| 研究生: |
廖偉翔 Liao, Wei-Hsiang |
|---|---|
| 論文名稱: |
探討影響消費者使用智慧家庭設備意願之重要因素: 以賦權理論與整合科技接受模型為基礎 Examining Important Factors that influence Consumers’ Intention of Using Smart Home Devices: Based on Empowerment Theory and UTAUT |
| 指導教授: |
王維聰
Wang, Wei-Tsong |
| 學位類別: |
碩士 Master |
| 系所名稱: |
管理學院 - 工業與資訊管理學系碩士在職專班 Department of Industrial and Information Management (on the job class) |
| 論文出版年: | 2018 |
| 畢業學年度: | 106 |
| 語文別: | 中文 |
| 論文頁數: | 121 |
| 中文關鍵詞: | 整合性科技接受模型 、賦權理論 、物聯網 、智慧家庭設備 |
| 外文關鍵詞: | Unified theory of acceptance and use of technology, Empowerment theory, Internet of Things, Smart home devices |
| 相關次數: | 點閱:100 下載:13 |
| 分享至: |
| 查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報 |
在網際網路日漸發達及普及下,物聯網將快速發展。近幾年來物聯網智慧家庭一直是很熱門的話題,但如何提升消費者對於物聯網智慧家庭設備或服務的使用意願是一大挑戰。在過往已經有許多學者投入消費者對新科技接受意圖的研究與探討。而在眾多的科技接受理論中整合性科技接受模型(Unified Theory of Acceptance and Use of Technology, UTAUT)整合了八大理論,對於使用者的接受意圖解釋能力,大於其他接受理論模型而達到了70%。而在賦權理論的研究上,影響消費者對於物聯網智慧家庭設備或服務使用意願主要的原因之一是設備互連的問題。在眾多學者研究中指出當消費者面對新科技的時候,會希望自已有更多可以控制的權力。因此在智慧家庭上如何賦予消費者權力以提升其使用意願是值得研究的議題。在過往的文獻資料中,較少學者將整合性科技接受模型與賦權理論整合起來做研究。因此本研究將以結合整合性科技接受模型與賦權理論來探討影響消費者對物聯網使用意圖的重要因素。
本研究針對使用過智慧家庭的消費者進行問卷調查,共回收了303份有效問卷,並使用結構方程式的部份最小平方法(PLS)來驗證。其結果顯示,賦權對於使用意圖、績效預期、努力預期、社會影響、促成條件皆有顯著的影響,而績效預期、努力預期、促成條件對使用意圖皆有顯著的影響。期望本研究之結果能提供智慧家庭的開發商或供應商在提升消費者其使用意圖上之參考依據。
This study is combined with the dimension of the empowerment theory and performance expectancy, effort expectancy, social influence, and facilitating conditions of UTAUT (Unified Theory of Acceptance and Use of Technology ) to discuss the factors that influence consumers' intention of using in the smart home devices of Internet of Things.
With 303 valid questionnaires and the verification made by the least squares methods (PLS) of the structural equation preface, the result shows the empowerment theory is obviously to influence the intention of using, performance expectancy, effort expectancy, social influence, and facilitating conditions. Also, performance expecting, effort expectancy, and condition of promotion are obviously to influence consumers' intention of using in the smart home devices.
In the conclusion, the result of research proves the relationship of factors between the dimension of the empowerment theory and the dimension of UTAUT has an influence on consumer' intention of using in the smart home devices. Thus, if the developer of the smart home devices can empower consumer and popularize the prospect of technology and supporting measures, it will help to raise consumers' intention of using.
中文部份
李科逸 (2013). "國際因應智慧聯網環境重要法制研析-歐盟新近個人資料修法與我國建議." 科技法律透析 25(12): 41-62.
高明德 (2016). 將隱私顧慮納入考量之延伸性科技接受模型-以智慧家庭服務為例. 管理學院經營管理學程, 交通大學: 1-66.
陳之偉 (2015). 車聯網採用意願之因素探討. 高階管理碩士在職專班(EMBA), 成功大學: 1-86.
