§ 瀏覽學位論文書目資料
  
系統識別號 U0002-2707201511473300
DOI 10.6846/TKU.2015.00972
論文名稱(中文) 以整合性科技接受理論2、知覺風險及知覺信任觀點探討消費者使用Beacon應用程式之行為意圖
論文名稱(英文) Exploring Consumers' Intention to Adopt the Beacon App from the Perspective of UTAUT2, Perceived Risk and Perceived Trust
第三語言論文名稱
校院名稱 淡江大學
系所名稱(中文) 企業管理學系碩士班
系所名稱(英文) Department of Business Administration
外國學位學校名稱
外國學位學院名稱
外國學位研究所名稱
學年度 103
學期 2
出版年 104
研究生(中文) 陳加倫
研究生(英文) Chia-Lun Chen
學號 602611229
學位類別 碩士
語言別 繁體中文
第二語言別
口試日期 2015-05-28
論文頁數 75頁
口試委員 指導教授 - 王居卿
委員 - 高義芳
委員 - 張瑋倫
關鍵字(中) 知覺風險
知覺信任
虛實整合
整合性科技接受使用理論2
Beacon
關鍵字(英) Perceived Risk
Perceived Trust
O2O
UTAUT2
Beacon
第三語言關鍵字
學科別分類
中文摘要
電子商務已成為現今的主要經營模式模式,它亦可再細分為不同的商務模式,O2O即是一例。因智慧型裝置的普及使得O2O更為完善與即時,使消費者不同於過去只有單一通路的選擇,進而邁向虛實共存的通路環境。Beacon是虛實共存的關鍵因子,消費者使用Beacon可以進入虛實共存的通路環境,企業亦可藉由Beacon打造更人性化的O2O商務模式。國外許多企業已採用Beacon技術,使此消費模式在消費者間已相當普及,反觀因我國法規與市場等因素限制,而仍處於萌芽期。因此,探討消費者對使用Beacon行為意圖背後關鍵因素係相當重要,可幫助未來研究了解我國企業是否適合採用Beacon建立O2O商業模式。簡言之,本研究旨在探討消費者對使用Beacon行為意圖背後關鍵因素並彙整整合性科技接受理論2、知覺風險及知覺信任相關文獻以建立本研究模型,然後再進行實證研究。
    本研究乃是一個實證性研究,透過問卷調查法,以便利抽樣蒐集我國使用智慧型裝置之使用者之問卷,藉由預試結果修改問卷內容後,再針對回收168份正式問卷,採用多元迴歸進而分析。經實證研究結果發現:
1.  影響消費者使用Beacon應用程式的行為意圖之關鍵因素為「享樂動機」與「知覺信任」。
2. 「績效期望」、「預期努力」、「社會影響」、「知覺風險」並不是影響消費者使用Beacon應用程式的行為意圖之關鍵因素。
英文摘要
Currently E-commerce has already been a main business model which can be divided into different models, O2O is an example. Because of the popularization of smart devices, O2O becomes better and faster. Consumers can choose only one channel in past, but now they can choose the virtual and the physical channels in the same time. Beacon is the key factor. Customers enter the environment of the physical channel coexist with virtual channel by adopting Beacon. Companies create O2O business model by Beacon. Many foreign companies have adopted the consumption pattern of Beacon technology which is popular in foreign market. In Taiwan, it’s not universal to adopt the consumption pattern of Beacon technology because of the legislation, the market, and so on. It’s important that explore consumers' intention to adopt the Beacon App. The major objective of this study is to explore consumers' intention to adopt the Beacon App from the perspective of UTAUT2, perceived risk and perceived trust.
  This research used convenience sampling to collect the data from users who adopted smart devices, based on modified questionnaire from the pilot-run. There are 168 available questionnaires obtained from respondents. The multiple regression is utilized to analyze the data , the main result after testing the hypotheses are :
1.	Performance expectancy, effort expectancy, social influence are NOT the key factors  influencing consumers' intention to adopt the Beacon App. 
