簡易檢索 / 詳目顯示

研究生: 黃俊文
Huang, Chun-Wen
論文名稱: 企業對『雲端應用與資安管理』採『雲端服務委外合作模式』關鍵因素之研究
The key factor of Enterprise for outsourcing cooperation by “Cloud Service” about cloud application & information security management
指導教授: 蔡明田
Tsai, Ming-Tien
共同指導教授: 蔡惠婷
Tsai, Huei-Ting
學位類別: 碩士
Master
系所名稱: 管理學院 - 高階管理碩士在職專班(EMBA)
Executive Master of Business Administration (EMBA)
論文出版年: 2014
畢業學年度: 102
語文別: 中文
論文頁數: 80
中文關鍵詞: 雲端應用資安管理委外合作理性行為理論科技接受模式
外文關鍵詞: Cloud Application, Information Security, Outsourcing Cooperation, TAM, TRA
相關次數: 點閱:138下載:14
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • 摘要
    『雲端應用與資安管理』在這幾年成為社會顯學,不僅各行各業爭相探討其對企業營運競爭力與風險的影響,而且同時也考量透過『委外合作』,以降低整體營運成本與風險,進而提升企業在資訊應用的競爭力以及資安管理的安全性。
    本研究採用理性行為理論與科技接受模式的架構,來探討『認知有用性』、『認知易用性』、『安全信任』、『使用態度』、『主觀規範』、『採用意圖』等因素是否為企業對雲端應用與資安管理採委外合作模式的關鍵考量。
    本研究採抽樣問卷方式,調查台北內湖科學園區、南港軟體園區,台中科學園區,台南科技工業區、台南科學園區等企業的業主、經理人、資訊或管理或財務等部門主管,以及一般使用資訊與資安系統的員工。採用網路與紙本問卷並行發放。
    最後本研究的結論歸納如下:
    1. 『安全信任』對雲端服務委外合作『認知有用性』具有正向影響。
    2. 『認知有用性』對雲端服務委外合作『採用意圖』具有正向影響。
    3. 『認知有用性』對雲端服務委外合作『使用態度』具有正向影響。
    4. 『認知易用性』對雲端服務委外合作『使用態度』具有正向影響。
    5. 『安全信任』對雲端服務委外合作『主觀規範』具有正向影響。
    6. 『主觀規範』對雲端服務委外合作『使用態度』具有正向的影響。
    7. 『使用態度』對雲端服務委外合作『採用意圖』具有正向的影響。
    8. 『主觀規範』對雲端服務委外合作『採用意圖』具有正向的影響。

    SUMMARY

    This research uses TRA and TAM as structure to examine that whether perceived usefulness, perceived ease of use, security and trust, attitude, subjective norm and intention to use have impact on company’s intention to outsource cloud application and information security. This research distributed hand-write and online questionnaires to participants. Collected data were analyzed by SPSS. After analysis, we get the conclusion as follows. ”Security and trust” is positively related to “perceived usefulness”. “Perceived usefulness” is positively related to ”intention to use”. “Perceived usefulness” is positively related to ”attitude”. ”Perceived ease of use” is positively related to ”attitude”.”Security and trust” is positively related to ”subjective norm”. ”Subjective norm” is positively related to ”attitude”. ”Attitude” is positively related to ”intention to use”. “Subjective norm” is positively related to ”intention to use”.

    Key words: Cloud Application, Information Security, Outsourcing Cooperation, TAM, TRA
    INTRODUCITON
    Cloud application and information security have drawn many attentions. Many companies do researches about cloud application and information security’s influence on companies’ operating competition and risks. Meanwhile, they also consider outsourcing to lower cost and risk as well. This way, they could also make technology application more competitive and enhance information security management. Despite the fact that cloud application and information security system can raise company’s competitiveness, there are just a small number of corporations adopt cloud application and information security system. Therefore, this study wants to find out the the key factor of enterprise for outsourcing cooperation by “cloud service” about cloud application and information security management.
    This research uses TRA and TAM as structure to examine that whether perceived usefulness, perceived ease of use, security and trust, attitude, subjective norm and intention to use have impact on company’s intention to outsource cloud application and information security. This research distributed hand-write and online questionnaires to participants. Collected data were analyzed by SPSS. We conduct factor analysis, descriptive statistical analysis, validity analysis and SEM. The results show that ”Security and trust” is positively related to “perceived usefulness”; “Perceived usefulness” is positively related to ”intention to use”; “Perceived usefulness” is positively related to ”attitude”; ”Perceived ease of use” is positively related to ”attitude”; ”Security and trust” is positively related to ”subjective norm”; ”Subjective norm” is positively related to ”attitude”; ”Attitude” is positively related to ”intention to use” and “Subjective norm” is positively related to ”intention to use”.
    Finally, we get the conclusion that perceived usefulness, perceived ease of use, security and trust, attitude, subjective norm and intention to use have impact on company’s intention to outsource cloud application and information security.