資策會FIND ;IBM Blue Viewpoint. (2010). 物聯網 讓萬物互聯暢通. from
https://www-07.ibm.com/tw/blueview/2011apr/pdf/4_web.pdf
英文部份
Adrian Wilkinson, (1998) "Empowerment: theory and practice." Personnel Review, Vol. 27 Issue: 1, pp.40-56.
Aloi, G., Bedogni, L., Bononi, L., Briante, O., Di Felice, M., Loscrì, V., ... & Trotta, A. (2015). Stem-net: How to deploy a self-organizing network of mobile end-user devices for emergency communication. Computer Communications, 60, 12-27.
AIOTI. (2016). Alliance for internet of things innovation. from
http://ec.europa.eu/information_society/newsroom/image/document/2017-7/20170208_ec_aioti__workshop_corevalues_v4_CD87BE37-BA70-4E06-7DA97FC092DB7752_42879.pdf
Agarwal, R., Anderson, C., Zarate, J., & Ward, C. (2013). If we offer it, will they accept? Factors affecting patient use intentions of personal health records and secure messaging. Journal of medical Internet research, 15(2).
Amichai-Hamburger, Y., McKenna, K. Y., & Tal, S. A. (2008). E-empowerment: Empowerment by the Internet. Computers in Human Behavior, 24(5), 1776-1789.
Ashforth, B. E. (1989). The experience of powerlessness in organizations. Organizational behavior and human decision processes, 43(2), 207-242.
Aggelidis, V. P., & Chatzoglou, P. D. (2009). Using a modified technology acceptance model in hospitals. International journal of medical informatics, 78(2), 115-126.
Brief, A. P., & Nord, W. R. (1990). Work and meaning: Definitions and interpretations.
Baptista, G. and T. Oliveira (2015). "Understanding mobile banking: The unified theory of acceptance and use of technology combined with cultural moderators." Computers in Human Behavior 50(Supplement C): 418-430.
Bhatnagar, J. (2007). Predictors of organizational commitment in India: strategic HR roles, organizational learning capability and psychological empowerment. The International Journal of Human Resource Management, 18(10), 1782-1811.
Bagozzi, R. P., & Yi, Y. (1988). On the evaluation of structural equation models. Journal of the Academy of Marketing Science, 16(1), 74-94.
Bhattacherjee, A. (2002). Individual trust in online firms: Scale development and initial test. Journal of Management Information Systems, 19(1), 211-241.
Brown, S. A., Dennis, A. R., & Venkatesh, V. (2010). Predicting collaboration technology use: Integrating technology adoption and collaboration research. Journal of Management Information Systems, 27(2), 9-54.
Buchanan, T., Sainter, P., & Saunders, G. (2013). Factors affecting faculty use of learning technologies: Implications for models of technology adoption. Journal of Computing in Higher Education, 25(1), 1-11.
Chan, F. K., Thong, J. Y., Venkatesh, V., Brown, S. A., Hu, P. J., & Tam, K. Y. (2011). Modeling citizen satisfaction with mandatory adoption of an e-government technology.
Chin, W. W. (1998). Issues and opinion on structural equation modeling. MIS Quarterly, 22(1), 7-16.
Conti, D., Di Nuovo, S., Buono, S., & Di Nuovo, A. (2017). Robots in education and care of children with developmental disabilities: a study on acceptance by experienced and future professionals. International Journal of Social Robotics, 9(1), 51-62.
Cimperman, M., Brenčič, M. M., & Trkman, P. (2016). Analyzing older users’ home telehealth services acceptance behavior—applying an Extended UTAUT model. International journal of medical informatics, 90, 22-31.
Conger, J. A., & Kanungo, R. N. (1988). The empowerment process: Integrating theory and practice. Academy of management review, 13(3), 471-482.
Chong, A. Y. L. (2013). A two-staged SEM-neural network approach for understanding and predicting the determinants of m-commerce adoption. Expert Systems with Applications, 40(4), 1240-1247.
