簡易檢索 / 詳目顯示

研究生: 廖偉翔
Liao, Wei-Hsiang
論文名稱: 探討影響消費者使用智慧家庭設備意願之重要因素: 以賦權理論與整合科技接受模型為基礎
Examining Important Factors that influence Consumers’ Intention of Using Smart Home Devices: Based on Empowerment Theory and UTAUT
指導教授: 王維聰
Wang, Wei-Tsong
學位類別: 碩士
Master
系所名稱: 管理學院 - 工業與資訊管理學系碩士在職專班
Department of Industrial and Information Management (on the job class)
論文出版年: 2018
畢業學年度: 106
語文別: 中文
論文頁數: 121
中文關鍵詞: 整合性科技接受模型賦權理論物聯網智慧家庭設備
外文關鍵詞: Unified theory of acceptance and use of technology, Empowerment theory, Internet of Things, Smart home devices
相關次數: 點閱:100下載:13
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • 在網際網路日漸發達及普及下,物聯網將快速發展。近幾年來物聯網智慧家庭一直是很熱門的話題,但如何提升消費者對於物聯網智慧家庭設備或服務的使用意願是一大挑戰。在過往已經有許多學者投入消費者對新科技接受意圖的研究與探討。而在眾多的科技接受理論中整合性科技接受模型(Unified Theory of Acceptance and Use of Technology, UTAUT)整合了八大理論,對於使用者的接受意圖解釋能力,大於其他接受理論模型而達到了70%。而在賦權理論的研究上,影響消費者對於物聯網智慧家庭設備或服務使用意願主要的原因之一是設備互連的問題。在眾多學者研究中指出當消費者面對新科技的時候,會希望自已有更多可以控制的權力。因此在智慧家庭上如何賦予消費者權力以提升其使用意願是值得研究的議題。在過往的文獻資料中,較少學者將整合性科技接受模型與賦權理論整合起來做研究。因此本研究將以結合整合性科技接受模型與賦權理論來探討影響消費者對物聯網使用意圖的重要因素。
    本研究針對使用過智慧家庭的消費者進行問卷調查,共回收了303份有效問卷,並使用結構方程式的部份最小平方法(PLS)來驗證。其結果顯示,賦權對於使用意圖、績效預期、努力預期、社會影響、促成條件皆有顯著的影響,而績效預期、努力預期、促成條件對使用意圖皆有顯著的影響。期望本研究之結果能提供智慧家庭的開發商或供應商在提升消費者其使用意圖上之參考依據。

    This study is combined with the dimension of the empowerment theory and performance expectancy, effort expectancy, social influence, and facilitating conditions of UTAUT (Unified Theory of Acceptance and Use of Technology ) to discuss the factors that influence consumers' intention of using in the smart home devices of Internet of Things.
    With 303 valid questionnaires and the verification made by the least squares methods (PLS) of the structural equation preface, the result shows the empowerment theory is obviously to influence the intention of using, performance expectancy, effort expectancy, social influence, and facilitating conditions. Also, performance expecting, effort expectancy, and condition of promotion are obviously to influence consumers' intention of using in the smart home devices.
    In the conclusion, the result of research proves the relationship of factors between the dimension of the empowerment theory and the dimension of UTAUT has an influence on consumer' intention of using in the smart home devices. Thus, if the developer of the smart home devices can empower consumer and popularize the prospect of technology and supporting measures, it will help to raise consumers' intention of using.

