請用此 Handle URI 來引用此文件:
http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/16383
完整後設資料紀錄
DC 欄位 | 值 | 語言 |
---|---|---|
dc.contributor.advisor | 陳鴻基(Houn-Gee Chen) | |
dc.contributor.author | Yi-Hsiu Lin | en |
dc.contributor.author | 林毅修 | zh_TW |
dc.date.accessioned | 2021-06-07T18:12:21Z | - |
dc.date.copyright | 2012-07-16 | |
dc.date.issued | 2012 | |
dc.date.submitted | 2012-06-27 | |
dc.identifier.citation | 財政部 (2011),中華民國財政。
財政部 (2009),賦稅資訊系統整合再造更新整體實施計畫。 沈柏村 (2011),金融聯合徵信雙月刊,第十一期。 梁華傑 (2008),國防雜誌,第二十三卷第二期。 張博竣 (2004),資訊安全管理實務,文魁資訊股份有限公司,2004年4月,1-3。 李東峰、林子銘 (2007),資訊主管對企業資訊安全之風險控管決策,資訊管理研究,第四卷,第二期,2007年7月。 池進通、李鴻文、陳芬儀(2008),五大人格特質與工作績效關係之研究,經營管理叢論,Vol. 4, No. 2, 2008 第1-9頁。 吳欣蓓、陸洛、顧家祈、張妤玥(2010),轉換型領導行為、部屬工作壓力及主管滿 意度的關聯─人格特質為調節變項,中華管理學報,第一卷,第二期,第1-30頁。 Alice M. Johnson(2005). The Technology Acceptance Model and The Decision to Invest in Information Security. Proceedings of the 2005 Southern Association of Information Systems Conference. Ajzen, I., Fishbein. M. (1980). Understanding attitudes and predicting social behaviour. Englewood Cliffs, NJ: Prentice-Hall. Ajzen, I., M. Fishbein (1980). Understanding Attitudes and Predicting Social Behavior. Prentice-Hall, Englewood Cliffs, NJ. Arthur, W. and W. Grazziano (1996). The five-factor model, conscientiousness, and driving accident involvement. Journal of Personality 64(3): 594-618. Agarwal, R. and Prasad, J. (1999). Are individual differences germane to the acceptance of new information technologies? Decision Sciences, 30, 2, 361-391. Barrick, M. R., M. K. Mount. (2000). Select on conscientiousness and emotional stability. E. A. Locke, ed. Handbook of Principles of Organizational Behavior. Blackwell Publishing, Malden, MA. Barrick, M. R., M. K. Mount. (1991). The big five personality dimensions and job performance: A meta-analysis. Personnel Psych. 44(1) 1–26. Bob Blakley, Ellen McDermott and Dan Geer (2002). Information Security is Information Risk Management. NSPW'OI, September 10-13th , 2002, Cioudcroll, New Mexico, USA. Barrick, M. R., M. K. Mount, T. A. Judge. (2001). Personality and performance at the beginning of the new millennium: What do we know and where do we go next? Internat. J. Selection Assessment 9(1/2) 9–30. Bogg, T., & Roberts, B. W. (2004). Conscientiousness and health-related behaviors: A meta-analysis of the leading behavioral contributors to mortality. Psychological Bulletin, 130, 887–919. Creed, P. A., Muller, J., &Machin, M. A. (2001). The role of satisfaction with occupational status, neuroticism, financial strain and categories of experience in predicting mental health in the unemployed. Personality and Individual Differences, 30, 435–447. Costa, P. T. & McCrae, R.R. (1986). Personality stability and its implications for clinical psychology. Clinical Psychology Review, 6, pp. 407-423. Costa, P. T., Jr., &McCrae, R. R. (1992). Revised NEO Personality Inventory (NEO-PI-R) and NEO Five-Factor Inventory (NEO-FFI) professional manual. Odessa, FL: Psychological Assessment Resources. Devaraj, S., Easley, R. F., Crant, J. M., (2008). Research Note—How Does Personality Matter? Relating the Five-Factor Model to Technology Acceptance and Use. Information Systems Research, 19(1), pp. 93-105. Everton, W.J., Mastrangelo, P.M. and Jolton, J.A. (2005). Personality correlates of employees’ personal use of work computers. CyberPsychology & Behavior, 8, 2, 143-153. E. Karahanna and D.W. Straub (1999). The psychological origins of perceived usefulness and ease of use. Information and Management 35 (1999) 237–50. Fred D. Davis (1989). Perceived Usefulness, Perceived Ease of Use and User Acceptance of Information Technology. MIS Quarterly 13, pp. 