§ 瀏覽學位論文書目資料
  
系統識別號 U0002-2106201103072700
DOI 10.6846/TKU.2011.00755
論文名稱(中文) 影響雲端運算應用的因素-整合TAM、TPB、IDT和資安風險
論文名稱(英文) Factors influencing the adoption of cloud computing:An integration of TAM, TPB, IDT, and security risk
第三語言論文名稱
校院名稱 淡江大學
系所名稱(中文) 管理科學研究所企業經營碩士在職專班
系所名稱(英文) Executive Master's Program of Business Administration in Management Sciences
外國學位學校名稱
外國學位學院名稱
外國學位研究所名稱
學年度 99
學期 2
出版年 100
研究生(中文) 張秀琦
研究生(英文) Shiou-Chi Chang
學號 798620521
學位類別 碩士
語言別 英文
第二語言別
口試日期 2011-05-28
論文頁數 57頁
口試委員 指導教授 - 陳水蓮(slchen@mail.tku.edu.tw)
委員 - 康信鴻
委員 - 李旭華
關鍵字(中) 雲端運算
TAM
TPB
IDT
資安風險
關鍵字(英) Cloud computing
TAM
TPB
IDT
security risk
第三語言關鍵字
學科別分類
中文摘要
雲端運算現在是個非常熱門的議題,許多國際性或是大型企業的正積極搶佔雲端商機。正當各企業紛紛投身其中之際,亦曾聽聞一些網路用戶可能會因擔心個資安全是否遭惡意侵犯,而選擇避免使用雲端運算的相關功能。目前,與雲端運算相關的文章、資訊中,多數量產業上的技術應用(羅森塔爾, 2010),幾乎未有針對使用者的接受意願進行研究, 因此,此次研究的目的即是結合TAM、TPB、IDT 和資安風險等因素,探討企業關心的最終使用者接受程度。研究過程中,透過一家專業的市調公司在台灣收集了1,069份有效問卷作最後的分析的數據。 
研究結果顯示知覺易用、知覺有用、相對優勢、相容性將影響使用者接受雲端運算概念的行為態度。資安風險、相容性、行為態度、主觀標準、知覺行為控制會影響到雲端運算應用的行為意圖。最後,結論中亦提出對後進研究者未來研究方向的相關建議。
英文摘要
“Cloud computing” is topical and frequently discussed, with numerous international companies actively and preparing. Nevertheless, some users worry about private information loss and personal secret infringement, and avoid using cloud computing.  Currently available articles, blogs, and forums focus on applying clouds to industries (Rosenthal, et al., 2010) but without regard for the user's intention. The purpose of this research is to integrate TAM, TPB, IDT, and security risk to investigate factors influencing the adoption of cloud computing as integration. A professional market questionnaire investigation company in Taiwan collected the research data. Retrieved 1069 useful questionnaires were used as the data for the final analysis. 
The research findings reveal that the perceived ease of use, perceived usefulness, relative advantage, and compatibility influence attitudes toward the behavior of cloud computing. The security risk, compatibility, attitudes toward the behavior, subjective norm, and perceived behavioral control influence the behavioral intention of cloud computing. Finally, this research offers suggestions for future researchers.
第三語言摘要
論文目次
Chapter1. Introduction	1
1.1 Overview	1
1.2 Research Purpose	5
1.3 Research Process	7
Chapter2. Literature Review and Research Hypotheses	8
2.1 Cloud computing	8
2.2 Technology acceptance model (TAM)	10
2.3 Innovation diffusion theory (IDT), or diffusion of innovations (DOI)	11
2.4 The theory of planned behavior (TPB)	12
2.5 Security risk	14
2.6 Research hypotheses development	17
Chapter3. Research Methodology	25
3.1 Conceptual research framework	25
3.2 Questionnaire Design	26
3.3 Measurement	26
3.4 Data collection	27
3.5 Analysis method	28
Chapter4. Data Analysis and Results	29
4.1 Descriptive statistics analysis	29
4.2 Measurement accuracy analysis statistics	31
4.3 Hypotheses testing	37
Chapter5. Conclusion	40
5.1 Discussion	40
5.2 Implication	43
5.3 Limitations and future research	44
Reference	45
Appendix	56

LIST OF FIGURE
Figure 1.1 Research Process	7
Figure 3.1. Conceptual Framework	25
Figure 4.1 Hypotheses testing: structure equal model	38
 
LIST OF TABLE
Table 2.1 Definition of the variables	24
Table 3.1 Corresponding literature sources of the measure items	27
Table 4.1 Respondents’ Profiles	30
Table 4.2 Descriptive Statistics Analysis	31
Table 4.3 Measurement accuracy analysis statistic	34
Table 4.4 Correlation matrix of dimensions	36
Table 4.5 Threshold of △chi-square	36
Table 4.6 Structure Equal Model Estimates	39
Table 5.1 Research Results	41
參考文獻
Agarwal, R., & Prasad, J. (1999), Are individual differences germane to the acceptance of new information technologies. Decision Sciences, 30(2), 361-391.
