簡易檢索 / 詳目顯示

研究生: 姜智耀
Chiang, Chih-yao
論文名稱: 基於信賴與利益的感受策略性架構下探索無線射頻識別證系統設計模式之研究
Exploring a Design Model of the RFID-enabled Badge Information System Based on the Strategic Framework of Perceived Trust and Benefits
指導教授: 李再長
Lee, Tzai-zang
學位類別: 碩士
Master
系所名稱: 管理學院 - 資訊管理研究所
Institute of Information Management
論文出版年: 2008
畢業學年度: 96
語文別: 英文
論文頁數: 68
中文關鍵詞: 信賴科技接受模式無線電射頻識別
外文關鍵詞: Radio frequency identification, Technology acceptance model, Trust
相關次數: 點閱:94下載:4
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • 無線電射頻識別技術 (RFID) 已被視為二十一世紀最具有貢獻的十大科技之一且預期其產值不斷的升高。然而,有些許因素阻礙了它的發展,例如:隱私權的議題。此外,對於讓使用者接受此新科技,一個明確、可預期的合法與政策性的模式是必要的。
    基於在一個適當的設計模式下發展無線電射頻識別證系統,本研究採用信賴與利益的感受策略性架構的構面來設計用於關鍵決策方法中進行一系列半結構式訪談的訪談大綱。在仿傚關鍵決策方法的步驟與途徑下,本研究取得了十五個訪談個案做為分析訪談稿的研究資料。此外,信賴感的建立與對於隱私權的保證會在這些訪談的過程中被傳遞。
    為了展開進行訪談稿的分析,本研究把字、詞、句子或段落編譯成代碼。經由一連串的方法,可以合理地決定出這些代碼、合併與檢驗成為制定無線電射頻識別證系統決策時的設計模式。在這個設計模式中,設計決策的制定會發生在從代碼頻率結果找出的四個主要語幹構面中,並且隨著進入模式的思考組織方式與機制所成為的架構模式而有所不同。而為了驗證此設計模式,作者檢驗了架構、內部及外部的效度來確保本研究的完整性。
    如此一來,本設計模式提供了一綜觀性與系統化的途徑來設計無線電射頻識別證系統。而本模式的優勢在於其可以彈性地接近設計問題。再者,為了改善此系統的發展,系統設計者應該著重於獲取主管的支持、結合系統與不同的工作型態與環境、在使用者與公司的認同下制定設計決策和注意既有的公司文化。

    Radio frequency identification (RFID) has been identified as one of the ten greatest contributory technologies with expected soaring sales in the 21st century. However, several factors, such as privacy issue, are holding back its take-up. Not least, a clear, predictable, legal and politic model is needed to make this new technology acceptable to users.
    Based on the need to develop the RFID-enabled badge information system under a proper design model, this study employed the dimensions of strategic framework of perceived trust and benefits to design interview agenda used by critical decision method (CDM) to conduct a series of semi-structured interviews. By following the procedures and methods of the CDM, this study collected 15 interview cases as research data to analyze transcripts. In addition, the trust building and the privacy guaranteeing were accomplished during these interviews.
    In order to set off analyzing each transcript, this study placed words, phrases, sentences and/or paragraphs into codes. Through a sequence of approaches, the codes were reasonably determined, combined, and examined into a model of RFID-enabled badge information system design for making decisions. In the design model, a system design decision is made within dimensions of four themes found in the facets of the frequencies of codes and along the structuring flow as a result of incoming structuring perspectives and mechanisms. For verifying the design model, author examined the construct, internal and external validity to assure the research integrity.
    As a result, the design model provides a systemic and systematic method to design a RFID-enabled badge information system. The strength of the model relies on the flexibility of accessing design problems. Furthermore, in order to improve the development of the system, designers should focus on gaining managers’ supports, binding system with varied work styles and environment, making design decisions under the agreement from users and company, and paying attentions to the existing company culture.