    摘要 I Extended Abstract II 誌謝 VII 目錄 VIII 表目錄 XI 圖目錄 XII 第一章 緒論 1 第一節 研究背景與動機 1 第二節 研究目的 4 第三節 研究範圍與限制 4 第四節 研究架構與流程 5 第二章 文獻探討 7 第一節 物聯網智慧家庭與其挑戰 7 2.1.1 網際網路與物聯網 7 2.1.2 物聯網架構與發展 9 2.1.3 智慧家庭的發展與其挑戰 13 第二節 資訊科技接受理論的比較 18 2.2.1理性行為理論 18 2.2.2 科技接受模型 20 2.2.3 修正後資訊系統成功模型 22 2.2.4 整合性科技接受模型 24 2.2.5 理論模型小結 27 第三節 賦權理論 28 第四節 小結 30 第三章 研究方法 33 第一節 研究架構 33 第二節 研究假說 35 3.2.1 賦權與使用意圖、績效預期、努力預期、社會影響、促成條件 35 3.2.2 績效預期與使用意圖 39 3.2.3努力預期與使用意圖 40 3.2.4 社會影響與使用意圖 41 3.2.5 促成條件與使用意圖 42 第三節 問卷設計 45 3.3.1 賦權 45 3.3.2 整合性科技接受模型 47 第四節 前測與資料分析 49 3.4.1 前測 49 3.4.2 資料收集 54 第五節 資料分析方法 55 第四章 資料分析 59 第一節 敘述性統計分析 59 4.1.1 資料分析 59 4.1.2 基本資料敘述性統計 60 4.1.3 研究變項敘述性統計 62 4.1.4 同質性檢定 66 4.1.5 研究變項常態性檢定 69 第二節 信度分析 72 第三節 相關分析 76 第四節 衡量模型 77 4.4.1 收斂效度分析 78 4.4.2 區別效度分析 81 第五節 結構模型 82 4.5.1 路徑分析與假說檢定 82 第五章 結論與建議 88 第一節 研究發現與結論 88 第二節 研究貢獻 91 第三節 研究限制與未來研究方向 94 參考文獻 96 附錄一 前測問卷 110 附錄二 正式問卷 116

    中文部份
    李科逸 (2013). "國際因應智慧聯網環境重要法制研析-歐盟新近個人資料修法與我國建議." 科技法律透析 25(12): 41-62.
    高明德 (2016). 將隱私顧慮納入考量之延伸性科技接受模型-以智慧家庭服務為例. 管理學院經營管理學程, 交通大學: 1-66.
    陳之偉 (2015). 車聯網採用意願之因素探討. 高階管理碩士在職專班(EMBA), 成功大學: 1-86.
    資策會FIND ;IBM Blue Viewpoint. (2010). 物聯網 讓萬物互聯暢通. from
    https://www-07.ibm.com/tw/blueview/2011apr/pdf/4_web.pdf

    英文部份
    Adrian Wilkinson, (1998) "Empowerment: theory and practice." Personnel Review, Vol. 27 Issue: 1, pp.40-56.
    Aloi, G., Bedogni, L., Bononi, L., Briante, O., Di Felice, M., Loscrì, V., ... & Trotta, A. (2015). Stem-net: How to deploy a self-organizing network of mobile end-user devices for emergency communication. Computer Communications, 60, 12-27.
    AIOTI. (2016). Alliance for internet of things innovation. from
    http://ec.europa.eu/information_society/newsroom/image/document/2017-7/20170208_ec_aioti__workshop_corevalues_v4_CD87BE37-BA70-4E06-7DA97FC092DB7752_42879.pdf
    Agarwal, R., Anderson, C., Zarate, J., & Ward, C. (2013). If we offer it, will they accept? Factors affecting patient use intentions of personal health records and secure messaging. Journal of medical Internet research, 15(2).
    Amichai-Hamburger, Y., McKenna, K. Y., & Tal, S. A. (2008). E-empowerment: Empowerment by the Internet. Computers in Human Behavior, 24(5), 1776-1789.
    Ashforth, B. E. (1989). The experience of powerlessness in organizations. Organizational behavior and human decision processes, 43(2), 207-242.
    Aggelidis, V. P., & Chatzoglou, P. D. (2009). Using a modified technology acceptance model in hospitals. International journal of medical informatics, 78(2), 115-126.
    Brief, A. P., & Nord, W. R. (1990). Work and meaning: Definitions and interpretations.
    Baptista, G. and T. Oliveira (2015). "Understanding mobile banking: The unified theory of acceptance and use of technology combined with cultural moderators." Computers in Human Behavior 50(Supplement C): 418-430.
    Bhatnagar, J. (2007). Predictors of organizational commitment in India: strategic HR roles, organizational learning capability and psychological empowerment. The International Journal of Human Resource Management, 18(10), 1782-1811.
    Bagozzi, R. P., & Yi, Y. (1988). On the evaluation of structural equation models. Journal of the Academy of Marketing Science, 16(1), 74-94.
    Bhattacherjee, A. (2002). Individual trust in online firms: Scale development and initial test. Journal of Management Information Systems, 19(1), 211-241.
    Brown, S. A., Dennis, A. R., & Venkatesh, V. (2010). Predicting collaboration technology use: Integrating technology adoption and collaboration research. Journal of Management Information Systems, 27(2), 9-54.
