| 研究生: |
黃俊文 Huang, Chun-Wen |
|---|---|
| 論文名稱: |
企業對『雲端應用與資安管理』採『雲端服務委外合作模式』關鍵因素之研究 The key factor of Enterprise for outsourcing cooperation by “Cloud Service” about cloud application & information security management |
| 指導教授: |
蔡明田
Tsai, Ming-Tien |
| 共同指導教授: |
蔡惠婷
Tsai, Huei-Ting |
| 學位類別: |
碩士 Master |
| 系所名稱: |
管理學院 - 高階管理碩士在職專班(EMBA) Executive Master of Business Administration (EMBA) |
| 論文出版年: | 2014 |
| 畢業學年度: | 102 |
| 語文別: | 中文 |
| 論文頁數: | 80 |
| 中文關鍵詞: | 雲端應用 、資安管理 、委外合作 、理性行為理論 、科技接受模式 |
| 外文關鍵詞: | Cloud Application, Information Security, Outsourcing Cooperation, TAM, TRA |
| 相關次數: | 點閱:138 下載:14 |
| 分享至: |
| 查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報 |
摘要
『雲端應用與資安管理』在這幾年成為社會顯學,不僅各行各業爭相探討其對企業營運競爭力與風險的影響,而且同時也考量透過『委外合作』,以降低整體營運成本與風險,進而提升企業在資訊應用的競爭力以及資安管理的安全性。
本研究採用理性行為理論與科技接受模式的架構,來探討『認知有用性』、『認知易用性』、『安全信任』、『使用態度』、『主觀規範』、『採用意圖』等因素是否為企業對雲端應用與資安管理採委外合作模式的關鍵考量。
本研究採抽樣問卷方式,調查台北內湖科學園區、南港軟體園區,台中科學園區,台南科技工業區、台南科學園區等企業的業主、經理人、資訊或管理或財務等部門主管,以及一般使用資訊與資安系統的員工。採用網路與紙本問卷並行發放。
最後本研究的結論歸納如下:
1. 『安全信任』對雲端服務委外合作『認知有用性』具有正向影響。
2. 『認知有用性』對雲端服務委外合作『採用意圖』具有正向影響。
3. 『認知有用性』對雲端服務委外合作『使用態度』具有正向影響。
4. 『認知易用性』對雲端服務委外合作『使用態度』具有正向影響。
5. 『安全信任』對雲端服務委外合作『主觀規範』具有正向影響。
6. 『主觀規範』對雲端服務委外合作『使用態度』具有正向的影響。
7. 『使用態度』對雲端服務委外合作『採用意圖』具有正向的影響。
8. 『主觀規範』對雲端服務委外合作『採用意圖』具有正向的影響。
SUMMARY
This research uses TRA and TAM as structure to examine that whether perceived usefulness, perceived ease of use, security and trust, attitude, subjective norm and intention to use have impact on company’s intention to outsource cloud application and information security. This research distributed hand-write and online questionnaires to participants. Collected data were analyzed by SPSS. After analysis, we get the conclusion as follows. ”Security and trust” is positively related to “perceived usefulness”. “Perceived usefulness” is positively related to ”intention to use”. “Perceived usefulness” is positively related to ”attitude”. ”Perceived ease of use” is positively related to ”attitude”.”Security and trust” is positively related to ”subjective norm”. ”Subjective norm” is positively related to ”attitude”. ”Attitude” is positively related to ”intention to use”. “Subjective norm” is positively related to ”intention to use”.
Key words: Cloud Application, Information Security, Outsourcing Cooperation, TAM, TRA
INTRODUCITON
Cloud application and information security have drawn many attentions. Many companies do researches about cloud application and information security’s influence on companies’ operating competition and risks. Meanwhile, they also consider outsourcing to lower cost and risk as well. This way, they could also make technology application more competitive and enhance information security management. Despite the fact that cloud application and information security system can raise company’s competitiveness, there are just a small number of corporations adopt cloud application and information security system. Therefore, this study wants to find out the the key factor of enterprise for outsourcing cooperation by “cloud service” about cloud application and information security management.