319-340. Goldberg, L. R. (1992). The development of markers for the Big-Five factor structure. Psychological Assessment, 4, 26–42. Goldberg, L. R. (1993). The structure of phenotypic personality traits. American Psychologist 48: 26-34. Graziano, W. G., N. H. Eisenberg. (1997). Agreeableness: A dimension of personality. R. Hogan, J. Johnson, S. Briggs, eds. Handbook of Personality Psychology. Academic Press, San Diego, 795–824. G. Hackbarth, V. Grover and M.Y. Yi (2003). Computer playfulness and anxiety: positive and negative mediator of the system experience effect on perceived ease of use. Information and Management 40 (2003) 221–32. G. W. Allport (1937). Personality: A psychological interpretation. New York: Holt. George, J., & Zhou, J. (2001). When openness to experience and conscientiousnessare related to creative behavior: An interactional approach. Journal of Applied Psychology, 86, 513–524. Hatice Ozutku & Selma Altindis (2011). Big five personality factors and other elements in understanding work stress of Turkish health care professionals. African Journal of Business Management Vol. 5(26), pp. 10462-10473, 28 October, 2011. Hamburger, Y. A. and Ben-Artzi, E. (2000). The relationship between extraversion and neuroticism and the different uses of the Internet. Computers in Human Behavior, 16, 441–449. Hogan, R., Hogan, J., & Roberts, B. W. (1996). Personality measurement and employment decisions: questions and answers. American Psychologist, 51, 469–477. Hough, L. M., A. Furnham. (2002). Importance and use of personality variables in work settings. W. C. Borman, D. R. Ilgen, R. J. Klimoski, eds. Comprehensive Handbook of Psychology, Vol. 12. Wiley, New York, 131–169. Hogan, J., & Ones, D. S. (1997). Conscientiousness and integrity at work. In Hogan, R. (Ed.); Johnson, J. A. (Ed.); Briggs, S. R. (Ed.) Handbook of personality psychology. San Diego, CA: Academic Press, Inc. Hooker, K., Monahan, D., Shifren, K., & Hutchinson, C. (1992). Mental and physical health of spouse caregivers: The role of personality. Psychology and Aging, 7, 367–375. Harrison, A.W. and Rainer, R. K, Jr. (1992). The influence of individual differences on skill in end-user computing. Journal of Management Information Systems, 9, 1, 93-111. Jose J. Gonzalez and Agata Sawicka (2002). A framework for human factors in information security. 2002 WSEAS Int. Conf. on Information Security, Rio de Janeiro. Jordan Shropshire, Merrill Warkentin, Allen Johnston, and Mark Schmidt (2006). Personality and IT security: An application of the five-factor model. Proceedings of the Twelfth Americas Conference on Information Systems, Acapulco, Mexico August 04th-06th 2006. John, O. P., & Srivastava, S. (1999). The Big Five trait taxonomy: History, measurement, and theoretical perspectives. In L. A. Pervin, & O. P. John (Eds.), Handbook of personality: Theory and research (pp.102–138). New York: Guilford Press. Jieun Yu, Imsook Ha, Munkee Choi, Jaejeung Rho (2004). Extending the TAM for a t-commerce. Information & Management 42 (2005) 965–976 Lin, J. C. C. & Lu, H. (2000). Towards an understanding of the behavioral intention to use a web site. International Journal of Information Management, Vol.20, pp. 197-208. LePine, J. A., L. Van Dyne. (2001). Voice and cooperative behavior as contrasting forms of contextual performance: Evidence of differential relationships with big five personality characteristics and cognitive ability. J. Appl. Psych. 