Moore, G. C., & Benbasat, I. (2001), Development of an Instrument to Measure the Perceptions of Adopting an Information Technology Innovation. Information Systems Research, 2(3), 192-222. North, E. J., Mostert, P. G., & du Plessis, P. J. (2003), Cybershopping: concerns of the South African consumer. Journal of Family Ecology and Consumer Sciences, 31, 58-66. NIST (2009), NIST definition of cloud computing v15, NIST, Editor. National Institute of Standards and Technology: Gaithersburg, MD. Nunnally, J. C. (1978), Psychometric Theory, New York:McGraw-hill Peter, J. P., & Tarpey, L. (1975), A comparative Analysis of Three Consumer Strategies. Journal of Consumer Research,12, 29-37. Reavley, N. (2005), Securing online banking. Card Technology Today, 17(10), 12-3. Rogers, E. M. (1983), Diffusion of Innovations. (3rd). The Free Press, New York. Rogers, E. M. (1995), Diffusion of Innovations. (4th). Free Press, New York. Rogers, E. M. (2003), Diffusion of innovations. (5th). New York: Free Press. Rosenthal, A., Mork, P., Li, M. H., Stanford, J., Koester, D., & Reynolds, P. (2010), Cloud computing: A new business paradigm for biomedical information sharing. Journal of Biomedical Informatics, 43, 342–353. Scale, M. E. (2009), Cloud computing and collaboration. Library Hi Tech News, 9, 10-13. Shacklett, M. (2010), Cloud Computing. WORLDTRADE 100, January. Stone, R. N., & Gronhaug, K. (1993), Perceived Risk: Further Considerations for the Marketing Discipline. European Journal of Marketing, 27(3), 39. Sultan, N. (2010), Cloud computing for education: A new dawn? International Journal of Information Management, 30(2), 109. Taiwan’s Cloud Computing Consortium (2010), http://www.twcloud.org.tw Taylor, S., & Todd, P. A. (1995a), Assessing IT Usage: The Role of Prior Experience, MIS Quarterly, 19(2), 561-570. Taylor, S., & Todd, P. A. (1995b). Understanding Information Technology Usage: A Test of Competing Models. Information Systems Research, 6(4), 144-176. Teng, F., & Magoulès, F. (2010), A new game theoretical resource allocation algorithm for cloud computing. LNCS, 6104, 321-330. Tornatzky, L. G., & Klein, K. J. (1982), Innovation Characteristics and Innovation Adoption-Implementation: A Meta-Analysis of Findings. IEEE Transactions on Engineering Management, 29(1), 28-45. Upson, S. (2011), Cloud Computing. IEEE Spectrum. New York, 48(1), 43. Velte, A. T., Velte, T. J., & Elsenpeter, R. (2010), Cloud Computing: A Practical Approach. San Francisco: The McGraw-Hill Companies. Venkatesh, V., & Morris, M. G. (2000), Why don't men ever stop to ask for directions? Gender, social influences, and their role in technology acceptance and usage behavior. MIS Quarterly, 24(1), 115-139. Venkatesh,V., Morris, M. G., Davis, G. B.& Davis, F. D. (2003), User acceptance of information technology: Toward a unified view1. MIS Quarterly, 27(4), 425-478. Venkatesh, V., & Davis, F. D. (1996), A model of the antecedents of perceived ease of use: development and test. Decision Sciences, 27, 451-481. Vouk, M. A. (2008), Cloud computing-Issues, Research and Implementation. Journal of Computing and Information Technology, 16(4), 235-246. Wu, X., & Wang, S. (2005), What drives mobile commerce? An empirical evaluation of the revised technology acceptance model. Information & Management, 42(5), 719-730. |
論文全文使用權限 |
如有問題,歡迎洽詢!
圖書館數位資訊組 (02)2621-5656 轉 2487 或 來信