This research uses TRA and TAM as structure to examine that whether perceived usefulness, perceived ease of use, security and trust, attitude, subjective norm and intention to use have impact on company’s intention to outsource cloud application and information security. This research distributed hand-write and online questionnaires to participants. Collected data were analyzed by SPSS. We conduct factor analysis, descriptive statistical analysis, validity analysis and SEM. The results show that ”Security and trust” is positively related to “perceived usefulness”; “Perceived usefulness” is positively related to ”intention to use”; “Perceived usefulness” is positively related to ”attitude”; ”Perceived ease of use” is positively related to ”attitude”; ”Security and trust” is positively related to ”subjective norm”; ”Subjective norm” is positively related to ”attitude”; ”Attitude” is positively related to ”intention to use” and “Subjective norm” is positively related to ”intention to use”.
Finally, we get the conclusion that perceived usefulness, perceived ease of use, security and trust, attitude, subjective norm and intention to use have impact on company’s intention to outsource cloud application and information security.
MATERIALS AND METHODS
This research uses TRA and TAM as structure to examine that whether perceived usefulness, perceived ease of use, security and trust, attitude, subjective norm and intention to use have impact on company’s intention to outsource cloud application and information security. TRA and TAM are adopted widely in lots of domestic and abroad researches. Therefore, TRA and TAM could be the main structure in this study. As for questionnaires, we use items from previous studies that already had been examined and proved. We also conduct pre-test to make sure the validity and reliability of each item. Formal hand-write and online questionnaires were distributed to company owners, department managers and general staff who work in Science Park, Software Park and Industry Park in Taiwan then.
Collected data were analyzed by SPSS. We conduct factor analysis, descriptive statistical analysis, validity analysis and SEM.
RESULTS AND DISCUSSION
This research distributed hand-write and online questionnaires to participants. Collected data were analyzed by SPSS. After analysis, we get the conclusion as follows. ”Security and trust” is positively related to “perceived usefulness”. “Perceived usefulness” is positively related to ”intention to use”. “Perceived usefulness” is positively related to ”attitude”. ”Perceived ease of use” is positively related to ”attitude”.”Security and trust” is positively related to ”subjective norm”. ”Subjective norm” is positively related to ”attitude”. ”Attitude” is positively related to ”intention to use”. “Subjective norm” is positively related to ”intention to use”.
Table 4-24:Summary Of Regression Analysis Of Hypotheses
Hypotheses Results
H1:”Security and trust” is positively related to “perceived usefulness”. Support
H2:“Perceived usefulness” is positively related to ”intention to use”. Support
H3:“Perceived usefulness” is positively related to ”attitude”. Support
H4:”Perceived ease of use” is positively related to ”attitude”. Support
H5:”Security and trust” is positively related to ”subjective norm”. Support
H6:”Subjective norm” is positively related to ”attitude”. Support
H7:”Attitude” is positively related to ”intention to use”. Support
H8:“Subjective norm” is positively related to ”intention to use”. Support
CONCLUSION
From the results gathered by analysis, we get the conclusion that perceived usefulness, perceived ease of use, security and trust, attitude, subjective norm and intention to use have impact on company’s intention to outsource cloud application and information security. Cloud application and information security system can raise company’s competitiveness; however, build and maintain cloud application and information security system may be a problem to some small companies. This way, outsourcing cloud application and information security system may be a better way to them. The results of this research can provide a clear view to the key factors that affect companies’ intention to outsourcing.
The sample of this research is from every kind of job, so the results may be different. It depends on what kinf of sample we use. As a result, we suggest that future studies can compare the difference between different samples. This research take TRA and TAM as structure, we suggest that future researches can adopt different structure to find the The key factor of Enterprise for outsourcing cooperation by “Cloud Service” about cloud application & information security management.
