簡易檢索 / 詳目顯示

研究生: 顧晨禾
Gu, Chen-He
論文名稱: 台灣中小型企業會員經營機制之價值共創商業模式
Value Co-creation Business Model of Taiwan Small-and-Medium Enterprises in E-commerce Membership Operating Mechanism
指導教授: 謝佩璇
Hsieh, Pei-Hsuan
學位類別: 碩士
Master
系所名稱: 管理學院 - 資訊管理研究所
Institute of Information Management
論文出版年: 2017
畢業學年度: 105
語文別: 英文
論文頁數: 141
中文關鍵詞: 電子商務帳號共用價值共創商業模式
外文關鍵詞: E-commerce, Shared-account, Value co-creation, Business model
相關次數: 點閱:67下載:0
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • 隨著Web 2.0網路世代的演進,網路使用者可透過諸多網路應用程式,促進使用者彼此間在網路上的互動,其中最典型的例子為社群網站平台。社群平台的普及化讓愈來愈多電子商務企業,將業務範圍投向社群商務,藉由社群的凝聚力,在平台上廣告行銷,使民眾在廣告吸引下,能連結至企業之網站進行消費。企業為了提升消費者加入網站會員的機會,使用社群平台提供之OAuth 2.0 開放帳號授權登入機制,讓消費者省去帳號註冊的步驟,例如:買家可直接利用Facebook帳號登入成為網站會員進行購物。在帳號共用相關研究中,大多數著重授權技術,以及消費者隱私方面,很少有研究探討關於企業使用帳號共用,讓網路使用者從社群平台快速登入成為公司會員後進行消費,能為彼此帶來什麼共享價值。因此,本研究目的在深入探討電子商務平台、社群網站平台在帳號共用的運作下,企業與平台會員在四個構面下形成的價值以及產生價值共創的經驗。
    根據文獻,價值共創經驗的產生有四個構面:溝通(dialouge)、存取(access)、資料透明度(transparency)及利害關係(risk-benefits),簡稱DART。此外,本研究基於網路外部性理論(network externality)大者恆大之效果,認為社群使用者數量增加可提升企業積極經營電子商務與社群平台,進行廣告與網站連結等行銷策略,消費者在社群平台的購物行為更加促進雙方的價值共創。本研究方法結合企業商業模式的發展,採用質性研究的深度訪談法之半結構式訪談法進行,同時參考脈絡設計(Contextual design)中之「角色互動模型(flow model)」進行。本研究獲得企業以及消費者兩部分之訪談逐字稿,皆進行主軸編碼分析,企業訪談者另外提供商業模式圖,以具體說明使用帳號共用的電子商務、社群網路平台,與會員互動如何產生價值共創的經驗,供本研究進一步分析。最後,本研究獲得企業與以帳號共用方式登入社群平台成為企業會員,所產生的價值共創經驗之互動模型,可依此對各企業行業別,提供建議與未來商業模式的規劃。

    With the evolution of the Web 2.0 network generation, web users can promote the interaction of users across the web through a variety of web applications, the most typical of which is the social community web platform. More and more e-commerce businesses are emerged for the popularity of the social community web platforms. More and more e-commerce businesses thus get extended in their scope to social community businesses. Through the cohesion of the social community, web users are attracted by the advertisements of the social community web platforms to be linked to the websites of the e-commerce businesses for consumption. To increase the opportunities for web users to register to become the members of the e-commerce businesses, an efficient way for enterprises is the use of social community web platforms which provide OAuth 2.0 open account authorization login mechanism. Web users can save time to go through a series of registration steps. For example, buyers can directly login with their Facebook accounts to become the members of the e-commerce businesses for consumption. According to the membership account sharing related research, most focus on licensing technology, as well as consumer privacy; however, there is little research on the shared value produced from the enterprises offering the mechanism of using shared accounts as well as the web users who can efficiently login with their accounts registered before in a social community web platform. Therefore, the purpose of this study is to explore the value emerged from the enterprises offering the mechanism of using shared account for members in their e-commerce websites and social community web platforms, and the web users who later become the business members. Their experiences of co-creating value is also worth of exploration.