2.	Hedonic motivation and perceived trust are the key factors influencing consumers' intention to adopt the Beacon App.
第三語言摘要
論文目次
目錄
目錄	I
表次	III
圖次	V
第一章  緒論	1
第一節 研究背景與動機	1
第二節 研究目的	5
第二章  文獻探討	7
第一節  Beacon及藍芽(Bluetooth)技術沿革	7
第二節  科技使用意圖與行為相關理論	10
第三節  知覺風險理論回顧	20
第四節  知覺信任理論回顧	26
第三章  研究設計	28
第一節  研究架構	28
第二節  研究假說	29
第三節 變數定義與問卷設計	29
第四節  問卷調查對象及抽樣方式	37
第五節  資料分析方法與工具	37
第四章  資料分析	39
第一節 預試分析與發現	39
第二節  效度檢驗	42
第三節  信度分析	45
第四節  T檢定及單因子變異數分析	46
第五節  相關分析	51
第六節  多元迴歸分析	52
第七節  假說檢定結果	55

第五章  結論與建議	57
第一節  結論	57
第二節  管理意涵	60
第三節  研究限制	61
第四節  建議	61
參考文獻	64
一、中文文獻	64
二、英文文獻	65
附錄:問卷	72

表次
表2-1 「績效期望」構面	15
表2-2 「預期努力」構面	16
表2-3 「社會影響」構面	17
表2-4 「促進條件」構面	17
表2-5 相關知覺風險定義	22
表2-6 學者提出實體通路知覺風險因素之統整	23
表2-7 學者提出虛擬通路知覺風險因素之統整	24
表3-1 本研究假說	29
表3-2 績效期望(PE)之衡量問項	30
表3-3 預期努力(EE)之衡量問項	30
表3-4 社會影響(SI)之衡量問項	31
表3-5 促進條件(FC)之衡量問項	32
表3-6 享樂動機(HM)之衡量問項	32
表3-7 知覺風險(PR)之衡量問項	34
表3-8 知覺信任(PT)之衡量問項	36
表3-9 行為意圖(BI)之衡量問項	36
表4-1 預試因素分析適合度檢定結果 ( KMO and Bartlett's Test )	40
表4-2 刪除題項後的因素分析表	40
表4-3 刪除問項後的信度分析表	41
表4-4 修改後假說	42
表4-5 各題項描述性統計量	43
表4-6 因素分析適合度檢定結果 ( KMO and Bartlett's Test )	44
表4-7 因素分析結果	44
表4-8 信度分析結果	46
表4-9 樣本特徵統計表	46
表4-10「對Beacon那些功能有興趣」次數分配表	48
表4-11  Beacon功能與性別交叉分析表	48
表4-12  Beacon功能與知識交叉分析表	50
表4-13 相關分析結果	51
表4-14 迴歸分析摘要表	53
表4-15 假說檢定結果	56

圖次
圖2-1 Beacon應用流程圖	9
圖2-2 Venkatesh之使用者接受資訊科技模型架構	12
圖2-3 整合性科技接受模式發展來源	13
圖2-4 整合性科技接受模式	15
圖2-5  UTAUT2架構	19
圖3-1 本研究架構	28
圖4-1 本研究待驗證模型	52
圖4-2 模式驗證結果	55
參考文獻
參考文獻
一、中文文獻
台灣網路資訊中心[TWNIC](2014)。2014年台灣寬頻網路使用調查.
