| 研究生: |
姜智耀 Chiang, Chih-yao |
|---|---|
| 論文名稱: |
基於信賴與利益的感受策略性架構下探索無線射頻識別證系統設計模式之研究 Exploring a Design Model of the RFID-enabled Badge Information System Based on the Strategic Framework of Perceived Trust and Benefits |
| 指導教授: |
李再長
Lee, Tzai-zang |
| 學位類別: |
碩士 Master |
| 系所名稱: |
管理學院 - 資訊管理研究所 Institute of Information Management |
| 論文出版年: | 2008 |
| 畢業學年度: | 96 |
| 語文別: | 英文 |
| 論文頁數: | 68 |
| 中文關鍵詞: | 信賴 、科技接受模式 、無線電射頻識別 |
| 外文關鍵詞: | Radio frequency identification, Technology acceptance model, Trust |
| 相關次數: | 點閱:94 下載:4 |
| 分享至: |
| 查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報 |
無線電射頻識別技術 (RFID) 已被視為二十一世紀最具有貢獻的十大科技之一且預期其產值不斷的升高。然而,有些許因素阻礙了它的發展,例如:隱私權的議題。此外,對於讓使用者接受此新科技,一個明確、可預期的合法與政策性的模式是必要的。
基於在一個適當的設計模式下發展無線電射頻識別證系統,本研究採用信賴與利益的感受策略性架構的構面來設計用於關鍵決策方法中進行一系列半結構式訪談的訪談大綱。在仿傚關鍵決策方法的步驟與途徑下,本研究取得了十五個訪談個案做為分析訪談稿的研究資料。此外,信賴感的建立與對於隱私權的保證會在這些訪談的過程中被傳遞。
為了展開進行訪談稿的分析,本研究把字、詞、句子或段落編譯成代碼。經由一連串的方法,可以合理地決定出這些代碼、合併與檢驗成為制定無線電射頻識別證系統決策時的設計模式。在這個設計模式中,設計決策的制定會發生在從代碼頻率結果找出的四個主要語幹構面中,並且隨著進入模式的思考組織方式與機制所成為的架構模式而有所不同。而為了驗證此設計模式,作者檢驗了架構、內部及外部的效度來確保本研究的完整性。
如此一來,本設計模式提供了一綜觀性與系統化的途徑來設計無線電射頻識別證系統。而本模式的優勢在於其可以彈性地接近設計問題。再者,為了改善此系統的發展,系統設計者應該著重於獲取主管的支持、結合系統與不同的工作型態與環境、在使用者與公司的認同下制定設計決策和注意既有的公司文化。
Radio frequency identification (RFID) has been identified as one of the ten greatest contributory technologies with expected soaring sales in the 21st century. However, several factors, such as privacy issue, are holding back its take-up. Not least, a clear, predictable, legal and politic model is needed to make this new technology acceptable to users.
Based on the need to develop the RFID-enabled badge information system under a proper design model, this study employed the dimensions of strategic framework of perceived trust and benefits to design interview agenda used by critical decision method (CDM) to conduct a series of semi-structured interviews. By following the procedures and methods of the CDM, this study collected 15 interview cases as research data to analyze transcripts. In addition, the trust building and the privacy guaranteeing were accomplished during these interviews.
In order to set off analyzing each transcript, this study placed words, phrases, sentences and/or paragraphs into codes. Through a sequence of approaches, the codes were reasonably determined, combined, and examined into a model of RFID-enabled badge information system design for making decisions. In the design model, a system design decision is made within dimensions of four themes found in the facets of the frequencies of codes and along the structuring flow as a result of incoming structuring perspectives and mechanisms. For verifying the design model, author examined the construct, internal and external validity to assure the research integrity.
As a result, the design model provides a systemic and systematic method to design a RFID-enabled badge information system. The strength of the model relies on the flexibility of accessing design problems. Furthermore, in order to improve the development of the system, designers should focus on gaining managers’ supports, binding system with varied work styles and environment, making design decisions under the agreement from users and company, and paying attentions to the existing company culture.