Chang, S. E., et al. (2017). "User trust in social networking services: A comparison of Facebook and LinkedIn." Computers in Human Behavior 69(Supplement C): 207-217.
Dečman, M. (2015). "Modeling the acceptance of e-learning in mandatory environments of higher education: The influence of previous education and gender." Computers in Human Behavior 49(Supplement C): 272-281.
Deci, E. L., Connell, J. P., & Ryan, R. M. (1989). Self-determination in a work organization. Journal of applied psychology, 74(4), 580.
Davis, F. D., Bagozzi, R. P., & Warshaw, P. R. (1989). User acceptance of computer technology: a comparison of two theoretical models. Management Science, 35(8), 982-1003.
DeLone, W. H., & McLean, E. R. (1992). Information systems success: The quest for the dependent variable. Information Systems Research, 3(1), 60-95.
Delone, W. H., & McLean, E. R. (2003). The DeLone and McLean model of information systems success: a ten-year update. Journal of Management Information Systems, 19(4), 9-30.
Ericsson. (2017). Ericsson Mobility Report November 2017. From
https://www.ericsson.com/en/mobility-report/reports/november-2017
Escobar-Rodríguez, T. and E. Carvajal-Trujillo (2013). "Online drivers of consumer purchase of website airline tickets." Journal of Air Transport Management 32(Supplement C): 58-64.
Escobar-Rodríguez, T. and E. Carvajal-Trujillo (2014). "Online purchasing tickets for low cost carriers: An application of the unified theory of acceptance and use of technology (UTAUT) model." Tourism Management 43(Supplement C): 70-88.
Fishbein, M., & Ajzen, I. (1975). Belief, attitude, intention and behavior: An introduction to theory and research. Boston: Addison-Wesley Longman Publishing Co., Inc.
Füller, J., et al. (2009). "Consumer Empowerment Through Internet-Based Co-creation." Journal of Management Information Systems 26(3): 71-102.
Gartner. (2017). Gartner Says 8.4 Billion Connected "Things" Will Be in Use in 2017, Up 31 Percent From 2016. From
https://www.gartner.com/newsroom/id/3598917
Gao, Y., et al. (2015). "An empirical study of wearable technology acceptance in healthcare." Industrial Management & Data Systems 115(9): 1704-1723.
Gist, M. E. (1987). Self-efficacy: Implications for organizational behavior and human resource management. Academy of management review, 12(3), 472-485.
Harris Poll. (2014). 81 Percent of Americans Admit Privacy Concerns With the Internet of Things. from
http://media.nxp.com/phoenix.zhtml?c=254228&p=irol-newsArticle&ID=2118017
Handayani, P. W., Hidayanto, A. N., Pinem, A. A., Hapsari, I. C., Sandhyaduhita, P. I., & Budi, I. (2017). Acceptance model of a Hospital Information System. International journal of medical informatics, 99, 11-28.
Hair, J. F., Black, W. C., Babin, B. J., Anderson, R. E., & Tatham, R. L. (2010). Multivariate Data Analysis. Upper Saddle River, NJ: Pearson Education.
Hair, J. F., Sarstedt, M., Ringle, C. M., & Mena, J. A. (2012). An assessment of the use of partial least squares structural equation modeling in marketing research. Journal of the Academy of Marketing Science, 40(3), 414-433.
Hulland, J. (1999). Use of partial least squares (PLS) in strategic management research: A review of four recent studies. Strategic Management Journal, 20(2), 195-204.
Han, D. M., & Lim, J. H. (2010). Smart home energy management system using IEEE 802.15. 4 and zigbee. IEEE Transactions on Consumer Electronics, 56(3).
Hackman, J. R., & Oldham, G. R. (1980) Work redesign.Reading, MA: Addison-Wesley.
Hsieh, H. L., Kuo, Y. M., Wang, S. R., Chuang, B. K., & Tsai, C. H. (2016). A Study of Personal Health Record User’s Behavioral Model Based on the PMT and UTAUT Integrative Perspective. International journal of environmental research and public health, 14(1), 8.