    Buchanan, T., Sainter, P., & Saunders, G. (2013). Factors affecting faculty use of learning technologies: Implications for models of technology adoption. Journal of Computing in Higher Education, 25(1), 1-11.
    Chan, F. K., Thong, J. Y., Venkatesh, V., Brown, S. A., Hu, P. J., & Tam, K. Y. (2011). Modeling citizen satisfaction with mandatory adoption of an e-government technology.
    Chin, W. W. (1998). Issues and opinion on structural equation modeling. MIS Quarterly, 22(1), 7-16.
    Conti, D., Di Nuovo, S., Buono, S., & Di Nuovo, A. (2017). Robots in education and care of children with developmental disabilities: a study on acceptance by experienced and future professionals. International Journal of Social Robotics, 9(1), 51-62.
    Cimperman, M., Brenčič, M. M., & Trkman, P. (2016). Analyzing older users’ home telehealth services acceptance behavior—applying an Extended UTAUT model. International journal of medical informatics, 90, 22-31.
    Conger, J. A., & Kanungo, R. N. (1988). The empowerment process: Integrating theory and practice. Academy of management review, 13(3), 471-482.
    Chong, A. Y. L. (2013). A two-staged SEM-neural network approach for understanding and predicting the determinants of m-commerce adoption. Expert Systems with Applications, 40(4), 1240-1247.
    Chang, S. E., et al. (2017). "User trust in social networking services: A comparison of Facebook and LinkedIn." Computers in Human Behavior 69(Supplement C): 207-217.
    Dečman, M. (2015). "Modeling the acceptance of e-learning in mandatory environments of higher education: The influence of previous education and gender." Computers in Human Behavior 49(Supplement C): 272-281.
    Deci, E. L., Connell, J. P., & Ryan, R. M. (1989). Self-determination in a work organization. Journal of applied psychology, 74(4), 580.
    Davis, F. D., Bagozzi, R. P., & Warshaw, P. R. (1989). User acceptance of computer technology: a comparison of two theoretical models. Management Science, 35(8), 982-1003.
    DeLone, W. H., & McLean, E. R. (1992). Information systems success: The quest for the dependent variable. Information Systems Research, 3(1), 60-95.
    Delone, W. H., & McLean, E. R. (2003). The DeLone and McLean model of information systems success: a ten-year update. Journal of Management Information Systems, 19(4), 9-30.
    Ericsson. (2017). Ericsson Mobility Report November 2017. From
    https://www.ericsson.com/en/mobility-report/reports/november-2017
    Escobar-Rodríguez, T. and E. Carvajal-Trujillo (2013). "Online drivers of consumer purchase of website airline tickets." Journal of Air Transport Management 32(Supplement C): 58-64.
    Escobar-Rodríguez, T. and E. Carvajal-Trujillo (2014). "Online purchasing tickets for low cost carriers: An application of the unified theory of acceptance and use of technology (UTAUT) model." Tourism Management 43(Supplement C): 70-88.
    Fishbein, M., & Ajzen, I. (1975). Belief, attitude, intention and behavior: An introduction to theory and research. Boston: Addison-Wesley Longman Publishing Co., Inc.
    Füller, J., et al. (2009). "Consumer Empowerment Through Internet-Based Co-creation." Journal of Management Information Systems 26(3): 71-102.
    Gartner. (2017). Gartner Says 8.4 Billion Connected "Things" Will Be in Use in 2017, Up 31 Percent From 2016. From
    https://www.gartner.com/newsroom/id/3598917
    Gao, Y., et al. (2015). "An empirical study of wearable technology acceptance in healthcare." Industrial Management & Data Systems 115(9): 1704-1723.
    Gist, M. E. (1987). Self-efficacy: Implications for organizational behavior and human resource management. Academy of management review, 12(3), 472-485.
    Harris Poll. (2014). 81 Percent of Americans Admit Privacy Concerns With the Internet of Things. from
    http://media.nxp.com/phoenix.zhtml?c=254228&p=irol-newsArticle&ID=2118017
    Handayani, P. W., Hidayanto, A. N., Pinem, A. A., Hapsari, I. C., Sandhyaduhita, P. I., & Budi, I. (2017). Acceptance model of a Hospital Information System. International journal of medical informatics, 99, 11-28.
    Hair, J. F., Black, W. C., Babin, B. J., Anderson, R. E., & Tatham, R. L. (2010). Multivariate Data Analysis. Upper Saddle River, NJ: Pearson Education.