    Prior studies indicate the experiences of value co-creation can be produced in four different facets referred to as DART: dialogue, access, transparency, and risk-benefits. In addition, this study is based on the theory of network externalities, i.e., the big one gets bigger, to propose that the value co-creation can be surely produced as the number of social community users are increased, and more and more e-commerce businesses and social community platforms are actively managed to carry out marketing strategies, such as advertisement and website linkage. Enterprises and web users can further co-create value with each other when web users become consumers conducting behaviors of consuming on the social community web platforms. This research method combines the development of enterprise business model to adopt a qualitative approach, i.e., semi-structured interviews for this study conducting the depth of the interview method. Also, this study refers to the "flow model" of the contextual design while conducting the interview. This study obtains the interview transcripts from two parties, enterprise and web users. All the transcripts are analyzed by conducting conceptualization. To be noted, interviewees from the enterprises also provided a business model canvas which helps them concretely explain how their experiences of value co-creation are produced by interacting with their members as the shared accounts are used in the e-commerce businesses and social community web platforms of the enterprises. Finally, this study finalizes the interactive model which depicts the experiences of value co-creation that are produced from enterprises and their members whom login social community web platforms with the method of using shared accounts. The finalized interactive model can also be used to give advices to the enterprises in different businesses sectors for the future business model planning.

    1 Introduction 1 1.1 Research Background and Motivation 1 1.2 Research Purposes and Questions 6 1.3 Research Scope and Limitations 7 1.4 Research Procedures 7 2 Literature Review 9 2.1 Account Registration and Maintenance 9 2.1.1 Open ID Providers and Users 10 2.1.2 Shared Account Platform Providers and users 16 2.1.3 Different Type Membership Management Mechanism of E-commerce 19 2.2 The Value Co-creation of Account Operation Mechanism 24 2.2.1The Meaning of Value Creation 25 2.2.2 Value Co-Creation of Shared Account 27 2.3 Business Model of the Value Co-Creation 32 2.3.1 Dialogue dimension of the business model 37 2.3.2 Access dimension of the business model 39 2.3.3 Risk assessment dimension of the business model 42 2.3.4 Transparency dimension of the business model 45 2.4 Summary 47 3 Research Methodology 49 3.1 Conceptual Framework 49 3.2 Research Participants 52 3.3 Semi-Structured Interview of Qualitative Research 52 3.4 Reliability and Validity of Qualitative Research 57 3.5 Data Collection 58 3.6 Data Analysis 59 4 Research Result 62 4.1 Analysis of coding 63 4.1.1 Open Coding 65 4.1.2 Axial Coding 72 4.2 Flow model modified 76 4.3 Contents of Business interviewing 110 5 Conclusion and Discussion 117 5.1 Covering the Value of Co-Creation of the Business Model Development 117 5.2 Research Contribution 122 5.2.1 Academic Contribution 122 5.2.2 Practical contribution 126 5.3 Improvement of Shared Account Function 130 5.4 Research Restrictions 132 5.5 Future Research Direction 133 References 134 Appendixe1 Business Interview Consent 140 Appendixe2 Consumer Interview Consent 141

    Anderson, E., & Weitz, B. (1989). Determinants of continuity in conventional industrial channel dyads. Marketing science, 8(4), 310-323.
    Annie, A. (2016). App Annie 2015 Retrospective — Monetization Opens New Frontiers. APP Annie. from https://www.appannie.com/cn/insights/market-data/app-annie-2015-retrospective/
    Aulakh, P. S., Kotabe, M., & Sahay, A. (1996). Trust and performance in cross-border marketing partnerships: A behavioral approach. Journal of international business studies, 27(5), 1005-1032.
    Ballantyne, D., Frow, P., Varey, R. J., & Payne, A. (2011). Value propositions as communication practice: Taking a wider view. Industrial Marketing Management, 40(2), 202-210.
    Bartlett, C., & Ghoshal, S. (1989). The transnational corporation. New York.
    Bazeley, P., & Jackson, K. (2007). Qualitative data analysis using NVivo: Sage Publication Ltd, London.
    Bleeke, J., & Ernst, D. (1993). Collaborating to compete: using strategic alliances and acquisitions in the global marketplace.
    Botosan, C. A. (1997). Disclosure level and the cost of equity capital. Accounting review, 323-349.
    Boulton, R., Libert, B., & Samek, S. M. (2000). Cracking the Value Code: How successful businesses are creating wealth in the New Economy: HarperBusiness New York, NY.
    Brabham, D. C. (2008). Crowdsourcing as a model for problem solving an introduction and cases. Convergence: the international journal of research into new media technologies, 14(1), 75-90.
    Byard, D., & Shaw, K. W. (2003). Corporate disclosure quality and properties of analysts' information environment. Journal of Accounting, Auditing & Finance, 18(3), 355-378.
    Carminati, B., Ferrari, E., & Perego, A. (2006). Rule-based access control for social networks. Paper presented at the OTM Confederated International Conferences" On the Move to Meaningful Internet Systems".