    摘要 II Abstract III Table of Contents V List of Tables VIII List of Figures IX Chapter 1: Introduction 1 1.1 Research Background and Motivation 2 1.2 Research Objectives 4 1.3 Research Procedure 4 1.4 Thesis Overview 6 Chapter 2: Literature Review 7 2.1 Introduction to RFID Technology 7 2.1.1 Advantages of RFID Technology 9 2.1.2 Growth in Usage 9 2.2 RFID System Issues 10 2.2.1 Technical Issues 10 2.2.2 Behavioral Issues 10 2.2.3 Cultural Issues 11 2.2.4 Security Issues 11 2.2.5 Data Management Issues 11 2.3 Privacy 11 2.4 RFID and Privacy Issues 12 2.5 Risk Perception, Trust and Technology Acceptance 13 2.6 Performance Appraisal 15 2.7 Measuring software design 15 2.8 Summaries 17 Chapter 3: Methodology 18 3.1 Methodology Overview 19 3.2 Data Collection 20 3.2.1 Critical Decision Method 20 3.2.2 Case Company 21 3.2.3 Sampling Policy 22 3.2.4 Interview Process 24 3.3 Data Analysis 26 3.3.1 Coding 26 3.3.2 Finding Relationship 27 3.3.3 Decision Making 27 3.3.4 Building Explanations 28 3.4 Research Process 29 Chapter 4: Results 31 4.1 Description of Interviewees 33 4.2 Frequencies of Codes 34 4.3 Emergent Themes 36 4.3.1 <PU> 36 4.3.2 <Safety> 38 4.3.3 <Privacy> 38 4.3.4 <Law> 39 4.4 Mapping Answers 40 4.5 Case Study Summaries 43 4.5.1 NDM, ID #7 46 4.5.2 RDM, ID #15 48 4.6 Cross Case Comparison 50 4.6.1 Problem Structuring 51 4.7 Design Decision Model 52 4.7.1 Structuring Dimensions 55 4.7.2 Structuring Flow 55 4.7.3 Structuring Perspectives 56 4.7.4 Structuring Mechanisms 56 4.7.5 Summaries of Design Decision Model 57 4.8 Validity 58 4.8.1 Construct Validity 58 4.8.2 Internal Validity 58 4.8.3 External Validity 59 4.8.4 Threats to Validity 59 Chapter 5: Conclusions 60 5.1 Conclusions 60 5.2 Managerial Insights 61 References 62 Appendix 67