    Hair, J. F., Sarstedt, M., Ringle, C. M., & Mena, J. A. (2012). An assessment of the use of partial least squares structural equation modeling in marketing research. Journal of the Academy of Marketing Science, 40(3), 414-433.
    Hulland, J. (1999). Use of partial least squares (PLS) in strategic management research: A review of four recent studies. Strategic Management Journal, 20(2), 195-204.
    Han, D. M., & Lim, J. H. (2010). Smart home energy management system using IEEE 802.15. 4 and zigbee. IEEE Transactions on Consumer Electronics, 56(3).
    Hackman, J. R., & Oldham, G. R. (1980) Work redesign.Reading, MA: Addison-Wesley.
    Hsieh, H. L., Kuo, Y. M., Wang, S. R., Chuang, B. K., & Tsai, C. H. (2016). A Study of Personal Health Record User’s Behavioral Model Based on the PMT and UTAUT Integrative Perspective. International journal of environmental research and public health, 14(1), 8.
    Hsu, C.-L., et al. (2013). "The role of privacy protection in healthcare information systems adoption." Journal of medical systems 37(5): 9966.
    ITU. (2005). ITU Internet Reports 2005: The Internet of Things. From
    http://www.itu.int/osg/spu/publications/internetofthings/
    Irdeto. (2017). 九成消費者認為物聯網設備應具備足夠的安全性. from
    https://resources.irdeto.com/chinese/priotsecuritysurveyresultszh
    Jen, W., et al. (2009). "An integrated analysis of technology acceptance behaviour models: Comparison of three major models." MIS Review 15(1): 89-121.
    Ji-Hwan, L. E. E. and S. Chi-Hoon (2013). " Effects of trust and perceived risk on user acceptance of a new technology service." Social Behavior & Personality: an international journal 41(4): 587-597.
    Khalilzadeh, J., et al. (2017). "Security-related factors in extended UTAUT model for NFC based mobile payment in the restaurant industry." Computers in Human Behavior 70(Supplement C): 460-474.
    Kim, H.-W. and S. Gupta (2014). "A user empowerment approach to information systems infusion." IEEE Transactions on Engineering Management 61(4): 656-668.
    Kim, S. and H. Park (2013). "Effects of various characteristics of social commerce (s-commerce) on consumers’ trust and trust performance." International Journal of Information Management 33(2): 318-332.
    Kim, B., Lee, G., Murrmann, S. K., & George, T. R. (2012). Motivational effects of empowerment on employees’ organizational commitment: a mediating role of management trustworthiness. Cornell Hospitality Quarterly, 53(1), 10-19.
    Kozinets, R. V. (2002). The field behind the screen: Using netnography for marketing research in online communities. Journal of marketing research, 39(1), 61-72.
    Lai, C. (2015). Modeling teachers' influence on learners' self-directed use of technology for language learning outside the classroom. Computers & Education, 82, 74-83.
    Lee, J.-H. and C.-H. Song (2013). "Effects of trust and perceived risk on user acceptance of a new technology service." Social Behavior and Personality: an international journal 41(4): 587-597.
    Lewis, K., Kaufman, J., & Christakis, N. (2008). The taste for privacy: An analysis of college student privacy settings in an online social network. Journal of Computer‐Mediated Communication, 14(1), 79-100.
    Liden, R. C., Wayne, S. J., & Sparrowe, R. T. (2000). An examination of the mediating role of psychological empowerment on the relations between the job, interpersonal relationships, and work outcomes. Journal of applied psychology, 85(3), 407.
    Lian, J.-W. and D. C. Yen (2014). "Online shopping drivers and barriers for older adults: Age and gender differences." Computers in Human Behavior 37(Supplement C): 133-143.
    Liu, C. H., & Huang, Y. M. (2015). An empirical investigation of computer simulation technology acceptance to explore the factors that affect user intention. Universal Access in the Information Society, 14(3), 449-457.
    Maillet, E., Mathieu, L., & Sicotte, C. (2015). Modeling factors explaining the acceptance, actual use and satisfaction of nurses using an Electronic Patient Record in acute care settings: An extension of the UTAUT. International journal of medical informatics, 84(1), 36-47.
    Mani, Z., & Chouk, I. (2017). Drivers of consumers’ resistance to smart products. Journal of Marketing Management, 33(1-2), 76-97.
    Martins, C., et al. (2014). "Understanding the Internet banking adoption: A unified theory of acceptance and use of technology and perceived risk application." International Journal of Information Management 34(1): 1-13.