    MATERIALS AND METHODS
    This research uses TRA and TAM as structure to examine that whether perceived usefulness, perceived ease of use, security and trust, attitude, subjective norm and intention to use have impact on company’s intention to outsource cloud application and information security. TRA and TAM are adopted widely in lots of domestic and abroad researches. Therefore, TRA and TAM could be the main structure in this study. As for questionnaires, we use items from previous studies that already had been examined and proved. We also conduct pre-test to make sure the validity and reliability of each item. Formal hand-write and online questionnaires were distributed to company owners, department managers and general staff who work in Science Park, Software Park and Industry Park in Taiwan then.
    Collected data were analyzed by SPSS. We conduct factor analysis, descriptive statistical analysis, validity analysis and SEM.

    RESULTS AND DISCUSSION
    This research distributed hand-write and online questionnaires to participants. Collected data were analyzed by SPSS. After analysis, we get the conclusion as follows. ”Security and trust” is positively related to “perceived usefulness”. “Perceived usefulness” is positively related to ”intention to use”. “Perceived usefulness” is positively related to ”attitude”. ”Perceived ease of use” is positively related to ”attitude”.”Security and trust” is positively related to ”subjective norm”. ”Subjective norm” is positively related to ”attitude”. ”Attitude” is positively related to ”intention to use”. “Subjective norm” is positively related to ”intention to use”.

    Table 4-24:Summary Of Regression Analysis Of Hypotheses
    Hypotheses Results
    H1:”Security and trust” is positively related to “perceived usefulness”. Support
    H2:“Perceived usefulness” is positively related to ”intention to use”. Support
    H3:“Perceived usefulness” is positively related to ”attitude”. Support
    H4:”Perceived ease of use” is positively related to ”attitude”. Support
    H5:”Security and trust” is positively related to ”subjective norm”. Support
    H6:”Subjective norm” is positively related to ”attitude”. Support
    H7:”Attitude” is positively related to ”intention to use”. Support
    H8:“Subjective norm” is positively related to ”intention to use”. Support

    CONCLUSION
    From the results gathered by analysis, we get the conclusion that perceived usefulness, perceived ease of use, security and trust, attitude, subjective norm and intention to use have impact on company’s intention to outsource cloud application and information security. Cloud application and information security system can raise company’s competitiveness; however, build and maintain cloud application and information security system may be a problem to some small companies. This way, outsourcing cloud application and information security system may be a better way to them. The results of this research can provide a clear view to the key factors that affect companies’ intention to outsourcing.
    The sample of this research is from every kind of job, so the results may be different. It depends on what kinf of sample we use. As a result, we suggest that future studies can compare the difference between different samples. This research take TRA and TAM as structure, we suggest that future researches can adopt different structure to find the The key factor of Enterprise for outsourcing cooperation by “Cloud Service” about cloud application & information security management.

    目錄 第壹章 緒論 1 第一節 研究基礎 1 第二節 研究背景 1 第三節 研究動機與目的 4 第四節 研究範圍 4 第五節 研究流程 5 第貳章 文獻探討 6 第一節 雲端服務的實務經歷 6 第二節 資訊安全的定義與管理 7 第三節 理性行為理論(TRA) 8 第四節 科技接受模式(TAM) 11 第五節 本研究各構面之關係討論 15 第參章 研究方法 20 第一節 說明: 20 第二節 研究架構 20 第三節 各構面之操作型定義與衡量 21 第四節 問卷設計與研究對象 29 第五節 資料分析方法 30 第肆章 資料分析 32 第一節 樣本結構分析 32 第二節 各構面敘述性統計分析 35 第三節 因素分析與信度分析 41 第四節 效度分析 48 第五節 Pearson 相關分析 49 第六節 迴歸分析 52 第七節 差異性分析 59 第伍章 結論與建議 65 第一節 研究結論 65 第二節 後續研究者建議 68 第陸章 參考文獻 70 附錄:研究問卷 73