Hsu, C.-L., et al. (2013). "The role of privacy protection in healthcare information systems adoption." Journal of medical systems 37(5): 9966.
ITU. (2005). ITU Internet Reports 2005: The Internet of Things. From
http://www.itu.int/osg/spu/publications/internetofthings/
Irdeto. (2017). 九成消費者認為物聯網設備應具備足夠的安全性. from
https://resources.irdeto.com/chinese/priotsecuritysurveyresultszh
Jen, W., et al. (2009). "An integrated analysis of technology acceptance behaviour models: Comparison of three major models." MIS Review 15(1): 89-121.
Ji-Hwan, L. E. E. and S. Chi-Hoon (2013). " Effects of trust and perceived risk on user acceptance of a new technology service." Social Behavior & Personality: an international journal 41(4): 587-597.
Khalilzadeh, J., et al. (2017). "Security-related factors in extended UTAUT model for NFC based mobile payment in the restaurant industry." Computers in Human Behavior 70(Supplement C): 460-474.
Kim, H.-W. and S. Gupta (2014). "A user empowerment approach to information systems infusion." IEEE Transactions on Engineering Management 61(4): 656-668.
Kim, S. and H. Park (2013). "Effects of various characteristics of social commerce (s-commerce) on consumers’ trust and trust performance." International Journal of Information Management 33(2): 318-332.
Kim, B., Lee, G., Murrmann, S. K., & George, T. R. (2012). Motivational effects of empowerment on employees’ organizational commitment: a mediating role of management trustworthiness. Cornell Hospitality Quarterly, 53(1), 10-19.
Kozinets, R. V. (2002). The field behind the screen: Using netnography for marketing research in online communities. Journal of marketing research, 39(1), 61-72.
Lai, C. (2015). Modeling teachers' influence on learners' self-directed use of technology for language learning outside the classroom. Computers & Education, 82, 74-83.
Lee, J.-H. and C.-H. Song (2013). "Effects of trust and perceived risk on user acceptance of a new technology service." Social Behavior and Personality: an international journal 41(4): 587-597.
Lewis, K., Kaufman, J., & Christakis, N. (2008). The taste for privacy: An analysis of college student privacy settings in an online social network. Journal of Computer‐Mediated Communication, 14(1), 79-100.
Liden, R. C., Wayne, S. J., & Sparrowe, R. T. (2000). An examination of the mediating role of psychological empowerment on the relations between the job, interpersonal relationships, and work outcomes. Journal of applied psychology, 85(3), 407.
Lian, J.-W. and D. C. Yen (2014). "Online shopping drivers and barriers for older adults: Age and gender differences." Computers in Human Behavior 37(Supplement C): 133-143.
Liu, C. H., & Huang, Y. M. (2015). An empirical investigation of computer simulation technology acceptance to explore the factors that affect user intention. Universal Access in the Information Society, 14(3), 449-457.
Maillet, E., Mathieu, L., & Sicotte, C. (2015). Modeling factors explaining the acceptance, actual use and satisfaction of nurses using an Electronic Patient Record in acute care settings: An extension of the UTAUT. International journal of medical informatics, 84(1), 36-47.
Mani, Z., & Chouk, I. (2017). Drivers of consumers’ resistance to smart products. Journal of Marketing Management, 33(1-2), 76-97.
Martins, C., et al. (2014). "Understanding the Internet banking adoption: A unified theory of acceptance and use of technology and perceived risk application." International Journal of Information Management 34(1): 1-13.
Mendes-Filho, L., et al. (2017). "Empowering the traveler: an examination of the impact of user-generated content on travel planning." Journal of Travel & Tourism Marketing: 1-12.
Midha, V. (2012). "Impact of consumer empowerment on online trust: An examination across genders." Decision Support Systems 54(1): 198-205.
Mikalef, P., Pappas, I. O., & Giannakos, M. (2016). An integrative adoption model of video-based learning. The International Journal of Information and Learning Technology, 33(4), 219-235.
Moreno, V., Cavazotte, F., & Alves, I. (2017). Explaining university students’ effective use of e-learning platforms. British Journal of Educational Technology, 48(4), 995-1009.