    Mendes-Filho, L., et al. (2017). "Empowering the traveler: an examination of the impact of user-generated content on travel planning." Journal of Travel & Tourism Marketing: 1-12.
    Midha, V. (2012). "Impact of consumer empowerment on online trust: An examination across genders." Decision Support Systems 54(1): 198-205.
    Mikalef, P., Pappas, I. O., & Giannakos, M. (2016). An integrative adoption model of video-based learning. The International Journal of Information and Learning Technology, 33(4), 219-235.
    Moreno, V., Cavazotte, F., & Alves, I. (2017). Explaining university students’ effective use of e-learning platforms. British Journal of Educational Technology, 48(4), 995-1009.
    Nikou, S. A., & Economides, A. A. (2017). Mobile-based assessment: Investigating the factors that influence behavioral intention to use. Computers & Education, 109, 56-73.
    Neuman, W. L. (2000). Social research methods: Quantitative and qualitative methods. Boston, MA: Allyn & Bacon.
    Ozer, E. M., & Bandura, A. (1990). Mechanisms governing empowerment effects: a self-efficacy analysis. Journal of personality and social psychology, 58(3), 472.
    Olivero, N., & Lunt, P. (2004). Privacy versus willingness to disclose in e-commerce exchanges: The effect of risk awareness on the relative role of trust and control. Journal of Economic Psychology, 25(2), 243-262.
    Qasim, H. and E. Abu-Shanab (2016). "Drivers of mobile payment acceptance: The impact of network externalities." Information Systems Frontiers 18(5): 1021-1034.
    Pascual-Miguel, F. J., et al. (2015). "Influences of gender and product type on online purchasing." Journal of Business Research 68(7): 1550-1556.
    Ponemon Institute. (2015). Privacy and Security in a Connected Life:A Study of US, European and Japanese Consumers. from
    https://www.trendmicro.de/cloud-content/us/pdfs/security-intelligence/reports/rt_privacy_and_security_in_a_connected_life.pdf
    Pwc. (2017). Smart home, seamless life Unlocking a culture of convenience. from
    https://www.pwc.com/us/en/industry/entertainment-media/publications/consumer-intelligence-series/assets/pwc-consumer-intelligence-series-iot-connected-home.pdf
    Perera, C., Zaslavsky, A., Christen, P., & Georgakopoulos, D. (2014). Context aware computing for the internet of things: A survey. IEEE communications surveys & tutorials, 16(1), 414-454.
    Pitt, L. F., Watson, R. T., & Kavan, C. B. (1995). Service quality: a measure of information systems effectiveness. MIS Quarterly, 173-187.
    Perkins, D. D., & Zimmerman, M. A. (1995). Empowerment theory, research, and application. American journal of community psychology, 23(5), 569-579.
    Rappaport, J. (1981). In praise of paradox: A social policy of empowerment over prevention. American journal of community psychology, 9(1), 1-25.
    Rho, M. J., et al. (2015). "Factors influencing the acceptance of telemedicine for diabetes management." Cluster Computing 18(1): 321-331.
    Rich, A., Brandes, K., Mullan, B., & Hagger, M. S. (2015). Theory of planned behavior and adherence in chronic illness: a meta-analysis. Journal of behavioral medicine, 38(4), 673-688.
    Rinehart, J. S., Short, P. M., Short, R. J., & Eckley, M. (1998). Teacher empowerment and principal leadership: Understanding the influence process. Educational Administration Quarterly, 34(1_suppl), 630-649.
    Robyn Ouschan, Jillian Sweeney, Lester Johnson, (2006) "Customer empowerment and relationship outcomes in healthcare consultations." European Journal of Marketing, Vol. 40 Issue: 9/10, pp.1068-1086.
    Rose, Karen, Scott Eldridge, and Lyman Chapin. (2015) "The internet of things: An overview." The Internet Society (ISOC) , pp.1-50.
    Ryn, M. V. (1997). Developing effective helping relationships in health education practice. Health Education & Behavior, 24(6), 683-702.
    Samaradiwakara, G. and C. Gunawardena (2014). "Comparison of existing technology acceptance theories and models to suggest a well improved theory/model." International Technical Sciences Journal (ITSJ) 1(1): 21-36.
    Schaupp, L. C., et al. (2010). "E-file adoption: A study of U.S. taxpayers’ intentions." Computers in Human Behavior 26(4): 636-644.