86(2) 326–336. Meier, B., Perrig-Chiello, P., & Perrig, W. (2002). Personality and memory in old age. Aging, Neuropsychology, and Cognition, 9, 135–144. M. Kleijnen, M. Wetzels and K.D. Ruyter (2004). Consumer acceptance of wireless finance. Journal of Financial Service Marketing 8 (2004) 206–17. Moon, J. W. & Kim, Y. G. (2001). Extending the TAM for a world-wide-web context. Information & Management, Vol.38(4), pp. 217-230. Noftle, E. E., & Robins, R. W. (2007). Personality predictors of academic outcomes: Big five correlates of GPA and SAT scores. Journal of Personality and Social Psychology, 93, 116–130. O'Connor,M. C., & Paunonen, S. V. (2007). Big five personality predictors of post-secondary academic performance. Personality and Individual Differences, 43, 971–990. Poropat, A. (2009). A meta-analysis of the five-factor model of personality and academic performance. Psychological Bulletin, 135, 322–328. Pei-Lee Teh, Chen-Chen Yong, Chin-Wei Chong, and Siew-Yong Yew (2011). Do the Bing Five Personality Factors affect knowledge sharing behavior? A study of Malaysian universities. Malaysian Journal of Library & Information Science, Vol.16, no.1, April 2011:47-62. Peter A. Rosen & Donald H. Kluemper (2008). The Impact of the Big Five Personality Traits on the Acceptance of Social Networking Website. AMCIS 2008 Proceedings. Paper 274. Rothmann & Coetzer(2003). The Big Five Personality Dimensions and Job Performance. South African Journal of Industrial Psychology, 29, (1), 68-74. Rogers, E. M. (1983). Diffusion of Innovations, 3rd ed. The Free Press, New York. R. Shang, Y. Chen and L. Shen (2005). Extrinsic versus intrinsic motivations for consumers to shop on-line. Information and Management 42 (2005) 401–13. Samuel D. Gosling, Peter J. Rentfrow, and William B. Swann Jr. (2003). A very brief measure of the Big-Five personality domains. Journal of Research in Personality 37 (2003) 504–528. Salvador Bueno, Jose L. Salmeron (2008). TAM-Based Success Modeling in ERP. Interacting with Computers 20 515-523. Stanton, J. M. (2000). Reactions to employee performance monitoring: framework, review and research directions. Human Performance, 13, 85–113. Trapmann, S., Hell, B., Hirn, J.W., & Schuler, H. (2007). Meta-analysis of the relationship between the big five and academic success at university. Journal of Psychology, 215, 132–151. Venkatesh, V. (2000). Determinants of Perceived Ease of Use: Integrating Control, Intrinsic Motivation, and Emotion into the Technology Acceptance Model. Information System Research, 11-4, 342-365. Venkatesh, V. (1999). Creating favorable user perceptions: Exploring the role of intrinsic motivation. MIS Quart. 23(2) 239–260. Venkatesh, V. & M.G. Morris (2000). Why Don’t Men Ever Stop to Ask For Direction? Gender, Social Influence, and Their Role in Technology Acceptance, and Usage Behavior. MIS Quarterly, 24:1,115-139. Venkatesh, V. & Davis, F. D. (2000). A theoretical extension of the technology acceptance model: four longitudinal field studies. Management Science, Vol.46(20), pp. 168-204. Venkatesh, V., M. G. Morris, G. B. Davis, F. D. Davis (2003). User acceptance of information technology: toward a unified view. MIS Quarterly 27, 3, 425-478. V. Venkatesh and C. Speier (1999). Computer technology training in the workplace: a longitudinal investigation of the effect of mood. Organizational Behavior and Human Decision Process 79 (1999) 1–28. V. D. David and B. S. Stanley (1989). “Personality and job performance: Evidence of incremental validity.” Personnel Psychology, vol. 42, pp. 25-36. Webster, J. (1998). Desktop videoconferencing: experiences of complete users, wary users and non-users. MIS Quarterly, 22, 257–286. Young Hoon Kwak, Jane Park. Boo Young Chung, and Saumyendu Ghosh (2011). Understanding End-Users' Acceptance of Enterprise Resource Planning (ERP) System in Project-Based Sectors. IEEE Transactions on Engineering Management 2011/03 Issue: 99 pp. 1-12. Zmud, R.W. (1979). Individual difference and MIS success: a review of the empirical literature. Management Science, 25, 10, 966-979. Zmud, R. W. (1979). Individual Differences and MIS Success: A Review of the Empirical Literature. Management Science, Oct. 1979, Vol. 25, Iss. 10, pp. 966-979. | |