Babbie, E. R. (2006). Practice of social research (11th ed.). Belmont, CA: Wadsworth Publishing Company.
Balkovich, E., Bikson, T. K., & Bitko, G. (2005). 9 to 5: Do you know if your boss knows where you are? Santa Monica, CA: RAND.
Briand, L. C., Bunse, C., & Daly, J. W. (2001). A Controlled Experiment for Evaluating Quality Guidelines on the Maintainability of Object-Oriented Designs. IEEE Transactions on Software Engineering , 27 (6), pp. 513-530.
Briand, L. C., Morasca, S., & Basili, V. R. (1996). Property-Based Software Engineering Measurement. IEEE Transactions on Software Engineering , 22 (1), pp. 68-86.
Brown, I., & Russell, J. (2007). Radio frequency identification technology: An exploratory study on adoption in the South African retail sector. International Journal of Information Management , 27 (4), pp. 250-265.
Cavoukian, A. (2004). Tag, you're it: Privacy implications of radio frequency identification (RFID) technology. Retrieved 10 2, 2007, from Scholars Portal: https://ozone.scholarsportal.info/bitstream/1873/6228/1/10318697.pdf
Commission of the European Communties. (2007). Towards an RFID Policy for Europe. Retrieved 10 19, 2007, from European Commission: http://ec.europa.eu/information_society/policy/rfid/doc/rfid_en.pdf
Courtney, P., Lacey, C., & Nash, R. (2005). Privacy in the Digital Networked Economy. London: British Telecom.
Crandall, B., Klein, G., & Hoffman, R. R. (2006). Working Minds: A Practitioner's Guide to Cognitive Task Analysis. Cambridge, MA: MIT Press.
DeMarco, T., & Lister, T. (1999). Peopleware: Productive Projects and Teams (2nd ed.). New York, NY: Dorset House Publishing Company, Incorporated.
Dromey, R. G. (1995). A Model for Software Product Quality. IEEE Transactions on Software Engineering , 21 (2), pp. 146-162.
Fenton, N. E., & Pfleeger, S. L. (1998). Software Metrics: A Rigorous and Practical Approach. Boston, MA: PWS Publishing Company.
Fowler, M. (2001). Avoiding repetition. IEEE Software , 18 (1), pp. 97-99.
Gamma, E., Helm, R., Johnson, R., & Vlissides, J. M. (1994). Design Patterns: Elements of Reusable Object – Oriented Software. Boston, MA: Addison-Wesley Professional.
Guidelines on EPC for Consumer Products. (2005, 9). Retrieved 10 20, 2007, from EPCglobal: http://www.epcglobalinc.org/public/ppsc_guide/
Hutchins, S. G., Pirolli, P. L., & Card, S. K. (2004). A new perspective on use of the critical decision method with intelligence analysts. Proceedings of the 2004 Command and Control Research and Technology Symposium. San Diego.
Jones, K. E. (2001). Risk and the communication of uncertainty: A review of lord Phillips' report from the BSE Inquiry (UK). Canadian Journal of Sociology , 26 (4), pp. 655-666.
Juels, A. (2006). RFID privacy: a technical primer for the non-technical reader. New York: Springer.
Kitchenham, B., Pfleeger, S. L., & Fenton, N. (1995). Towards a framework for software measurement validation. IEEE Transactions on Software Engineering , 21 (12), pp. 929-944.
Klein, G. A. (1999). Sources of Power: How People Make Decisions. Cambridge, MA: The MIT Press.
Klein, G. A., Calderwood, R., & MacGregor, D. (1989). Critical decision method for eliciting knowledge. IEEE Transactions on Systems, Man and Cybernetics , 19 (3), pp. 462-472.
Knight, W. (2006). RFID – another technology, another security mess? Infosecurity Today , 3 (3), pp. 35-37.