    Chen, M.-J., & Hambrick, D. C. (1995). Speed, stealth, and selective attack: How small firms differ from large firms in competitive behavior. Academy of management journal, 38(2), 453-482.
    Chesbrough, H., & Schwartz, K. (2007). Innovating business models with co-development partnerships. Research-Technology Management, 50(1), 55-59.
    Chiang, H.-t. (2005). Analyst's financial forecast accuracy and corporate transparency. Paper presented at the Allied Academies International Conference. Academy of Accounting and Financial Studies. Proceedings.
    Cooper, B. F., Baldeschwieler, E., Fonseca, R., Kistler, J. J., Narayan, P., Neerdaels, C., . . . Srivastava, U. (2009). Building a cloud for yahoo! IEEE Data Eng. Bull., 32(1), 36-43.
    Coviello, N. E., Brodie, R. J., & Munro, H. J. (2000). An investigation of marketing practice by firm size. Journal of business venturing, 15(5), 523-545.
    Crook, T. R., Todd, S. Y., Combs, J. G., Woehr, D. J., & Ketchen Jr, D. J. (2011). Does human capital matter? A meta-analysis of the relationship between human capital and firm performance. Journal of applied psychology, 96(3), 443.
    Das, T., & Teng, B.-S. (2001). Relational risk and its personal correlates in strategic alliances. Journal of Business and Psychology, 15(3), 449-465.
    Dyer, J. H., & Singh, H. (1998). The relational view: Cooperative strategy and sources of interorganizational competitive advantage. Academy of management review, 23(4), 660-679.
    Ettlie, J. E., & Rubenstein, A. H. (1987). Firm size and product innovation. Journal of Product Innovation Management, 4(2), 89-108.
    Fang, Y.-H. (2012). Does online interactivity matter? Exploring the role of interactivity strategies in consumer decision making. Computers in human behavior, 28(5), 1790-1804.
    Fiegenbaum, A., & Karnani, A. (1991). Output flexibility—a competitive advantage for small firms. Strategic management journal, 12(2), 101-114.
    Florencio, D., & Herley, C. (2007). A large-scale study of web password habits. Paper presented at the Proceedings of the 16th international conference on World Wide Web.
    Friesike, S. (2011). Profiting from innovation by managing intellectual property. University of St. Gallen.
    Glässer, U., & Vajihollahi, M. (2010). Identity management architecture Security Informatics (pp. 97-116): Springer.
    Goldfinger, C. (1997). Intangible economy and its implications for statistics and statisticians. International Statistical Review, 65(2), 191-220.
    Gompers, P., Ishii, J., & Metrick, A. (2003). Corporate governance and equity prices. The quarterly journal of economics, 118(1), 107-156.
    Gopalakrishnan, A. (2009). Cloud computing identity management. SETLabs briefings, 7(7), 45-55.
    Grönroos, C. (2011). Value co-creation in service logic: A critical analysis. Marketing theory, 11(3), 279-301.
    Hallsteinsen, S., & Jorstad, I. (2007). Using the mobile phone as a security token for unified authentication. Paper presented at the 2007 Second International Conference on Systems and Networks Communications (ICSNC 2007).
    Hammer-Lahav, E., Recordon, D., & Hardt, D. (2011). The OAuth 2.0 authorization protocol. Network Working Group Internet-Draft.
    Hartley, J. (2004). The ‘value chain of meaning’and the new economy. International journal of cultural studies, 7(1), 129-141.
    Healey, K., & Webster-Mannison, M. (2012). Exploring the influence of qualitative factors on the thermal comfort of office occupants. Architectural Science Review, 55(3), 169-175.
    Helm, S. (2000). Viral marketing-establishing customer relationships by'word-of-mouse'. Electronic markets, 10(3), 158-161.
    Johnson, G., Scholes, K., & Whittington, R. (2008). Exploring corporate strategy: Text and cases: Pearson Education.
    Johnson, M. W., Christensen, C. M., & Kagermann, H. (2008). Reinventing your business model. Harvard business review, 86(12), 57-68.
    Jones, M., & Hardt, D. (2012). The oauth 2.0 authorization framework: Bearer token usage.
    Kaila, P. (2008). Oauth and openid 2.0. From End-to-End to Trust-to-Trust, 18, 18-22.
    Kaplan, R. S., & Norton, D. P. (2001). The strategy-focused organization: How balanced scorecard companies thrive in the new business environment: Harvard Business Press.
    Katz, M. L., & Shapiro, C. (1985). Network externalities, competition, and compatibility. The American economic review, 75(3), 424-440.
    Katz, M. L., & Shapiro, C. (1994). Systems competition and network effects. The journal of economic perspectives, 8(2), 93-115.
