Skip navigation

DSpace

機構典藏 DSpace 系統致力於保存各式數位資料(如:文字、圖片、PDF)並使其易於取用。

點此認識 DSpace
DSpace logo
English
中文
  • 瀏覽論文
    • 校院系所
    • 出版年
    • 作者
    • 標題
    • 關鍵字
    • 指導教授
  • 搜尋 TDR
  • 授權 Q&A
    • 我的頁面
    • 接受 E-mail 通知
    • 編輯個人資料
  1. NTU Theses and Dissertations Repository
  2. 管理學院
  3. 國際企業學系
請用此 Handle URI 來引用此文件: http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/34249
完整後設資料紀錄
DC 欄位值語言
dc.contributor.advisor黃恆獎(Heng-Chiang Huang)
dc.contributor.authorMeng-Shiow Hsiehen
dc.contributor.author謝孟修zh_TW
dc.date.accessioned2021-06-13T05:59:51Z-
dc.date.available2007-07-11
dc.date.copyright2006-07-11
dc.date.issued2006
dc.date.submitted2006-06-26
dc.identifier.citationAgarwal, R., and Karahanna, E. (2000), “Time Flies When You’re having fun:
Cognitive Absorption and Beliefs About Information Technology Usage,” MIS Quarterly 24(4), 665-694.
Ajzen, I., (1991), “The Theory of Planned Behavior,” Organization Behavior and
Human Decision Processes, (50), 179-211.
Ajzen, I., & Fishbein, M. (1977), “Attitude-behavior relation: A theoretical analysis
and review of empirical research,” Psychological Bulletin, 888-918.
Ajzen, I. (2002). Constructing a TPB Questionnaire: Conceptual and Methodological
Considerations. Amherst. MA: University of Massachusetts
Ajzen, I., & Drivers, B.L. (1992), “Application of the Theory of Planned Behavior to
Leisure Choice,” Journal of Leisure Sciences, 24(6), 204-224.
Allport, G. (1995), Attitudes: Handbook of Social Psychology. Worcester, MA: Clark University Press.
Alpert, Judy I. and Alpert Mart I. (2005), “Purchase Occasion Influence on the Role
of Music in Advertising,” Journal of Business Research, 58(3), 369-378.
Al-Raffee, S., & Cronan, T. P. (2005). Digital piracy: Factors that influence attitude
toward behavior (Working Paper). Fayetteville, AR: University of Arkansas.
Altinkemer, Kemal and Bandyopadhyay, Subhajyoti (2000), “ Budling and
Distribution of Digitized Music Over the Internet,” Journal of Organizational Computing & Electronic Commerce, 10(3), 209-224.
Baumann, I., Cialdini, K., and Kendrick E. (1981), “The Effects of Recognition and Group Need on Volunteerism: A Social Norm Perspective.” The Journal of Consumer Research, 25(3), 262-275.
Belanger, F., and Smith J.W (2002), “Trustworthiness in Electronic Commerce: The
Role of privacy, Security and Site Attributes,” Journal of Strategic Information Systems, (11), 245-270.
Benbasat, I., and Todd, P. (1992), “The Effects of Decision Support and Task
Contingencies on model Formulation: A cognitive perspective.” Decision Support Systems, 17(4), 241-252.
Bhattacharjee, S., et al. (2003), “Digital Music and Online Sharing: Software Piracy
2.0.” Communication of the ACM, 46(1), 107-111.
Bridis, I. (2004), Record Industry sues more downloaders. The Sun Hearld, January
22 ( http://www.sunhearld.com/mld/sunherald/business/7766838.htm)
Cassidy, J., Park, R.D., Butovsky, L. and Braungart, J.M. (1992), “Family-Peer
Connections – the Roles of Emotional Expressiveness within the Family and Children’s Understanding of Emotion,” Child Development, 63, 603-618.
Childers, T.L., Peck J, Carson S. (2001), “Hedonic and Utilitarian Motivation for
Online Retail Shipping Behaviors.” J Retail Winter; (77)511-535.
Christensen, A., & Eining, M. (1991), Factors influencing software piracy:
Implications for accountants. Journal of Information Systems, 20, 67-70.
Clarke and Haworth (1994), “Leisure and Wellbeing.” Manchester Metropolitan
University, 22(4), 317-322.
Cronan, T. P., Leonard, L. N. K., & Kreie, J. (2005), “An Empirical Validation of
Perceived Importance and Behavior Intention in IT ethics.” Journal of Business Ethics.
Csikzentmihalyi, M. (1975), “Plan and Intrinsic Rewards,” Journal of Humanistic
Psychology, 15(3), 41-63.