    (一) 李婉怡、趙珮如(2004),醫療產業員工對電子病歷之科技接受模式探討 – 以中南部地區為例,醫務管理期刊,第5卷第2期,頁243-269。
    (二) 余泰魁、吳桂森、李能慧(2005),我國技職體系學生MP3使用行為模式之研究,資訊管理學報,12(3),頁189-222。
    (三) 余泰魁、楊淑斐(2005),線上學習系統使用意向之模式建構與比較分析研究,台灣管理學刊,5(2),頁311-337。
    (四) 余哲維(2006)。以科技接受模型探討企業員工的學習動機對線上學習滿意度之影響。中華大學經營管理研究所碩士論文。
    (五) 余鑑、于俊傑、余采芳(2011),數位學習知覺與採用意圖間影響之研究,電子商務研究,第9卷第3期,頁323-352。
    (六) 林文寶、楊淑斐(2005),影響線上學習市場使用意向模式建構之研究 - 模糊類神經網路方法之應用,中山管理評論,第13卷第2期,頁721-748。
    (七) 柯孫超(2009),整合TAM與TRA理論探討消費者對綠建築接受態度之研究,成功大學高階管理碩士在職專班碩士論文。
    (八) 吳萬益(2011),企業研究方法,華泰文化。
    (九) 高玉芬、邱雅萍(2008)。以科技接受模式探討線上學習系統之使用意願:以網路大學為例。萬能商學學報,13,頁83-102。
    (十) 楊書銘(2001)。強制垃圾分類政策對民眾資源回收行為之影響評估。中山大學碩博士論文。
    (十一) 曾上亭(2003),科技接受模式在線上學習行為之分析以兩岸資訊從業人員為比較對象,私立中國文化大學資訊管理研究所碩士論文。
    (十二) 張紹勳(2002),兩性採用資訊科技的徑路比較,管理評論,第21卷第4期,頁19-45。
    (十三) 葉賀勤(2012),以科技接受模型探討消費者之網路銀行採用意圖,成功大學企業管理碩士所碩士論文。
    (十四) 鄭明(2012),顧客關係、分享價值、關係承諾、信任、顧客滿意度與顧客忠誠度影響關係研究-以台灣汽車零配件業為例,成功大學高階管理碩士在職專班碩士論文。
    (十五) 盧希鵬、林泓君、林娟娟(2003),電子商務人員生涯抉擇之探討,管理評論,第22卷第2期,頁111-129。
    (十六) 蕭銘雄、鄭曉平(2008),以延伸式科技接受模型探討消費者線上投保人壽保險之意願,電子商務學報,第10卷第1期,頁1-26。
    (十七) 檔案管理局網站(www.archives.gov.tw) :TAM、TRA
    1. http://wiki.archives.gov.tw/index.php?option=com_content&view=article&id=972&Itemid=108

    二、 英文部分:
    (一) Ajzen, I. (1985), From Intentions to Actions: A Theory of Planned Behavior, Action-Control: From Cognition to Behavior, Heidelberg: Springer.
    (二) Ajzen, I. (2002), Perceived Behavioral Control, Self-Efficacy, Locus of Control, and the Theory of Planned Behavior, Journal of Applied Social Psychology, 32, 665-683.
    (三) BSI http://www.bsigroup.com/en-GB/iso-27001-information-security/
    (四) Davis, F. D. (1989), Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology, MIS Quarterly, 13(3), 318-339.
    (五) Fishbein, M. & Ajzen, I. (1975), Belief, Attitude, Intention, and Behavior: An Introduction to Theory and Research, MA: Addison-Wesley.
    (六) Lee, J .S., Cho, H., Gay, G, Davidson, B., and Ingraffea, A. (2003). Technology Acceptallce and Social Networking ill Distallce Leaming. Educational Technology & Society, 6(2), 50-61.

    下載圖示 校內:立即公開
    校外:立即公開
    QR CODE