dc.identifier.uri | http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/16383 | - |
dc.description.abstract | 儘管隨著科技的日新月異,資訊安全系統的效能不斷提升,使用上也越來越人性化,但仍然有許多使用者對於資訊安全系統沒有太高的使用意願,因此有必要針對人為之因素進行探討。在資訊系統中又以政府部門最為龐大,以財政部為例本,其稽徵作業每年約服務530萬納稅戶,處理共約176億筆交易量。除此之外,財稅資訊系統為各個財政單位所共同使用,是一整合型的大型財稅資訊系統,因此對於資訊系統的安全控管更須謹慎處理。故本研究以財政部國稅局人員為受訪對象,利用科技接受模式及五大人格特質理論探討人格特質如何影響資訊安全系統使用者的使用意向。研究顯示知覺有用性及知覺易用性顯著影響使用者對於資訊安全系統之使用行為意向,同時知覺易用與某些人格特質之交互作用亦顯著影響資訊安全系統之使用行為意向。透過本研究之分析將有助於未來管理階層對於國稅局人員之遴選及員工訓練,藉以提升人員對於資訊安全系統之使用行為態度。 | zh_TW |
dc.description.abstract | Despite the fact that information security systems have become more effective and user-friendly, they still can’t effectively appeal to user for smoothly and effective use. In part, it is due to the complexity of the system and unpredictable nature of security events and caused impact. This study aims at exploring the impact of human factors on the adoption of information security system as an attempt to provide a holistic viewpoint into the deployment of information security system. The case of National Taxation Information System in Taiwan was examined. In this system, around 17.6 billions tax payers information are processed annually and the information handling are under strict regulation for the protection of data and personal information privacy. By combining technology acceptance model and big five personality traits, a research model is proposed in which the personality traits are regarded as moderator to the system acceptance. More than a hundred of users at the tax bureau participated in the survey study. The results indicate that perceived usefulness and ease of use significantly affect the user’s behavior intention. Several personalities did play the role in moderating the user’s behavior intention on the use of information security system. | en |
dc.description.provenance | Made available in DSpace on 2021-06-07T18:12:21Z (GMT). No. of bitstreams: 1 ntu-101-R99741036-1.pdf: 485032 bytes, checksum: 5c7f399f4b3f28f70a98d53f01a816c5 (MD5) Previous issue date: 2012 | en |
dc.description.tableofcontents | 摘要 i
Abstract ii 目錄 iii 圖目錄 iv 表目錄 v 第一章 緒論 1 第一節 研究背景 1 第二節 研究動機與目的 3 第三節 研究流程 5 第四節 論文架構 6 第二章 文獻探討 7 第一節 資訊安全 7 第二節 科技接受模式 9 第三節 五大人格特質 15 第四節 五大人格特質與科技接受模式 19 第三章 研究模式與假說 24 第四章 研究設計 30 第一節 研究衡量變數 30 第二節 問卷設計 33 第三節 資料蒐集 33 第五章 研究分析 34 第一節 樣本描述 34 第二節 因素分析 36 第三節 研究假設之修正 41 第四節 迴歸分析 44 第六章 結論與建議 51 第一節 研究結論 51 第二節 管理意涵 54 第三節 研究限制 56 附錄 57 參考文獻 60 | |
dc.language.iso | zh-TW | |
dc.title | 利用科技接受模式與人格特質探討資訊安全系統使用-以賦稅再造資訊系統為例 | zh_TW |
dc.title | An exploration of technology acceptance model in information security - A case study of the Taxation Reform Information System | en |
dc.type | Thesis | |
dc.date.schoolyear | 100-2 | |
dc.description.degree | 碩士 | |
dc.contributor.oralexamcommittee | 周子元,江俊毅 | |
dc.subject.keyword | 科技接受模式,資訊安全系統,五大人格特質理論, | zh_TW |
dc.subject.keyword | technology acceptance model,information security system,personality traits,big five personality traits, | en |
dc.relation.page | 67 | |
dc.rights.note | 未授權 | |
dc.date.accepted | 2012-06-27 | |
dc.contributor.author-college | 管理學院 | zh_TW |
dc.contributor.author-dept | 商學研究所 | zh_TW |
顯示於系所單位: | 商學研究所 |
文件中的檔案:
檔案 | 大小 | 格式 | |
---|---|---|---|
ntu-101-1.pdf 目前未授權公開取用 | 473.66 kB | Adobe PDF |
系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。