何英煒(2013)。電子商務 2015登兆元產業。擷取自 中時電子報: http://www.chinatimes.com/newspapers/20131121000112-260204
李苔寧(2010)。風險及利益知覺對信任與因應行為之影響-以鹿與羊隻農民飼養戶為例。臺北大學合作經濟學系碩士論文。 
李開復CEO創新工場(2010)。創新工場 CEO 李開復個人微博。擷取自 創新工場 CEO 李開復個人微博。
林俊成。(2013)。探討使用手機信用卡的傾向-以科技接受行為理論及感知風險觀點。臺北大學企業管理學系碩士論文。
林俊佑。(2009) 。線上滿意與線上信任的前因與後果之實證研究-以線上服飾購物為例。中興大學行銷學系所碩士論文。
林榮春、邱天佑 與 林茂雄。 (2011)。 影響網路銀行實際使用行爲之研究。顧客滿意學刊,7(1),1-22。
林慧姍(2009)。女性網路使用者的網路購物知覺風險與降低風險策略之研究-以化妝、保養品為例。國立中正大學電訊傳播研究所碩士論文。
金芷安(2011)。相互干擾下之藍牙與無線區域網路共同偵測器之設計。臺灣大學電子工程學研究所碩士論文。
翁承民(2012)。網路團購消費者知覺風險、從眾行為與購買意願影響之研究。亞洲大學數位媒體設計學系碩士論文。
康明璋(2010)。探討知覺價值與知覺風險之前因因子及其線上購物滿意度之影響-以線上購物產業為例。國立屏東科技大學企業管理系碩士論文。
戴維舵(1999)。資訊使用者觀點之績效評估模式之研究。國立台灣科技大學工程技術研究所碩士論文。
歐力誠(2014)。知覺風險與網路購物意願之相關性研究。義守大學資訊管理學系碩士論文。
謝佳容、王子華與沈怡秀。(2009)。以科技接受模式理論探討國民小學教師使用互動式電子白板之接受度調查研究。Information Technology,13(3),319-339。
二、英文文獻
Ajzen, I. (1985). From intentions to actions: a theory of planned behavior, In J. Kuhl & J.Beckmann (Eds.), Action-Control: From Cognition to Behavior, Heidelberg: Springer,11-39. 
Ajzen, I. (1989). Attitude structure and behavior. Attitude Structure and Function, 241-274.
Ajzen, I. (1991). The theory of planned behavior. Organizational Behavior and Human Decision Processes, 50(2), 179-211.
Assael, H. (1984). Consumer Behavior and Marketing Action, Boston MA: Kent Publishing.
Baird, I. S., & Thomas, H. (1985). Toward a contingency model of strategic risk taking. Academy of Management Review, 10(2), 230-243.
Bandura, A. (1986). Social Foundations of Thought and Action, NJ: Prentice Hall, 5-107.
Bauer, R. A. (1960). Consumer behavior as risk taking. In Risk Taking and Information Handling in Consumer Behavior, Cambridge: Harvard University Press, 389-398.
Beldad, A., De Jong, M., & Steehouder, M. (2010). How shall I trust the faceless and the intangible? A literature review on the antecedents of online trust. Computers in Human Behavior, 26(5), 857-869.
Bettman, J. R. (1973). Perceived risk and its components: a model and empirical test. Journal of Marketing Research, 6, 184-190.
Brown, S. A., & Venkatesh, V. (2005). Model of adoption of technology in households: A baseline model test and extension incorporating household life cycle. MIS Quarterly, 399-426.
Chellappa, R. K. (2008). Consumers’ trust in electronic commerce transactions: The role of perceived privacy and perceived security. Goizueta Business School, Emory University Atlanta, GA.
Chen, Y. H., & Barnes, S. (2007). Initial trust and online buyer behaviour. Industrial Management & Data Systems, 107(1), 21-36.
Compeau, D. R., & Higgins, C. A. (1995). Application of social cognitive theory to training for computer skills. Information Systems Research, 6(2), 118-143.
Compeau, D. R., & Higgins, C. A. (1995). Computer self-efficacy: Development of a measure and initial test. MIS Quarterly, 189-211.
Compeau, D., Higgins, C. A., & Huff, S. (1999). Social cognitive theory and individual reactions to computing technology: A longitudinal study. MIS Quarterly, 23(2), 145-158.
Cox, D. F. (1967). Risk handling in consumer behavior–an intensive study of two cases. in Cox ed.,” Risk Taking and Information Handling in Consumer Behavior, Boston: Harvard University Press, 34-81.
Cox, D. F., & Rich, S. U. (1964). Perceived risk and consumer decision-making: The case of telephone shopping. Journal of Marketing Research, 1, 32-39.
Cunningham, S. M. (1967). The major dimensions of perceived risk. Risk Taking and Information Handling in Consumer Behavior, 82-108.
Davis, F. D. (1985). A technology acceptance model for empirically testing new end-user information systems: Theory and results (Doctoral dissertation, Massachusetts Institute of Technology).
Davis, F. D. (1989). Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS Quarterly, 13(3), 319-340.