Dabholkar, P.A. and Bagozzi, R.P. (2002), “An Attitudinal Model of
Technology-Based Self-Service: Moderating effects of consumer traits and situational factors” Journal of the Academy of Marketing Science, 30(3), 184-201.
Davis, Fred D. (1986), “Technology Acceptance model for Empirically Testing New
End user Information systems: Theory and results.” Doctoral dissertation, Sloan
School of Management, Massachusetts Institute of Technology.
Davis, Fred D, Bagozzi, P, Richard and Warshaw Paul R. (1989), “User acceptance of
computer technology: A comparison of two theoretical models,” Management Science,5 (8),82-1003.
Deci, Edward L., and Ryan, Richard M., (1996), “Need Satisfaction and The
Self-Regulation of Learning,” Academic Search Premier, 8(3) 1024-37.
Delino, M., (2004), Spyware on My Machine? Wired News
Eagly, A. H., & Chaiken, S. (1993), The Psychology of Attitudes. Fort Worth, TX;
Hardcourt Brace Jovanovich.
Fehr, E. & Fischbacher, U. (2003), The nature of human altruism. In Nature, 425,
785 – 791.
Fekadu, Z., & Kraft, P. (2001), “Self-Identity in Planned Behavior Perspective: Past
Behavior and Its Moderating Effects on Self-Identity-Intention Relations. Social Behavior and Personality,” (29), 671-686.
Finlay, K.A., Trafimow, D., & Villarreal, A. (2002), “Predicting exercise and health
Behavioral intentions: Attitude, subject norms, and other behavioral determinants,” Journal of Applied Social Psychology, (32), 342-358.
Fitzmaurice J, (2005), Incorporating Consumers’ Motivations into the Theory of
Reasoned Action, Psychology &Marketing, , 22(11), 911-929.
Foxall, Gordon R. (1984), “ Marketing Domain, “ European Journal of Marketing
18(1), 25-40.
Fukukawa, I. Millar and Shevlin, O. (2003), “Perceptions of Senior Managers Toward knowledge-sharing behaviour,” Management Decision, 42(1), 108-132.
Garbarino, E. Johnson, M., (1999), “The Different Roles of Satisfaction, Trust and
Commitment in Customer Relation,” Journal of Marketing, 63(2), 70-87.
Gatignon, Hubert and Thomas S.Robertson. (1985), “A Propositional inventory for
new diffusion research,” Journal of Consumer research, March, 849-867.
Gefen, D. and Straub, D.W. (1997), “Gender differences in the perception of email: an
extension to the technology acceptance model,” MIS Quarterly, Dec, 389-400.
Gentery, L. and Calantone, R. (2002), A comparison off three models to explain
shop-bot use on the web, Psychology and Marketing 19(11), 945-956.
Goldsmith Ronald E. (1994). Consumer Psychology for Marketing, London,
UK, Routeledge.
Guo, Yi and Amoroso Donald. (2006), “An Analysis of the Acceptance of File Sharing
Technologies By Music Consumers,” Hawaii International Conference on
System Science, Jan, 15-25.
Hirschman, Elizabeth C. 1980. “Innovativeness, Novelty Seeking Consumer
creativity,” Journal of Consumer Research, 7(Dec), 283-295.
Horrigan, J. and Raine, L., (2002), “The Broadband Difference,” Pew Internet and
American Life Project http://www.pewinternet.org/reports/toc.asp??report=31
Hoyle, R.H. (1995), Structuring Equation Modeling: Concepts, Issue and Application,
Sage Publication, London.
Hu, Qing and Dinev Tamara (2005), “Is Spyware an Internet a Nuisance or Public
Menace.” Communication of the ACM, 8(5),61-67.
Jiang,Z.,and Benbasat, I.(2004), “Virtual Product Experience: Effects of Visual and
Functional Control of Products on Perceived Diagnostic and Flow in Electronic Shopping,” Journal Of management information Systems, 21(3),111-147.
Joreskog, K.G. and Sorbom, D. (1996), LISREL, 8: Structuring Equation Modeling,
Scientific Software International Corp., Chicago, IL.

Jupiter Research Portable Device 2005/4 in US
www.jupiterresearch.com/bin/ item.pl/research:concept/105/id=96211
Koufaris, M. (2002), “Applying the technology acceptance model and flow theory to
online consumer behaviors,” Information Systems Research, 13(2), 205-223.
Kraut R., et al, (1998), Internet Paradox: A Social Technology That Reduces Social
Involvement and Psychological Well-Being? American Psychologist, Vol. 53.
