請用此 Handle URI 來引用此文件:
http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/54201
完整後設資料紀錄
DC 欄位 | 值 | 語言 |
---|---|---|
dc.contributor.advisor | 翁崇雄(Chorng-Shyong Ong) | |
dc.contributor.author | Chien-Yi Li | en |
dc.contributor.author | 李建逸 | zh_TW |
dc.date.accessioned | 2021-06-16T02:44:27Z | - |
dc.date.available | 2020-07-27 | |
dc.date.copyright | 2015-07-27 | |
dc.date.issued | 2015 | |
dc.date.submitted | 2015-07-20 | |
dc.identifier.citation | [1] 吳盛, 林東清, & 林杏子. (2006). 以社會交換理論觀點探討影響虛擬團隊成員知識分享行為因素. 資訊管理學報, 13(1), 193-219.
[2] 林鉦棽, 蕭淑月, & 何慧清. (2005). 社會交換理論觀點下組織支持, 組織知識分享行為與組織公民行為相關因素之研究: 以信任與關係為分析切入點. 人力資源管理學報, 5(1), 77-110. [3] comScore與創市際公佈2014年9月comScore Media Metrix®網路流量報告(last accessed: 05/10/2015 at: http://www.insightxplorer.com/news/news_12_02_14.html) [4] Facebook Fan Pages Spam Is a $200 Million Business | Mashable (last accessed: 05/21/2015 at: http://mashable.com/2013/08/29/facebook-fan-pages-spam-200-million-business/). [5] Facebook Statistics | Statistic Brain (last accessed: 01/07/2015 at: http://www.statisticbrain.com/facebook-statistics/) [6] The Year of Social? Nearly nine in 10 marketers will use social media marketing next year | eMarketer (last accessed: 01/07/2015 at: http://www.emarketer.com/Article/Year-of-Social/1010386) [7] Ajzen, I. (1991). The theory of planned behavior. Organizational behavior and human decision processes, 50(2), 179-211. [8] Al-Debei, M. M., Al-Lozi, E., & Papazafeiropoulou, A. (2013). Why people keep coming back to Facebook: Explaining and predicting continuance participation from an extended theory of planned behaviour perspective. Decision support systems, 55(1), 43-54. [9] Aronson, E., & Linder, D. (1965). Gain and loss of esteem as determinants of interpersonal attractiveness. Journal of Experimental Social Psychology, 1(2), 156-171. [10] Bagozzi, R. P., & Yi, Y. (1988). On the evaluation of structural equation models. Journal of the academy of marketing science, 16(1), 74-94. [11] Bandura, A., 1997. Self-efficacy: The Exercise of Control. New York, Freeman. [12] Bettoni, M.C., Andenmatten, S., & Mathieu, R. Knowledge cooperation in online communities: a duality of participation and cultivation, The Electronic Journal of Knowledge Management 5 (1) (2007) 1–6. [13] Bhattacherjee, A. 2001. Understanding information systems continuance: an expectation-confirmation model. MIS quarterly, 25(3): 351-370. [14] Blau, P. M. 1964. Exchange and power in social life. New York, John Wiley & Sons. [15] Boyd, D. M., & Ellison, N. B. 2007. Social network sites: definition, history, and scholarship, Journal of Computer-Mediated Communications 13(1), 210-230. [16] Campbell, D. E., Wells, J. D., & Valacich, J. S. (2013). Breaking the Ice in B2C Relationships: Understanding Pre-Adoption E-Commerce Attraction.Information Systems Research, 24(2), 219-238. [17] Chang, C. C. (2013). Examining users′ intention to continue using social network games: A flow experience perspective. Telematics and Informatics,30(4), 311-321. [18] Chang, Y. P., & Zhu, D. H. (2012). The role of perceived social capital and flow experience in building users’ continuance intention to social networking sites in China. Computers in Human Behavior, 28(3), 995-1001. [19] Chen, C. J., & Hung, S. W. 2010. To give or to receive? Factors influencing members’ knowledge sharing and community promotion in professional virtual communities. Information & Management 47(4), 226-236. [20] Chen, R. (2013). Member use of social networking sites—an empirical examination. Decision Support Systems, 54(3), 1219-1227. [21] Chen, S., & Williams, M. A. (2009). Privacy in social networks: A comparative study. PACIS 2009 Proceedings, 81. [22] Cheung, C. M., & Lee, M. K. (2009). Understanding the sustainability of a virtual community: model development and empirical test. Journal of Information Science. [23] Cheung, C. M., Chiu, P. Y., & Lee, M. K. (2011). Online social networks: Why do students use facebook?. Computers in Human Behavior, 27(4), 1337-1343. [24] Chiu, C. M., Cheng, H. L., Huang, H. Y., & Chen, C. F. (2013). Exploring individuals’ subjective well-being and loyalty towards social network sites from the perspective of network externalities: The Facebook case. International Journal of Information Management, 33(3), 539-552. [25] Correa, T., Hinsley, A. W., & De Zuniga, H. G. (2010). Who interacts on the Web?: The intersection of users’ personality and social media use. Computers in Human Behavior, 26(2), 247-253. [26] Dholakia, U. M., Bagozzi, R. P., & Pearo, L. K. (2004). A social influence model of consumer participation in network-and small-group-based virtual communities. International journal of research in marketing, 21(3), 241-263. [27] Dinev, T., & Hart, P. (2006). An extended privacy calculus model for e-commerce transactions. Information Systems Research, 17(1), 61-80. [28] Donath, J., & Boyd, D. (2004). Public displays of connection. bt technology Journal, 22(4), 71-82. [29] Dwyer, C., Hiltz, S., & Passerini, K. (2007). Trust and privacy concern within social networking sites: A comparison of Facebook and MySpace. AMCIS 2007 Proceedings, 339. [30] Dwyer, F. R., Schurr, P. H., & Oh, S. 1987. Developing buyer-seller relationships. Journal of Marketing 51(2), 11-27. [31] Ellison, N. B., Steinfield, C., & Lampe, C. 2007. The benefits of Facebook “friends:” Social capital and college students’ use of online social network sites. Journal of Computer‐Mediated Communication 12(4), 1143-1168. [32] Fishbein, M., & Ajzen, I. (1975). Belief, Attitude, Intention, and Behavior: An Introduction to Theory and Research. [33] Fisher, J.G. (2002). Implications of Electronic Mail Policies of Fairness and Invasion of Privacy: A Field Experiment. [34] Fogel, J., & Nehmad, E. (2009). Internet social network communities: Risk taking, trust, and privacy concerns. Computers in Human Behavior, 25(1), 153-160. [35] Fornell, C., & Larcker, D. F. (1981). Evaluating structural equation models with unobservable variables and measurement error. Journal of marketing research, 39-50. [36] Foster, M. K., Francescucci, A., & West, B. C. 2010. Why users participate in online social networks. International Journal of e-Business Management 4(1), 3. [37] Gross, R., & Acquisti, A. (2005, November). Information revelation and privacy in online social networks. In Proceedings of the 2005 ACM workshop on Privacy in the electronic society (pp. 71-80). ACM. [38] Hair, J. F., Anderson, R. E., Tatham, R. L., & William, C. (1998). Black (1998), Multivariate data analysis. [39] HCI Social Networking in Government: Opportunities and Challenges, HumanCapital Institute, 2010. [40] Hennig-Thurau, T., Gwinner, K. P., & Gremler, D. D. (2002). Understanding relationship marketing outcomes an integration of relational benefits and relationship quality. Journal of service research, 4(3), 230-247. [41] Homans, G. C. 1958. Social behavior as exchange. American Journal of Sociology 63(6), 597-606. [42] Hu, T., & Kettinger, W. J. (2008). Why people continue to use social networking services: Developing a comprehensive model. ICIS 2008 Proceedings, 89. [43] Huesmann, L. R., & Levinger, G. (1976). Incremental exchange theory: A formal model for progression in dyadic social interaction. Advances in experimental social psychology, 9, 191-229. [44] Huston, T. L. 1973. Ambiguity of acceptance, social desirability, and dating choice. Journal of Experimental Social Psychology 9(1), 32-42. [45] Huston, T. L. 1974. Foundations of Interpersonal Attraction. New York, Academic Press. [46] Huston, T. L., & Levinger, G. 