    Babbie, E. R. (2006). Practice of social research (11th ed.). Belmont, CA: Wadsworth Publishing Company.
    Balkovich, E., Bikson, T. K., & Bitko, G. (2005). 9 to 5: Do you know if your boss knows where you are? Santa Monica, CA: RAND.
    Briand, L. C., Bunse, C., & Daly, J. W. (2001). A Controlled Experiment for Evaluating Quality Guidelines on the Maintainability of Object-Oriented Designs. IEEE Transactions on Software Engineering , 27 (6), pp. 513-530.
    Briand, L. C., Morasca, S., & Basili, V. R. (1996). Property-Based Software Engineering Measurement. IEEE Transactions on Software Engineering , 22 (1), pp. 68-86.
    Brown, I., & Russell, J. (2007). Radio frequency identification technology: An exploratory study on adoption in the South African retail sector. International Journal of Information Management , 27 (4), pp. 250-265.
    Cavoukian, A. (2004). Tag, you're it: Privacy implications of radio frequency identification (RFID) technology. Retrieved 10 2, 2007, from Scholars Portal: https://ozone.scholarsportal.info/bitstream/1873/6228/1/10318697.pdf
    Commission of the European Communties. (2007). Towards an RFID Policy for Europe. Retrieved 10 19, 2007, from European Commission: http://ec.europa.eu/information_society/policy/rfid/doc/rfid_en.pdf
    Courtney, P., Lacey, C., & Nash, R. (2005). Privacy in the Digital Networked Economy. London: British Telecom.
    Crandall, B., Klein, G., & Hoffman, R. R. (2006). Working Minds: A Practitioner's Guide to Cognitive Task Analysis. Cambridge, MA: MIT Press.
    DeMarco, T., & Lister, T. (1999). Peopleware: Productive Projects and Teams (2nd ed.). New York, NY: Dorset House Publishing Company, Incorporated.
    Dromey, R. G. (1995). A Model for Software Product Quality. IEEE Transactions on Software Engineering , 21 (2), pp. 146-162.
    Fenton, N. E., & Pfleeger, S. L. (1998). Software Metrics: A Rigorous and Practical Approach. Boston, MA: PWS Publishing Company.
    Fowler, M. (2001). Avoiding repetition. IEEE Software , 18 (1), pp. 97-99.
    Gamma, E., Helm, R., Johnson, R., & Vlissides, J. M. (1994). Design Patterns: Elements of Reusable Object – Oriented Software. Boston, MA: Addison-Wesley Professional.
    Guidelines on EPC for Consumer Products. (2005, 9). Retrieved 10 20, 2007, from EPCglobal: http://www.epcglobalinc.org/public/ppsc_guide/
    Hutchins, S. G., Pirolli, P. L., & Card, S. K. (2004). A new perspective on use of the critical decision method with intelligence analysts. Proceedings of the 2004 Command and Control Research and Technology Symposium. San Diego.
    Jones, K. E. (2001). Risk and the communication of uncertainty: A review of lord Phillips' report from the BSE Inquiry (UK). Canadian Journal of Sociology , 26 (4), pp. 655-666.
    Juels, A. (2006). RFID privacy: a technical primer for the non-technical reader. New York: Springer.
    Kitchenham, B., Pfleeger, S. L., & Fenton, N. (1995). Towards a framework for software measurement validation. IEEE Transactions on Software Engineering , 21 (12), pp. 929-944.
    Klein, G. A. (1999). Sources of Power: How People Make Decisions. Cambridge, MA: The MIT Press.
    Klein, G. A., Calderwood, R., & MacGregor, D. (1989). Critical decision method for eliciting knowledge. IEEE Transactions on Systems, Man and Cybernetics , 19 (3), pp. 462-472.
    Knight, W. (2006). RFID – another technology, another security mess? Infosecurity Today , 3 (3), pp. 35-37.
    Kondracki, N. L., Wellman, N. S., & Amundson, D. R. (2002). Content Analysis: Review of Methods and Their Applications in Nutrition Education. Journal of Nutrition Education and BehaviorVolume , 34 (4), pp. 224-230.
    Krippendorff, K. (2003). Content Analysis: An Introduction to Its Methodology. Thousand Oaks, CA: Sage Publications, Inc.
    Kurtzberg, T. R., Naquin, C. E., & Belkin, L. Y. (2005). Electronic performance appraisals: The eVects of e-mail communication on peer ratings in actual and simulated environments. Organizational Behavior and Human Decision Processes , 98 (2), pp. 216-226.
    Landy, J. F., & Farr, L. J. (1980). Performance rating. Psychological Bulletin , 87 (1), pp. 72-107.
    Lincoln, Y. S., & Guba, E. G. (1985). Naturalistic inquiry. London: Sage.
    Lipshitz, R. (1993). Decision making as argument driven action. In G. A. Klein, J. Orasanu, R. Calderwood, & C. E. Szambok, Decision making in action (pp. 172-181). Norton, NJ: Ablex.
    Lui, H. K., & Jamieson, R. (2003). Integrating trust and risk perceptions in business-to-consumer electronic commerce with the technology acceptance model. Proceedings of the 11th European Conference on Information Systems. Naples, Italy.
    Mathi, K. (2004, 4). Key Success Factors For Knowledge Management. Retrieved 11 15, 2007, from http://www.dmreview.com/whitepaper
    McKnight, D. H., & Chervany, N. L. (2002). What trust means in electronic commerce customer relationships: An interdisciplinary conceptual typology. International Journal of Electronic Commerce , 6 (2), pp. 35-59.
    Militello, L., & Lim, L. (1995). Patient assessment skills: assessing early cues of necrotizing enterocolitis. The Journal of Perinatal and Neonatal Nursing , 9 (2), pp. 42-52.
    Mitrou, L., & Karyda, M. (2006). Employees' privacy vs. employers' security: Can they be balanced? Telematics and Informatics , 23 (3), pp. 164-178.
    Ngai, E., Cheng, T., Au, S., & Lai, K.-h. (2007). Mobile commerce integrated with RFID technology in a container depot. Decision Support Systems (43), pp. 62-76.
    Patton, M. Q. (2002). Qualitative research & evaluation methods (3rd ed.). Thousand Oaks, CA: Sage Publications.
    Roberts, C. (2006). Radio frequency identification. Computers & Security , 25 (1), pp. 18-26.
    Rugaber, S., Ornburn, S. B., & LeBlanc, R. J. (1990). Recognizing design decisions in programs. IEEE Software , 7 (1), 46-54.
    Slovic, P., Flynn, J. H., & Layman, M. (1991). Perceived risk, trust, and the politics of nuclear waste. Science, New Series , 254 (5038), pp. 1603-1607.
    Thiesse, F. (2007). RFID, privacy and the perception of risk: A strategic framework. The Journal of Strategic Information Systems , 16 (2), pp. 214-232.
    Venkatesh, V. (2000). Determinants of perceieved ease of use: integrating control, intrinsic motivation, and emotion into the technology acceptance model. Information Systems Research , 11 (4), pp. 342-365.
    Wu, I.-L., & Chen, J.-L. (2005). An extension of Trust and TAM model with TPB in the initial adoption of on-line tax: An empirical study. International Journal of Human-Computer Studies , 62 (6), pp. 784-808.
    Wu, N., Nystrom, M., Lin, T., & Yu, H. (2006). Challenges to global RFID adoption. Technovation , 26, pp. 1317-1323.
    Yin, R. K. (2002). Case Study Research: Design & Methods (3rd ed.). Thousand Oaks, CA: Sage Publications, Inc.
    Zannier, C., Chiasson, M., & Maurer, F. (2007). A model of design decision making based on empirical results of interviews with software designers. Information and Software Technology , 49 (6), pp. 637-653.

    下載圖示 校內:2009-06-20公開
    校外:2009-06-20公開
    QR CODE