Ajzen, I., & Fishbein, M. (1980), Understanding attitudes and predicting social behavior, Englewood-Cliffs, NJ: Prentice Hall.
Ajzen, I. (1985), From intentions to actions: a theory of planned behavior, in: J. Kuhl, J. Beckmann (Eds.), In Action Control: From cognition to Behavior, Springer Verlag, New York, 11-39.
Ajzen, I. (1991), The Theory of Planned Behavior. Organizational Behavior and Human Decision Processes, 50(2), 179-211.
Ajzen, I. (2002), Perceived behavioral control, self-efficacy, locus of control, and the theory of planned behavior. Journal of Applied Social Psychology, 32(4), 665-683.
Ba-Alawi, A.A. (2003), Marketing e-rail in Yemen, 2nd Arab Conference on the Marketing in the Arab World, the Opportunities and Challenges, Doha, 6-8 October, 2003,  324-336.
Babcock, C. (2010), Management Strategies for the Cloud Revolution. San Francisco: 
The McGraw-Hill Companies.
Bagozzi, R. P., & Yi, Y., et al, (1988), Assessing Construct Validity in Organizational Research. Administrative Science Quarterly, 36(3), 421-430.
Bestavros, A. (2000), Banking industry walks ‘tightrope’ in personalization of web services. Bank Syst Technol, 37(1), 54-56.
Bhattacherjee (2001a), An empirical analysis of the antecedents of electronic commerce service continuance. Decision Support Systems, 32(2), 201-214.
Bhattacherjee (2001b), Understanding information systems continuance. An expectation-confirmation model. MIS Quarterly, 25(3), 351-370.
Brodkin, J. (2008), Gartner: Seven cloud-computing security risks. Network World, July 02.
Browne, C. A., & Woolley, J. D. (2004), Preschoolers’ magical explanations for violations of physical, social, and mental laws. Journal of Cognition and Development, 5 (2), 239–260.
Buyya, R., Pandey, S., & Vecchiola, C. (2009), Cloudbus toolkit for market-oriented cloud computing. LNCS, 5931, 24-44.
Chiasson, M. W., & Lovato, C. L. (2001), Factors influencing the formation of a user’s perceptions and use of a DSS software innovation. The DATA BASE for Advances in Information Systems, 323, 16-35.
Cronbach, L. J. (1951), Coefficient alpha and the Internal Structure of Tests. Psychometrika, 16(3), 297-334.
Davis, F. D. (1986), A Technology Acceptance Model for Empirically Testing New End User Information Systems: Theory and Results. Unpublished Doctoral Dissertation. Massachusetts Institute of Technology.
Davis, F. D. (1989), Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology. MIS Quarterly, 13(3), 319-340.
DeFelice, A., & Leon, J. F. (2010), Cloud Computing. Journal of Accountancy New York, 210(4), 50-56.
Dika, S. (2003), The Effects of Self-Processes and Social Capital on the Educational Outcomes of High School Students, Virginia Polytechnic Institute and State University.
Eriksson, K., Kerem, K., & Nilsson, D. (2005), Customer acceptance of Internet banking in Estonia. International Journal of Bank Marketing, 23(2), 200-216.
Executive Yuan (2010), http://eyvisit.ey.gov.tw/ct.asp?xItem=70157&ctNode=146&mp=11
Fishbein, M., & Ajzen, I. (1975), Belief, Attitude, Intention and Behavior: An Introduction to Theory and Research. Addison-Wesley, Reading, MA.
Fornell, C. L., & Larcker, D. F. (1981), Evaluating structural equation models with unobservable variables and measurement error. Journal of Marketing Research, 18(1), 39-50.
Furnell, S. M., & Karweni, T. (1999), Security implications of electronic commerce: a survey of consumers and businesses. Internet Research, 9(5), 372-382.
Goldsmith, R. E., & Desborde, R. (1990), Further Validation of an Opinion Leadership Scale. Journal of Business Research, Forthcoming.
Gunderloy, M. (2009), Is your information under the mattress or in the ATM? Web Worker Daily, July 2008. (accessed March 17, 2009).