1978. Interpersonal attraction and relationships. Annual Review of Psychology 29(1), 115-156. [47] Jasperson, J. S., Carter, P. E., & Zmud, R. W. (2005). A comprehensive conceptualization of post-adoptive behaviors associated with information technology enabled work systems. Mis Quarterly, 29(3), 525-557. [48] Jia, Y., Zhao, Y., & Lin, Y. (2010, April). Effects of System Characteristics on Users' Self-Disclosure in Social Networking Sites. In Information Technology: New Generations (ITNG), 2010 Seventh International Conference on (pp. 529-533). IEEE. [49] Jin, B., Park, J. Y., & Kim, H. S. (2010). What makes online community members commit? A social exchange perspective. Behaviour & Information Technology, 29(6), 587-599. [50] Kankanhalli, A., Tan, B. C., & Wei, K. K. 2005. Contributing knowledge to electronic knowledge repositories: an empirical investigation. MIS Quarterly 29(1), 113-143. [51] Kim, D. J., Ferrin, D. L., & Rao, H. R. (2008). A trust-based consumer decision-making model in electronic commerce: The role of trust, perceived risk, and their antecedents. Decision support systems, 44(2), 544-564. [52] Krasnova, H., Kolesnikova, E., & Guenther, O. (2009). ' It Won't Happen To Me!': Self-Disclosure in Online Social Networks. [53] Lankton, N. K., Wilson, E. V., & Mao, E. (2010). Antecedents and determinants of information technology habit. Information & Management, 47(5), 300-307. [54] Levinger, G. 1980. Toward the analysis of close relationships. Journal of Experimental Social Psychology 16(6), 510-544. [55] Lin, K. Y., & Lu, H. P. (2011). Why people use social networking sites: An empirical study integrating network externalities and motivation theory.Computers in Human Behavior, 27(3), 1152-1161. [56] Lindgaard G, Fernandes G, Dudek C, Brown J (2006) Attention Web designers: You have 50 milliseconds to make a good first impression. Behaviour & Information Technology. 25(2):115–126. [57] Luo, X. (2002). Trust production and privacy concerns on the Internet: A framework based on relationship marketing and social exchange theory.Industrial Marketing Management, 31(2), 111-118. [58] Molm, L. D. 1997. Coercive power in social exchange. New York, Cambridge University Press. [59] Nolker, R. D., & Zhou, L. (2005, September). Social computing and weighting to identify member roles in online communities. In Web Intelligence, 2005. Proceedings. The 2005 IEEE/WIC/ACM International Conference on (pp. 87-93). IEEE. [60] Nunnally, J. (1978). C.(1978). Psychometric theory. [61] Pavlou, P. A., & Gefen, D. (2004). Building effective online marketplaces with institution-based trust. Information Systems Research, 15(1), 37-59. [62] Pfeil, U., Arjan, R., & Zaphiris, P. (2009). Age differences in online social networking–A study of user profiles and the social capital divide among teenagers and older users in MySpace. Computers in Human Behavior, 25(3), 643-654. [63] Powers, T. L., & Reagan, W. R. (2007). Factors influencing successful buyer–seller relationships. Journal of business research, 60(12), 1234-1242. [64] Pöyry, E., Parvinen, P., & Malmivaara, T. 2013. Can We Get from Liking to Buying? Behavioral Differences in Hedonic and Utilitarian Facebook Usage. Electronic Commerce Research and Applications 12(4), 224-235 [65] Qin, L., Kim, Y., Tan, X., & Hsu, J. (2009). The effects of privacy concern and social influence on user acceptance of online social networks. AMCIS 2009 Proceedings, 321. [66] Raacke, J., & Bonds-Raacke, J. 2008. MySpace and Facebook: Applying the uses and gratifications theory to exploring friend-networking sites. Cyberpsychology & Behavior 11(2), 169-174. [67] Rusbult, C. E. (1980). Commitment and satisfaction in romantic associations: A test of the investment model. Journal of experimental social psychology, 16(2), 