    Kucita, P., Kivunja, C., Maxwell, T., & Kuyini, B. (2013). Bhutanese stakeholders’ perceptions about multi-grade teaching as a strategy for achieving quality universal primary education. International Journal of Educational Development, 33(2), 206-212.
    Labrecque, L. I. (2014). Fostering consumer–brand relationships in social media environments: The role of parasocial interaction. Journal of Interactive Marketing, 28(2), 134-148.
    Le He, J., Xia, L. Q., Lundeen, A. J., & Subotic, D. (2015). Single Sign-On without a Broker Application: Google Patents.
    Lee, J.-N., & Kim, Y.-G. (1999). Effect of partnership quality on IS outsourcing success: conceptual framework and empirical validation. Journal of Management information systems, 15(4), 29-61.
    Leiba, B. (2012). Oauth web authorization protocol. IEEE Internet Computing, 16(1), 74.
    Magretta, J. (2013). Understanding Michael Porter: The essential guide to competition and strategy: Harvard business press.
    Maines, L. A., Bartov, E., Fairfield, P. M., Hirst, D. E., Iannaconi, T. A., Mallett, R., . . . Vincent, L. (2003). Implications of accounting research for the FASB's initiatives on disclosure of information about intangible assets. Accounting Horizons, 17(2), 175-185.
    Maler, E., & Reed, D. (2008). The Venn of identity. IEEE Security and Privacy, 6(2), 16-23.
    McAdam, R., Armstrong, G., & Kelly, B. (1998). Investigation of the relationship between total quality and innovation: a research study involving small organisations. European Journal of Innovation Management, 1(3), 139-147.
    Mun, Y. Y., Yoon, J. J., Davis, J. M., & Lee, T. (2013). Untangling the antecedents of initial trust in Web-based health information: The roles of argument quality, source expertise, and user perceptions of information quality and risk. Decision Support Systems, 55(1), 284-295.
    Nielsen, J. (2012). How many test users in a usability study. Nielsen Norman Group, 4.
    Oh, H.-K., & Jin, S.-H. (2008). The security limitations of sso in openid. Paper presented at the Advanced Communication Technology, 2008. ICACT 2008. 10th International Conference on.
    Osterwalder, A., & Pigneur, Y. (2010). Business model generation: a handbook for visionaries, game changers, and challengers: John Wiley & Sons.
    Osterwalder, A., Pigneur, Y., Oliveira, M. A.-Y., & Ferreira, J. J. P. (2011). Business Model Generation: A handbook for visionaries, game changers and challengers. African Journal of Business Management, 5(7), 8918-8932.
    Patton, M. Q. (1990). Qualitative evaluation and research methods: SAGE Publications, inc.
    Pels, J., Storbacka, K., & Nenonen, S. (2009). Customer relationships and the heterogeneity of firm performance. Journal of Business & Industrial Marketing, 24(5/6), 360-372.
    Potts, J., Hartley, J., Banks, J., Burgess, J., Cobcroft, R., Cunningham, S., & Montgomery, L. (2008). Consumer Co‐creation and Situated Creativity. Industry and Innovation, 15(5), 459-474.
    Prahalad, C. K., & Ramaswamy, V. (2000). Co-opting customer competence. Harvard business review, 78(1), 79-90.
    Prahalad, C. K., & Ramaswamy, V. (2003). The new frontier of experience innovation. MIT Sloan management review, 44(4), 12-18.
    Prahalad, C. K., & Ramaswamy, V. (2004). Co‐creation experiences: The next practice in value creation. Journal of interactive marketing, 18(3), 5-14.
    Recordon, D., & Reed, D. (2006). OpenID 2.0: a platform for user-centric identity management. Paper presented at the Proceedings of the second ACM workshop on Digital identity management.
    Ryan, G. W., Bernard, H. R., Denzin, N., & Lincoln, Y. (2000). Handbook of qualitative research. Handbook of qualitative research.
    Saffer, A. J., Sommerfeldt, E. J., & Taylor, M. (2013). The effects of organizational Twitter interactivity on organization–public relationships. Public Relations Review, 39(3), 213-215.
    Schafer, J. B., Konstan, J. A., & Riedl, J. (2001). E-commerce recommendation applications Applications of Data Mining to Electronic Commerce (pp. 115-153): Springer.
    Schwandt, T. A., Lincoln, Y. S., & Guba, E. G. (2007). Judging interpretations: But is it rigorous? Trustworthiness and authenticity in naturalistic evaluation. New directions for evaluation, 2007(114), 11-25.