Nikou, S. A., & Economides, A. A. (2017). Mobile-based assessment: Investigating the factors that influence behavioral intention to use. Computers & Education, 109, 56-73.
Neuman, W. L. (2000). Social research methods: Quantitative and qualitative methods. Boston, MA: Allyn & Bacon.
Ozer, E. M., & Bandura, A. (1990). Mechanisms governing empowerment effects: a self-efficacy analysis. Journal of personality and social psychology, 58(3), 472.
Olivero, N., & Lunt, P. (2004). Privacy versus willingness to disclose in e-commerce exchanges: The effect of risk awareness on the relative role of trust and control. Journal of Economic Psychology, 25(2), 243-262.
Qasim, H. and E. Abu-Shanab (2016). "Drivers of mobile payment acceptance: The impact of network externalities." Information Systems Frontiers 18(5): 1021-1034.
Pascual-Miguel, F. J., et al. (2015). "Influences of gender and product type on online purchasing." Journal of Business Research 68(7): 1550-1556.
Ponemon Institute. (2015). Privacy and Security in a Connected Life:A Study of US, European and Japanese Consumers. from
https://www.trendmicro.de/cloud-content/us/pdfs/security-intelligence/reports/rt_privacy_and_security_in_a_connected_life.pdf
Pwc. (2017). Smart home, seamless life Unlocking a culture of convenience. from
https://www.pwc.com/us/en/industry/entertainment-media/publications/consumer-intelligence-series/assets/pwc-consumer-intelligence-series-iot-connected-home.pdf
Perera, C., Zaslavsky, A., Christen, P., & Georgakopoulos, D. (2014). Context aware computing for the internet of things: A survey. IEEE communications surveys & tutorials, 16(1), 414-454.
Pitt, L. F., Watson, R. T., & Kavan, C. B. (1995). Service quality: a measure of information systems effectiveness. MIS Quarterly, 173-187.
Perkins, D. D., & Zimmerman, M. A. (1995). Empowerment theory, research, and application. American journal of community psychology, 23(5), 569-579.
Rappaport, J. (1981). In praise of paradox: A social policy of empowerment over prevention. American journal of community psychology, 9(1), 1-25.
Rho, M. J., et al. (2015). "Factors influencing the acceptance of telemedicine for diabetes management." Cluster Computing 18(1): 321-331.
Rich, A., Brandes, K., Mullan, B., & Hagger, M. S. (2015). Theory of planned behavior and adherence in chronic illness: a meta-analysis. Journal of behavioral medicine, 38(4), 673-688.
Rinehart, J. S., Short, P. M., Short, R. J., & Eckley, M. (1998). Teacher empowerment and principal leadership: Understanding the influence process. Educational Administration Quarterly, 34(1_suppl), 630-649.
Robyn Ouschan, Jillian Sweeney, Lester Johnson, (2006) "Customer empowerment and relationship outcomes in healthcare consultations." European Journal of Marketing, Vol. 40 Issue: 9/10, pp.1068-1086.
Rose, Karen, Scott Eldridge, and Lyman Chapin. (2015) "The internet of things: An overview." The Internet Society (ISOC) , pp.1-50.
Ryn, M. V. (1997). Developing effective helping relationships in health education practice. Health Education & Behavior, 24(6), 683-702.
Samaradiwakara, G. and C. Gunawardena (2014). "Comparison of existing technology acceptance theories and models to suggest a well improved theory/model." International Technical Sciences Journal (ITSJ) 1(1): 21-36.
Schaupp, L. C., et al. (2010). "E-file adoption: A study of U.S. taxpayers’ intentions." Computers in Human Behavior 26(4): 636-644.
Sicari, Sabrina, et al. (2015)"Security, privacy and trust in Internet of Things: The road ahead." Computer Networks 76: 146-164.
Shiau, W.-L., & Luo, M. M. (2012). Factors affecting online group buying intention and satisfaction: A social exchange theory perspective. Computers in Human Behavior, 28(6), 2431-2444.