    Sicari, Sabrina, et al. (2015)"Security, privacy and trust in Internet of Things: The road ahead." Computer Networks 76: 146-164.
    Shiau, W.-L., & Luo, M. M. (2012). Factors affecting online group buying intention and satisfaction: A social exchange theory perspective. Computers in Human Behavior, 28(6), 2431-2444.
    Slade, E. L., et al. (2015). "Modeling consumers’ adoption intentions of remote mobile payments in the United Kingdom: extending UTAUT with innovativeness, risk, and trust." Psychology & Marketing 32(8): 860-873.
    Spreitzer, G. M., Kizilos, M. A., & Nason, S. W. (1997). A dimensional analysis of the relationship between psychological empowerment and effectiveness satisfaction, and strain. Journal of management, 23(5), 679-704.
    Sun, Y., et al. (2013). "Understanding the acceptance of mobile health services: a comparison and integration of alternative models." Journal of Electronic Commerce Research 14(2): 183.
    Sun, Y., et al. (2014). "Understanding Chinese users’ continuance intention toward online social networks: an integrative theoretical model." Electronic Markets 24(1): 57-66.
    Schweitzer, F., & den Hende, E. A. (2016). To Be or Not to Be in Thrall to the March of Smart Products. Psychology & marketing, 33(10), 830-842.
    Sung, H. N., Jeong, D. Y., Jeong, Y. S., & Shin, J. I. (2015). The relationship among self-efficacy, social influence, performance expectancy, effort expectancy, and behavioral intention in mobile learning service. International Journal of u-and e-Service, Science and Technology, 8(9), 197-206.
    Teo, T. (2009). Modelling technology acceptance in education: A study of pre-service teachers. Computers & Education, 52(2), 302-312.
    Tayie, S. (2005). Research methods and writing research proposals. Quezon City,Philippines: Pathways to Higher Education.
    Thomas, K. W., & Velthouse, B. A. (1990). Cognitive elements of empowerment: An “interpretive” model of intrinsic task motivation. Academy of management review, 15(4), 666-681.
    Thompson, R. L., Higgins, C. A., & Howell, J. M. (1991). Personal computing: toward a conceptual model of utilization. MIS quarterly, 125-143.
    Toh, C. H. (2013). Assessing adoption of wikis in a Singapore secondary school: Using the UTAUT model. In Educational Media (ICEM), 2013 IEEE 63rd Annual Conference International Council for (pp. 1-9). IEEE.
    Thatcher, J. B., et al. (2011). "The role of trust in postadoption IT exploration: An empirical examination of knowledge management systems." IEEE Transactions on Engineering Management 58(1): 56-70.
    Venkatesh, V., Morris, M. G., Davis, G. B., & Davis, F. D. (2003). "User acceptance of information technology: Toward a unified view." MIS Quarterly, 27, 425-478.
    Van Dyke, T. P., Midha, V., & Nemati, H. (2007). The effect of consumer privacy empowerment on trust and privacy concerns in e‐commerce. Electronic Markets, 17(1), 68-81.
    Wang, Y. S. (2003). The adoption of electronic tax filing systems: an empirical study. Government Information Quarterly, 20(4), 333-352.
    Weerakkody, V., et al. (2013). "Examining the influence of intermediaries in facilitating e-government adoption: An empirical investigation." International Journal of Information Management 33(5): 716-725.
    Walsh, J. P., Kiesler, S., Sproull, L. S., & Hesse, B. W. (1992). Self-selected and randomly selected respondents in a computer network survey. The Public Opinion Quarterly, 56(2), 241-244.
    Wu, C.-C., et al. (2014). "Benevolence trust: a key determinant of user continuance use of online social networks." Information Systems and e-Business Management 12(2): 189-211.
    Webster, J., & Martocchio, J. J. (1992). Microcomputer playfulness: Development of a measure with workplace implications. MIS quarterly, 201-226.
    Yang, H. C. (2013). Bon App?tit for apps: young American consumers' acceptance of mobile applications. Journal of Computer Information Systems, 53(3), 85-96.
    Yun, H., et al. (2013). "Understanding the use of location-based service applications: do privacy concerns matter?" Journal of Electronic Commerce Research 14(3): 215.
    Zimmerman, M. A., & Warschausky, S. (1998). Empowerment theory for rehabilitation research: Conceptual and methodological issues. Rehabilitation psychology, 43(1), 3.

    下載圖示 校內:2023-06-25公開
    校外:2023-06-25公開
    QR CODE