Kondracki, N. L., Wellman, N. S., & Amundson, D. R. (2002). Content Analysis: Review of Methods and Their Applications in Nutrition Education. Journal of Nutrition Education and BehaviorVolume , 34 (4), pp. 224-230.
Krippendorff, K. (2003). Content Analysis: An Introduction to Its Methodology. Thousand Oaks, CA: Sage Publications, Inc.
Kurtzberg, T. R., Naquin, C. E., & Belkin, L. Y. (2005). Electronic performance appraisals: The eVects of e-mail communication on peer ratings in actual and simulated environments. Organizational Behavior and Human Decision Processes , 98 (2), pp. 216-226.
Landy, J. F., & Farr, L. J. (1980). Performance rating. Psychological Bulletin , 87 (1), pp. 72-107.
Lincoln, Y. S., & Guba, E. G. (1985). Naturalistic inquiry. London: Sage.
Lipshitz, R. (1993). Decision making as argument driven action. In G. A. Klein, J. Orasanu, R. Calderwood, & C. E. Szambok, Decision making in action (pp. 172-181). Norton, NJ: Ablex.
Lui, H. K., & Jamieson, R. (2003). Integrating trust and risk perceptions in business-to-consumer electronic commerce with the technology acceptance model. Proceedings of the 11th European Conference on Information Systems. Naples, Italy.
Mathi, K. (2004, 4). Key Success Factors For Knowledge Management. Retrieved 11 15, 2007, from http://www.dmreview.com/whitepaper
McKnight, D. H., & Chervany, N. L. (2002). What trust means in electronic commerce customer relationships: An interdisciplinary conceptual typology. International Journal of Electronic Commerce , 6 (2), pp. 35-59.
Militello, L., & Lim, L. (1995). Patient assessment skills: assessing early cues of necrotizing enterocolitis. The Journal of Perinatal and Neonatal Nursing , 9 (2), pp. 42-52.
Mitrou, L., & Karyda, M. (2006). Employees' privacy vs. employers' security: Can they be balanced? Telematics and Informatics , 23 (3), pp. 164-178.
Ngai, E., Cheng, T., Au, S., & Lai, K.-h. (2007). Mobile commerce integrated with RFID technology in a container depot. Decision Support Systems (43), pp. 62-76.
Patton, M. Q. (2002). Qualitative research & evaluation methods (3rd ed.). Thousand Oaks, CA: Sage Publications.
Roberts, C. (2006). Radio frequency identification. Computers & Security , 25 (1), pp. 18-26.
Rugaber, S., Ornburn, S. B., & LeBlanc, R. J. (1990). Recognizing design decisions in programs. IEEE Software , 7 (1), 46-54.
Slovic, P., Flynn, J. H., & Layman, M. (1991). Perceived risk, trust, and the politics of nuclear waste. Science, New Series , 254 (5038), pp. 1603-1607.
Thiesse, F. (2007). RFID, privacy and the perception of risk: A strategic framework. The Journal of Strategic Information Systems , 16 (2), pp. 214-232.
Venkatesh, V. (2000). Determinants of perceieved ease of use: integrating control, intrinsic motivation, and emotion into the technology acceptance model. Information Systems Research , 11 (4), pp. 342-365.
Wu, I.-L., & Chen, J.-L. (2005). An extension of Trust and TAM model with TPB in the initial adoption of on-line tax: An empirical study. International Journal of Human-Computer Studies , 62 (6), pp. 784-808.
Wu, N., Nystrom, M., Lin, T., & Yu, H. (2006). Challenges to global RFID adoption. Technovation , 26, pp. 1317-1323.
Yin, R. K. (2002). Case Study Research: Design & Methods (3rd ed.). Thousand Oaks, CA: Sage Publications, Inc.
Zannier, C., Chiasson, M., & Maurer, F. (2007). A model of design decision making based on empirical results of interviews with software designers. Information and Software Technology , 49 (6), pp. 637-653.