172-186. [68] Segars, A. H., & Grover, V. (1993). Re-examining perceived ease of use and usefulness: A confirmatory factor analysis. MIS quarterly, 517-525. [69] Sheppard, B. H., Hartwick, J., & Warshaw, P. R. (1988). The theory of reasoned action: A meta-analysis of past research with recommendations for modifications and future research. Journal of consumer Research, 325-343. [70] Sitkin, S. B., & Pablo, A. L. (1992). Reconceptualizing the determinants of risk behavior. Academy of management review, 17(1), 9-38. [71] Stevens, S. B., & Morris, T. L. 2007. College dating and social anxiety: using the Internet as a means of connecting to others. CyberPsychology & Behavior 10(5), 680-688. [72] Taylor, S., & Todd, P. (1995). Assessing IT usage: The role of prior experience.MIS quarterly, 561-570. [73] Tsai, H. T., & Pai, P. (2014). Why do newcomers participate in virtual communities? An integration of self-determination and relationship management theories. Decision Support Systems, 57, 178-187. [74] Wang, J., Chen, R., Herath, T., & Rao, H. R. (2009). Visual e-mail authentication and identification services: An investigation of the effects on e-mail use. Decision Support Systems, 48(1), 92-102. [75] Wasko, M. M., & Faraj, S. 2005. Why should I share? Examining social capital and knowledge contribution in electronic networks of practice. MIS Quarterly 29(1), 35-57. [76] Watson, R. T., Akselsen, S., & Pitt, L. F. (1998). Attractors: building mountains in the flat landscape of the World Wide Web. California Management Review,40, 36-56. [77] Wilson, D. T. 1995. An integrated model of buyer-seller relationships. Journal of the Academy of Marketing Science 23(4), 335-345. [78] Xu, C., Ryan, S., Prybutok, V., & Wen, C. (2012). It is not for fun: An examination of social network site usage. Information & Management, 49(5), 210-217. [79] Yang, T. 2012. The decision behavior of Facebook users. Journal of Computer Information Systems 52(3), 50-59. [80] Zhou, Z., Jin, X. L., & Fang, Y. (2014). Moderating role of gender in the relationships between perceived benefits and satisfaction in social virtual world continuance. Decision Support Systems. | |
dc.identifier.uri | http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/54201 | - |
dc.description.abstract | 本研究旨在應用社會交換理論,同時探討使用社群網站時所能獲得之好處以及必須之付出對於持續使用意圖的影響。所能獲得好處的部分,以社會交換理論中的社會交換關係作為切入點,將原先應用於電子商務領域的感知關係報酬(Perceived Relationship Rewards)延伸至社群網站背景,將感知關係報酬作為使用社群網站所能夠得到的好處,並引用過去文獻對於感知關係報酬所提及之四個前置因子:視覺吸引、稱職行為、關係兼容性、關係接受度。而使用社群網站所必須的付出則以感知風險來表示,並採用先前文獻認為會影響感知風險的兩個前置因子:網路風險感知及隱私濫用顧慮。我們建構一個整合性的研究模型,說明感知關係報酬及感知風險皆會對於持續使用意圖造成影響,進而影響持續使用行為。
本研究之研究對象為台灣區使用過社群網站的使用者,一共回收了254份有效問卷,並使用LISREL進行結構方程模式分析資料。結果顯示支持本研究所提出之假設。本研究歸納出兩項研究發現:(1)「感知關係報酬」對於「持續使用意圖」有顯著的正向影響效果。(2)「感知風險」對於「持續使用意圖」有顯著的負向影響效果。並在最後根據研究結果對學術及實務界提出相關建議。 | zh_TW |
dc.description.abstract | This research aims to apply to social exchange theory, and investigate the relationship between the benefit-cost and continuance use intention on social network site. About the benefit, this study uses perceived relationship rewards from e-commerce background as the benefit on social network site based on the perspective of social exchange relationship of social exchange theory and considers four antecedents of perceived relationship rewards on prior research, including visual appeal, competent behavior, relationship compatibility and relationship receptiveness. About the cost, we use perceived risk as the cost of usage of social network site and consider two antecedents of perceived risk on previous studies, including internet risk perception and privacy abuse concern. We develop an integrated model and indicate that both perceived relationship rewards and perceived risk influence continuance use intention, and then influence continuance use behavior.