Slade, E. L., et al. (2015). "Modeling consumers’ adoption intentions of remote mobile payments in the United Kingdom: extending UTAUT with innovativeness, risk, and trust." Psychology & Marketing 32(8): 860-873.
Spreitzer, G. M., Kizilos, M. A., & Nason, S. W. (1997). A dimensional analysis of the relationship between psychological empowerment and effectiveness satisfaction, and strain. Journal of management, 23(5), 679-704.
Sun, Y., et al. (2013). "Understanding the acceptance of mobile health services: a comparison and integration of alternative models." Journal of Electronic Commerce Research 14(2): 183.
Sun, Y., et al. (2014). "Understanding Chinese users’ continuance intention toward online social networks: an integrative theoretical model." Electronic Markets 24(1): 57-66.
Schweitzer, F., & den Hende, E. A. (2016). To Be or Not to Be in Thrall to the March of Smart Products. Psychology & marketing, 33(10), 830-842.
Sung, H. N., Jeong, D. Y., Jeong, Y. S., & Shin, J. I. (2015). The relationship among self-efficacy, social influence, performance expectancy, effort expectancy, and behavioral intention in mobile learning service. International Journal of u-and e-Service, Science and Technology, 8(9), 197-206.
Teo, T. (2009). Modelling technology acceptance in education: A study of pre-service teachers. Computers & Education, 52(2), 302-312.
Tayie, S. (2005). Research methods and writing research proposals. Quezon City,Philippines: Pathways to Higher Education.
Thomas, K. W., & Velthouse, B. A. (1990). Cognitive elements of empowerment: An “interpretive” model of intrinsic task motivation. Academy of management review, 15(4), 666-681.
Thompson, R. L., Higgins, C. A., & Howell, J. M. (1991). Personal computing: toward a conceptual model of utilization. MIS quarterly, 125-143.
Toh, C. H. (2013). Assessing adoption of wikis in a Singapore secondary school: Using the UTAUT model. In Educational Media (ICEM), 2013 IEEE 63rd Annual Conference International Council for (pp. 1-9). IEEE.
Thatcher, J. B., et al. (2011). "The role of trust in postadoption IT exploration: An empirical examination of knowledge management systems." IEEE Transactions on Engineering Management 58(1): 56-70.
Venkatesh, V., Morris, M. G., Davis, G. B., & Davis, F. D. (2003). "User acceptance of information technology: Toward a unified view." MIS Quarterly, 27, 425-478.
Van Dyke, T. P., Midha, V., & Nemati, H. (2007). The effect of consumer privacy empowerment on trust and privacy concerns in e‐commerce. Electronic Markets, 17(1), 68-81.
Wang, Y. S. (2003). The adoption of electronic tax filing systems: an empirical study. Government Information Quarterly, 20(4), 333-352.
Weerakkody, V., et al. (2013). "Examining the influence of intermediaries in facilitating e-government adoption: An empirical investigation." International Journal of Information Management 33(5): 716-725.
Walsh, J. P., Kiesler, S., Sproull, L. S., & Hesse, B. W. (1992). Self-selected and randomly selected respondents in a computer network survey. The Public Opinion Quarterly, 56(2), 241-244.
Wu, C.-C., et al. (2014). "Benevolence trust: a key determinant of user continuance use of online social networks." Information Systems and e-Business Management 12(2): 189-211.
Webster, J., & Martocchio, J. J. (1992). Microcomputer playfulness: Development of a measure with workplace implications. MIS quarterly, 201-226.
Yang, H. C. (2013). Bon App?tit for apps: young American consumers' acceptance of mobile applications. Journal of Computer Information Systems, 53(3), 85-96.
Yun, H., et al. (2013). "Understanding the use of location-based service applications: do privacy concerns matter?" Journal of Electronic Commerce Research 14(3): 215.
Zimmerman, M. A., & Warschausky, S. (1998). Empowerment theory for rehabilitation research: Conceptual and methodological issues. Rehabilitation psychology, 43(1), 3.