Davis, F. D., Bagozzi, R. P., & Warshaw, P. R. (1992). Extrinsic and intrinsic motivation to use computers in the workplace. Journal of Applied Social Psychology, 22(14), 1111-1132.
Delone, W. H. (2003). The DeLone and McLean model of information systems success: a ten-year update. Journal of Management Information Systems, 19(4), 9-30.
DeLone, W. H., & McLean, E. R. (1992). Information systems success: the quest for the dependent variable. Information Systems Research, 3(1), 60-95..
DeLone, W. H., & McLean, E. R. (2004). Measuring e-commerce success: Applying the DeLone & McLean information systems success model. International Journal of Electronic Commerce, 9(1), 31-47.
Dowling, G. R., & Staelin, R. (1994). A model of perceived risk and intended risk-handling activity. Journal of Consumer Research, 21(1), 119-134.
Edelman, D. C. (2010). Branding in the digital age. Harvard Business Teview, 88(12), 62-69.
Featherman, M. S., & Pavlou, P. A. (2003). Predicting e-services adoption: a perceived risk facets perspective. International Journal of Human-Computer Studies, 59(4), 451-474.
Fishbein, M., & Ajzen, I. (1975). Belief, Attitude, Intention and Behavior: An Introduction to Theory and Research, MA: Addison-Wesley..
Forsythe, S. M., & Shi, B. (2003). Consumer patronage and risk perceptions in Internet shopping. Journal of Business Research, 56(11), 867-875.
Gefen, D., & Straub, D. W. (1997). Gender differences in the perception and use of e-mail: An extension to the technology acceptance model. MIS Quarterly, 21(4), 389-400.
Gefen, D., & Straub, D. W. (2003). Managing user trust in B2C e-services. E-service Journal, 2(2), 7-24.
Grewal, R., & Dharwadkar, R. (2002). The role of the institutional environment in marketing channels. Journal of Marketing, 66(3), 82-97.
Harrison McKnight, D., Choudhury, V., & Kacmar, C. (2002). The impact of initial consumer trust on intentions to transact with a web site: a trust building model. The Journal of Strategic Information Systems, 11(3), 297-323.
Im, I., Hong, S., & Kang, M. S. (2011). An international comparison of technology adoption: Testing the UTAUT model. Information & Management, 48(1), 1-8.
Jarvenpaa, S. L., & Todd, P. A. (1996). Consumer reactions to electronic shopping on the World Wide Web. International Journal of Electronic Commerce, 1(2), 59-88.
Jarvenpaa, S. L., Tractinsky, N., & Vitale, M. (2000). Consumer trust in an Internet store. Information Technology and Management, 1(1-2), 45-71.
Luo, X., Li, H., Zhang, J., & Shim, J. P. (2010). Examining multi-dimensional trust and multi-faceted risk in initial acceptance of emerging technologies: An empirical study of mobile banking services. Decision Support Systems, 49(2), 222-234.
Miyazaki, A. D., & Fernandez, A. (2001). Consumer perceptions of privacy and security risks for online shopping. Journal of Consumer Affairs, 35(1), 27-44.
Moore, G. C., & Benbasat, I. (1991). Development of an instrument to measure the perceptions of adopting an information technology innovation. Information Systems Research, 2(3), 192-222.
Moorman, C., Deshpande, R., & Zaltman, G. (1993). Factors affecting trust in market research relationships. The Journal of Marketing, 57(1), 81-101.
Morgan, R. M., & Hunt, S. D. (1994). The commitment-trust theory of relationship marketing. the Journal of Marketing, 20-38.
Pavlou, P. A. (2003). Consumer acceptance of electronic commerce: integrating trust and risk with the technology acceptance model. International Journal of Electronic Commerce, 7(3), 101-134.
Pires, G., Stanton, J., & Eckford, A. (2004). Influences on the perceived risk of purchasing online. Journal of Consumer Behaviour, 4(2), 118-131.
Rogers, E. M. (1983). Diffusion of Innovations, The Free Press of Glencoe, New York.
Rogers, E. M. (2010). Diffusion of Innovations. Simon and Schuster.NY: The Free Press of Glencoe.
Rogers, E. M., & Cartano, D. G. (1962). Living Research Methods of Measuring Opinion Leadership. Public Opinion Quarterly, 26(3), 435-441.