Hair, J. F. Jr., Anderson, R. E., Tatham, R. L., & Black, W. C. (1998). Multivariate Data Analysis. Upper Saddle River, NJ: Prentice Hall.
Hammond, S. (2008), Cloud computing: IT of the future or powderpuff? Enterprise Innovation, October-November, 33-34.
Hightower, J. E., Zehfuss, K. P., Fox, D. A., & Parauka, F. M. (2002), Summer habitat selection by Gulf sturgeon in the Choctawhatchee River, Florida. In: Proc. 4th Internat. Symp. on Sturgeon. H. Rosenthal (Ed.) J. Appl. Ichthyol. (current volume).
Hu, L., Ying, S., Jia, X., & Zhao, K. (2009), Towards an approach of semantic access control for cloud computing. LNCS, 5931, 145-156.
Hu, P. J., Chau, P. Y. K., Sheng, O. R. L., & Tam, K. Y. (1999) Examining the technology acceptance model using physician acceptance of telemedicine technology. Journal of Management Information Systems, 16(2), 91-112.
Hurt, H., Joseph, K., & Cook, C. (1997), Scales for the Measurement of Innovativeness. Human Communication Research, 4, 58-65.
Jacoby, J., & Kaplan, L. (1972), The Components of Perceived Risk, in Venkatesan, M.(Ed.). Proceedings of the 3rd Annual Conference, Association for Consumer Research, Champaign, IL,382-393
Jarvenpaa, S. L., Tractinsky, N., & Vitale, M. (2000), Consumer Trust in an Internet Store. Information Technology and Management, 1(1/2), 45-71.
Kalakota, R., & Whinston A. B. (1997), Electronic commerce: A Manager’s Guide. Reading, MA: Addison Wesley.
Kline, J. N., Waldschmidt, T. J., Businga, T. R., Lemish, J. E., Weinstock, J. V., Thorne, P. S., & Krieg, A. M. (1998), Cutting Edge: Modulation of Airway Inflammation by CpG Oligodeoxynucleotides in a Murine Model of Asthma. The American Association of Immunologists, 160, 255-259.
Kztzna, H., & Jr. (2010), On the privacy of cloud computing. International Journal of Management & Information Systems, 14(2), 1-12.
Lee, M. C. (2008), Factors influencing the adoption of internet banking: An integration of TAM and TPB with perceived risk and perceived benefit. Electronic Commerce Research and Applications, 8, 130-141.
Lee, M. C. (2009), Predicting and explaining the adoption of online trading: An empirical study in Taiwan. Decision Support Systems, 47,133–142.
Lee, M. C. (2009), Understanding the behavioural intention to play online games An extension of the theory of planned behaviour. Online Information Review, 33(5), 849-872.
Lee, M. C. (2010), Explaining and predicting users’ continuance intention toward e-learning: An extension of the expectation–confirmation model. Computers & Education, 54, 506–516.
Lee, S. M. & Chen, L. (2010), The Impact Of Flow On Online Consumer Behavior. The Journal of Computer Information Systems, 50(4), 1.
Legris, P., Ingham, J., & Collerette, P. (2003), Why do people use information technology? A critical review of the technology acceptance model. Information & Managements, 40(3), 191-204.
Liao, S. (1999), The adoption of virtual banking: an empirical study. International Journal of Information Management, 19(1), 63-74.
Liao, C., & Chen, J. L., et al (2007), Theory of planned behavior (TPB) and customer satisfaction in the continued use of e-service. An integrated model. Computers in Human Behavior, 23(6), 2804-2822.
Littler, D., & Melanthiou, D. (2006), Consumer perceptions of risk and uncertainty and the implications for behaviour towards innovative retail services: the case of internet banking. Journal Retailing Consum Serv, 13(6), 431-443.
MacCallurn, R. C., & Hong, S. (1997), Power analysis in covariance structure modeling using. Multivariate Behavioral Research, 32(2), 193-210.
Marston, S., Li, Z., Bandyopadhyay, S., Zhang, J., & Ghalsasi, A. (2011), Cloud computing – The business perspective. Decision Support Systems, 51(1), 176.
Mathieson, K., Peacock, E., & Chin, W. W. (2001), Extending the technology acceptance model: the influence of perceived user resources. Database for Advances in Information Systems, 32(3), 86-111.
McCarthy, J. (1960), Recursive functions of symbolic expressions and their computation by machine. Communications of the ACM, 3(4), 184-195.
Midgley, D. F., & Dowling, G. R. (1978), Innovativeness: The Concept and Its Measurement. Journal of Consumer Research, 4, 229-242.