(一) 李婉怡、趙珮如(2004),醫療產業員工對電子病歷之科技接受模式探討 – 以中南部地區為例,醫務管理期刊,第5卷第2期,頁243-269。
(二) 余泰魁、吳桂森、李能慧(2005),我國技職體系學生MP3使用行為模式之研究,資訊管理學報,12(3),頁189-222。
(三) 余泰魁、楊淑斐(2005),線上學習系統使用意向之模式建構與比較分析研究,台灣管理學刊,5(2),頁311-337。
(四) 余哲維(2006)。以科技接受模型探討企業員工的學習動機對線上學習滿意度之影響。中華大學經營管理研究所碩士論文。
(五) 余鑑、于俊傑、余采芳(2011),數位學習知覺與採用意圖間影響之研究,電子商務研究,第9卷第3期,頁323-352。
(六) 林文寶、楊淑斐(2005),影響線上學習市場使用意向模式建構之研究 - 模糊類神經網路方法之應用,中山管理評論,第13卷第2期,頁721-748。
(七) 柯孫超(2009),整合TAM與TRA理論探討消費者對綠建築接受態度之研究,成功大學高階管理碩士在職專班碩士論文。
(八) 吳萬益(2011),企業研究方法,華泰文化。
(九) 高玉芬、邱雅萍(2008)。以科技接受模式探討線上學習系統之使用意願:以網路大學為例。萬能商學學報,13,頁83-102。
(十) 楊書銘(2001)。強制垃圾分類政策對民眾資源回收行為之影響評估。中山大學碩博士論文。
(十一) 曾上亭(2003),科技接受模式在線上學習行為之分析以兩岸資訊從業人員為比較對象,私立中國文化大學資訊管理研究所碩士論文。
(十二) 張紹勳(2002),兩性採用資訊科技的徑路比較,管理評論,第21卷第4期,頁19-45。
(十三) 葉賀勤(2012),以科技接受模型探討消費者之網路銀行採用意圖,成功大學企業管理碩士所碩士論文。
(十四) 鄭明(2012),顧客關係、分享價值、關係承諾、信任、顧客滿意度與顧客忠誠度影響關係研究-以台灣汽車零配件業為例,成功大學高階管理碩士在職專班碩士論文。
(十五) 盧希鵬、林泓君、林娟娟(2003),電子商務人員生涯抉擇之探討,管理評論,第22卷第2期,頁111-129。
(十六) 蕭銘雄、鄭曉平(2008),以延伸式科技接受模型探討消費者線上投保人壽保險之意願,電子商務學報,第10卷第1期,頁1-26。
(十七) 檔案管理局網站(www.archives.gov.tw) :TAM、TRA
1. http://wiki.archives.gov.tw/index.php?option=com_content&view=article&id=972&Itemid=108
二、 英文部分:
(一) Ajzen, I. (1985), From Intentions to Actions: A Theory of Planned Behavior, Action-Control: From Cognition to Behavior, Heidelberg: Springer.
(二) Ajzen, I. (2002), Perceived Behavioral Control, Self-Efficacy, Locus of Control, and the Theory of Planned Behavior, Journal of Applied Social Psychology, 32, 665-683.
(三) BSI http://www.bsigroup.com/en-GB/iso-27001-information-security/
(四) Davis, F. D. (1989), Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology, MIS Quarterly, 13(3), 318-339.
(五) Fishbein, M. & Ajzen, I. (1975), Belief, Attitude, Intention, and Behavior: An Introduction to Theory and Research, MA: Addison-Wesley.
(六) Lee, J .S., Cho, H., Gay, G, Davidson, B., and Ingraffea, A. (2003). Technology Acceptallce and Social Networking ill Distallce Leaming. Educational Technology & Society, 6(2), 50-61.