Rogers, E. M., & Shoemaker, F. F. (1971). Communication of Innovations; A Cross-Cultural Approach. NY: The Free Press of Glencoe.
Rose, G., & Straub, D. (1998). Predicting general IT use: Applying TAM to the Arabic world. Journal of Global Information Management (JGIM), 6(3), 39-46..
Roselius, T. (1971). Consumer rankings of risk reduction methods. The Journal of Marketing, 56-61.
Salo, J., & Karjaluoto, H. (2007). A conceptual model of trust in the online environment. Online Information Review, 31(5), 604-621.
Schoenbachler, D. D., & Gordon, G. L. (2002). Multi-channel shopping: understanding what drives channel choice. Journal of Consumer Marketing, 19(1), 42-53.
Son, J. Y., & Kim, S. S. (2008). Internet users' information privacy-protective responses: a taxonomy and a nomological model. MIS Quarterly, 503-529.
Stone, R. N., & Grnhaug, K. (1993). Perceived risk: further considerations for the marketing discipline. European Journal of Marketing, 27(3), 39-50.
Szajna, B. (1994). Software evaluation and choice: Predictive validation of the technology acceptance instrument. MIS Quarterly, 18(3), 319-324.
Tang, F. F., & Xing, X. (2001). Will the growth of multi-channel retailing diminish the pricing efficiency of the web?. Journal of Retailing, 77(3), 319-333.
Taylor, S., & Todd, P. (1995). Assessing IT usage: The role of prior experience. MIS Quarterly, 19(4), 561-570. 
Thompson, R. L., Higgins, C. A., & Howell, J. M. (1991). Personal computing: toward a conceptual model of utilization. MIS Quarterly, 15(1), 125-143. 
Triandis, H. C. (1979). Values, attitudes, and interpersonal behavior. In Nebraska symposium on motivation. University of Nebraska Press, Lincoln, NE, 195-260.
Van der Heijden, H. (2004). User acceptance of hedonic information systems. MIS Quarterly, 28(4), 695-704.
van Slyke, C., Lou, H., Belanger, F., & Sridhar, V. (2010). The influence of culture on consumer-oriented electronic commerce adoption. Journal of Electronic Commerce Research, 11(1).
 Venkatesh, V., & Davis, F. D. (2000). A theoretical extension of the technology acceptance model: four longitudinal field studies. Management Science, 46(2), 186-204.
Venkatesh, V., & Davis, F. D. (2000). A theoretical extension of the technology acceptance model: four longitudinal field studies. Management Science, 46(2), 186-204.
Venkatesh, V., Morris, M. G., Davis, G. B., & Davis, F. D. (2003). User acceptance of information technology: toward a unified view. MIS Quarterly, 27(3), 425-478. 
Viega, J., Kohno, T., & Potter, B. (2001). Trust (and mistrust) in secure applications. Communications of the ACM, 44(2), 31-36.
Vijayasarathy, L. R. (2004). Predicting consumer intentions to use on-line shopping: the case for an augmented technology acceptance model. Information & Management, 41(6), 747-762.
Wei, T. T., Marthandan, G., Chong, A. Y. L., Ooi, K. B., & Arumugam, S. (2009). What drives Malaysian m-commerce adoption? An empirical analysis. Industrial Management & Data Systems, 109(3), 370-388.
Wixom, B. H., & Todd, P. A. (2005). A theoretical integration of user satisfaction and technology acceptance. Information Systems Research, 16(1), 85-102.
Yousafzai, S., Pallister, J., & Foxall, G. (2009). Multi-dimensional role of trust in Internet banking adoption. The Service Industries Journal, 29(5), 591-605.
Zhou, T. (2012). Examining location-based services usage from the perspectives of unified theory of acceptance and use of technology and privacy risk. Journal of Electronic Commerce Research, 13(2), 135-144.
論文全文使用權限
校內
校內紙本論文立即公開
同意電子論文全文授權校園內公開
校內電子論文立即公開
校外
同意授權
校外電子論文立即公開

如有問題,歡迎洽詢!
圖書館數位資訊組 (02)2621-5656 轉 2487 或 來信