With users who have used social network site in Taiwan as research subjects, we receive 254 valid questionnaires, and data analysis is conducted via LISREL statistical analysis. The result of analysis supports the hypotheses provided by this study. This study concludes two main findings, including: (1) Perceived relationship rewards has significant positive effect on continuance use intention. (2) Perceived risk has significant negative effect on continuance use intention. Finally, implications were provided for the academic and practical field. | en |
dc.description.provenance | Made available in DSpace on 2021-06-16T02:44:27Z (GMT). No. of bitstreams: 1 ntu-104-R02725001-1.pdf: 1057928 bytes, checksum: 79629074e3030a2c54dadeb8bde76b11 (MD5) Previous issue date: 2015 | en |
dc.description.tableofcontents | 致謝詞 I
論文摘要 II THESIS ABSTRACT III 圖目錄 . VII 表目錄 . VIII 第一章 緒論 1 第一節 研究背景與動機 1 第二節 研究目的 5 第二章 文獻探討 6 第一節 社群網站特性 6 第二節 社會交換理論、感知關係報酬與感知風險 8 2.2.1 社會交換理論 8 2.2.2 感知關係報酬 10 2.2.3 感知風險 14 第三節 持續使用意圖與持續使用行為 16 第三章 研究方法 18 第一節 研究架構及假設 18 第二節 變項定義與衡量 22 第三節 研究抽樣與資料蒐集 27 第四節 資料研究方法 27 第四章 資料分析與研究結果 28 第一節 問卷回收及樣本結構分析 28 第二節 測量模式分析 33 4.2.1 信度衡量 33 4.2.2 效度衡量 34 第三節 結構模式分析 39 4.3.1 整體模型配適度檢定 40 4.3.2 研究假設檢定 41 4.3.3 敘述統計量分析 45 第五章 結論與建議 49 第一節 研究結論 49 第二節 學術貢獻 50 第三節 管理實務意涵 50 第四節 研究限制與未來研究方向 51 參考文獻 52 附錄一:問卷 61 | |
dc.language.iso | zh-TW | |
dc.title | 社群網站使用者持續使用意圖探討─以社會交換理論之觀點 | zh_TW |
dc.title | Exploring User’s continuance intention to use on Social Network Site Based on the Perspective of Social Exchange Theory | en |
dc.type | Thesis | |
dc.date.schoolyear | 103-2 | |
dc.description.degree | 碩士 | |
dc.contributor.oralexamcommittee | 吳玲玲(Ling-Ling Wu),戴敏育(Min-Yu Dai) | |
dc.subject.keyword | 社群網站,持續使用意圖,社會交換理論,感知關係報酬,感知風險, | zh_TW |
dc.subject.keyword | Social Network Site,Continuance Use Intention,Social Exchange Theory,Perceived Relationship Rewards,Perceived Risk, | en |
dc.relation.page | 66 | |
dc.rights.note | 有償授權 | |
dc.date.accepted | 2015-07-20 | |
dc.contributor.author-college | 管理學院 | zh_TW |
dc.contributor.author-dept | 資訊管理學研究所 | zh_TW |
顯示於系所單位: | 資訊管理學系 |
文件中的檔案:
檔案 | 大小 | 格式 | |
---|---|---|---|
ntu-104-1.pdf 目前未授權公開取用 | 1.03 MB | Adobe PDF |
系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。