Mirzaei, N. (2008), Cloud Computing. Indiana University.
Miller, M. (2009), Cloud Computing: Web-Based Applications That Change the Way Your Work and Collaborate Online. Indiana: Que Publishing.
Moore, G. C. (1991), Development of an instrument to measure the perceptions of adopting an information technology innovation. Information System Research, 2(3), 192-222.
Moore, G. C., & Benbasat, I. (1991), Development of an Instrument to Measure the Perceptions of Adopting an Information Technology Innovation. Information Systems Research 2(3), 192-222.
Moore, G. C., & Benbasat, I. (2001), Development of an Instrument to Measure the Perceptions of Adopting an Information Technology Innovation. Information Systems Research, 2(3), 192-222.
North, E. J., Mostert, P. G., & du Plessis, P. J. (2003), Cybershopping: concerns of the South African consumer. Journal of Family Ecology and Consumer Sciences, 31, 58-66.
NIST (2009), NIST definition of cloud computing v15, NIST, Editor. National Institute of Standards and Technology: Gaithersburg, MD.
Nunnally, J. C. (1978), Psychometric Theory, New York:McGraw-hill
Peter, J. P., & Tarpey, L. (1975), A comparative Analysis of Three Consumer Strategies. Journal of Consumer Research,12, 29-37.
Reavley, N. (2005), Securing online banking. Card Technology Today, 17(10), 12-3.
Rogers, E. M. (1983), Diffusion of Innovations. (3rd). The Free Press, New York.
Rogers, E. M. (1995), Diffusion of Innovations. (4th). Free Press, New York.
Rogers, E. M. (2003), Diffusion of innovations. (5th). New York: Free Press.
Rosenthal, A., Mork, P., Li, M. H., Stanford, J., Koester, D., & Reynolds, P. (2010), Cloud computing: A new business paradigm for biomedical information sharing.  Journal of Biomedical Informatics, 43, 342–353.
Scale, M. E. (2009), Cloud computing and collaboration. Library Hi Tech News, 9, 10-13.
Shacklett, M. (2010), Cloud Computing. WORLDTRADE 100, January.
Stone, R. N., & Gronhaug, K. (1993), Perceived Risk: Further Considerations for the Marketing Discipline. European Journal of Marketing, 27(3), 39.
Sultan, N. (2010), Cloud computing for education: A new dawn? International Journal of Information Management, 30(2), 109.
Taiwan’s Cloud Computing Consortium (2010), http://www.twcloud.org.tw
Taylor, S., & Todd, P. A. (1995a), Assessing IT Usage: The Role of Prior Experience, MIS Quarterly, 19(2), 561-570.
Taylor, S., & Todd, P. A. (1995b). Understanding Information Technology Usage: A Test of Competing Models. Information Systems Research, 6(4), 144-176.
Teng, F., & Magoulès, F. (2010), A new game theoretical resource allocation algorithm for cloud computing. LNCS, 6104, 321-330.
Tornatzky, L. G., & Klein, K. J. (1982), Innovation Characteristics and Innovation Adoption-Implementation: A Meta-Analysis of Findings. IEEE Transactions on Engineering Management, 29(1), 28-45.
Upson, S. (2011), Cloud Computing. IEEE Spectrum. New York, 48(1), 43.
Velte, A. T., Velte, T. J., & Elsenpeter, R. (2010), Cloud Computing: A Practical Approach. San Francisco: The McGraw-Hill Companies.
Venkatesh, V., & Morris, M. G. (2000), Why don't men ever stop to ask for directions? Gender, social influences, and their role in technology acceptance and usage behavior. MIS Quarterly, 24(1), 115-139.
Venkatesh,V., Morris, M. G., Davis, G. B.& Davis, F. D. (2003), User acceptance of information technology: Toward a unified view1. MIS Quarterly, 27(4), 425-478.
Venkatesh, V., & Davis, F. D. (1996), A model of the antecedents of perceived ease of use: development and test. Decision Sciences, 27, 451-481.
Vouk, M. A. (2008), Cloud computing-Issues, Research and Implementation. Journal of Computing and Information Technology, 16(4), 235-246.
Wu, X., & Wang, S. (2005), What drives mobile commerce? An empirical evaluation of the revised technology acceptance model. Information & Management, 42(5), 719-730.
論文全文使用權限
校內
校內紙本論文立即公開
同意電子論文全文授權校園內公開
校內電子論文立即公開
校外
同意授權
校外電子論文立即公開

如有問題,歡迎洽詢!
圖書館數位資訊組 (02)2621-5656 轉 2487 或 來信