    Searles, D., Locke, C., Levine, R., & Weinberger, D. (2001). The Cluetrain Manifesto: The end of business as usual: Perseus Publishing, Cambridge, MA.
    Shamdasani, P. N., & Sheth, J. N. (1995). An experimental approach to investigating satisfaction and continuity in marketing alliances. European Journal of Marketing, 29(4), 6-23.
    Shy, O. (1996). Technology revolutions in the presence of network externalities. International Journal of Industrial Organization, 14(6), 785-800.
    Silverman, D. (2000). Analyzing talk and text. Handbook of qualitative research, 2(0), 821-834.
    Statista. (2016a). Number of monthly active Facebook users worldwide as of 3rd quarter 2016 (in millions). Statista. from https://www.statista.com/statistics/327292/number-of-monthly-active-line-app-users/
    Statista. (2016b). Number of monthly active LINE users worldwide as of 3rd quarter Statista. from https://www.statista.com/statistics/327292/number-of-monthly-active-line-app-users/
    Strauss, A. L. (1987). Qualitative analysis for social scientists: Cambridge University Press.
    Streeck, W., Grote, J. R., Schneider, V., & Visser, J. (2006). Governing interests: business associations facing internationalization: Routledge.
    Sun, S.-T., Pospisil, E., Muslukhov, I., Dindar, N., Hawkey, K., & Beznosov, K. (2011). What makes users refuse web single sign-on?: an empirical investigation of OpenID. Paper presented at the Proceedings of the Seventh Symposium on Usable Privacy and Security.
    Terblanche, N. S. (2014). Some theoretical perspectives of co-creation and co-production of value by customers. Acta Commercii, 14(2), 8 pages.
    Timmers, P. (1998). Business models for electronic markets. Electronic markets, 8(2), 3-8.
    Uolevi, L., & Lehtinen, J. (1982). Service quality: A study of quality dimensions. Unpublished Working Paper, Helsinki: Service Management Institute, Finland OY.
    Uzzi, B. (1996). The sources and consequences of embeddedness for the economic performance of organizations: The network effect. American sociological review, 674-698.
    Van Dijk, J. A. (2006). Digital divide research, achievements and shortcomings. Poetics, 34(4), 221-235.
    Vepsäläinen, A. (2016). Application security: In Android application development.
    Voelpel, S. C., & Han, Z. (2005). Managing knowledge sharing in China: the case of Siemens ShareNet. Journal of Knowledge management, 9(3), 51-63.
    Wang, H.-C., & Doong, H.-S. (2010). Argument form and spokesperson type: The recommendation strategy of virtual salespersons. International journal of information management, 30(6), 493-501.
    Zhu, F., & Liu, Q. (2016). Competing with Complementors: An Empirical Look at Amazon. com. Harvard Business School Technology & Operations Mgt. Unit Working Paper(15-044).
    王文科. (2000). 質的研究的問題與趨勢. 質的研究方法. 高雄: 麗文文化公司.
    胡自立. (2013). 台灣消費者網路商店資安經驗調查研究分析. 資訊安全通訊, 19(2), 24-39.
    戚栩僊. (2010). 社群網站使用與社群媒體行銷使用者反應-以《 Facebook》 廣告與虛擬品牌社群為例. 陳儒修 (主持人), 數位影音與行銷溝通.
    畢恆達. (1996). 詮釋學與質性研究. 台北: 巨流.
    陳向明. (2002). 社会科學質的硏究: 五南圖書出版股份有限公司.
    曾文瑞, 桑國忠, & 張靜怡. (2009). 台灣地區海運承攬運送業經營風險管理之研究.
    黃光玉, 劉念夏, & 陳清文. (2004). 媒介與傳播研究方法: 質化與量化研究途徑. 台北: 風雲論壇.
    資策會. (2015). 電子商務產業回顧與展望,資策會(MIC)AISP情報顧問服務資料庫. 資策會 from http://mic.iii.org.tw/aisp/
    數位時代. (2015). 2015《數位時代》網路人氣賣家榜單公布. 數位時代. from http://www.bnext.com.tw/index.php/article/37527/BN-2015-10-01-113514-143
    鄭惠之. (2015). 透明度與企業價值. 會計研究月刊(350), 11-11.
    盧懿娟. (2014). 專家談服務創新模式(下):5個創新服務的實際案例. 數位時代. from http://www.bnext.com.tw/ext_rss/view/id/646449
    錢芸霞. (2010). 數位潮流的下一個行銷思維: 數位行銷.

    無法下載圖示 校內:2024-09-01公開
    校外:不公開
    電子論文尚未授權公開,紙本請查館藏目錄
    QR CODE