Kwong, T. C. H., & Lee, M. K. O. (2002), “ Behavioral intention model for the
exchange mode internet music piracy.” Proceedings of the 35th Annual Hawaii
International Conference on system science, Computer Society (Electronic document)
Larson, A., David B. Wake, and Yanev Kay P., (1984), “Measuring Gene Flow Among
Populations Having High Levels of Genetic Fragmentation.” PNAS, 97(4) 1640 – 1647.
Lee, M.K.O, Turban, E., (2001), “A Trust Model for Internet Shopping,” International
Journal of Electronic Commerce, 6(1), 75-91.
Lee, W.J., Kim, T.U. and Chung, J-Y (2002), “User acceptance of the mobile internet”, working paper, IT Management Research Center, Graduate School of Business, Sungkynkwan University, Seoul.
Liebowitz, Stan (2005), “Pitfalls in Measuring The Impact of File Sharing on the
Sound Recording Market.” CESiFO Economics Studies, 51(2), 439-77.
Ling, R.S. (2001), “It is in, it doesn’t matter if you need it or not, just that you have it:
fashion and the domestitication of the mobiles telephone among teens in
Norway”, working papers, Telenor R&D, Fornebu.
Mannetti, L., Pierro, A., and Livi, S. (2002), “Explaining consumer conduct: From
planned to self-expressive behavior.” Journal of Applied Social Psychology, 32, 1431-1451.
Massimini, D., and Carli, J. (1988),“Measurement and analysis issues with
explanation of variance in daily experience using the flow model.” Journal of
Leisure Research, 26, 35-46.
Matt Curtin (2001), Developing Trust: Online Privacy and Security. APRESS.
November 2001.
Mehrabian, Albert and James A.Russell. (1984), An Approach to Environmental
Psychology. Cambridge, MA: MIT Press.
Montpetit, D., Alain d’Astous, E. and Colbert, François (2005), “Music Piracy on the
Web – How Effective are Anti-Piracy Arguments? Evidence from the Theory of Planned Behavior.” Journal of Consumer Policy, 28(3), 289-310.
Nelson, R R; and Todd P.A (1996), “Perceived Usefulness, ease of use and usage of
digital music information technology: A replication.” MIS Quarterly, June, 227-247.
Novak, Thomas P., Donna L. Hoffman, Yiu-Fai Yung. (1998), Modeling the structure
the flow experience among webs users. ____,____,____ (2000). Measuring the customer experience in online environments: A structural modeling approach. Marketing Science, 19(1), 22-42.
Nunnally, J.C. (1978), Psychomertric theory 2nd edition. New York: McGraw Hill.
Olson, J., & Zanna, M. ( 1993), Attitudes and attitude change. Annual Review of
Psychology, 44, 117-154.
Parasuraman, A. (2000), “Technology Readiness Index: A multiple-item Scale to
measure readiness to embrace new technologies.” Journal of Service Research, 2(4), 307-320.
Pavolu, P (2003), “Consumer Acceptance of Electronic Commerce: Integrating Trust
and Risk with the Technology Acceptance Model.” International Journal of Electronic Commerce, 7(3), 101-135.
Peace, A. G., Galletta, D. F., & Thong, J. Y. L. (2003), “Software piracy in the
workplace: A model and empirical test.” Journal of Information Systems, 20, 153-177.
PEW/Internet (2005), Music and Video downloading moves beyond P2P
(http://www.pewinternet.org/PPF/f/153/report_display.asp).
Randall, D., & Gibson, A. (1991), “Ethical decision making in the medical profession:
An application of the theory of planned behavior.” Journal of Business Ethics, JO, 111-122.
Robert, P. (Oct, 2004), AOL surveys finds rampant online threat, clueless user.
Computerworld.
Rogers, Everett M. (1983), Diffusion of Innovations. New York Free Press.
Solomon, S., & O'Brien, J. (1990), “The effect of demographic factors on attitudes
toward software piracy.” The Journal Of Computer Information Systems, 45-45.
Stafford, T.F. and Urbacewski, A. (2004), “Spyware: The Ghost in the Machine.”
Common AIS 14, 291-306.
Sudip Bhattacharjee, Ram D. Gopal, G..Sanders, Lawrence (2003), “Digital Music
And online sharing: Software piracy 2.0?, “ Communication of the ACM, 46(7), 107-111.
Trafimow, D., & Finlay, K. (1996), “The importance of subjective norms for a
minority of people: Between-subjects and within-subjects analyses.” Personality & Social Psychology Bulletin, 22, 820-829.
Trevino, L. K. (1986), “Ethical decision making in organizations: A Person Situation
Interactionist Model.” Academy of Management Review, 11(3), 601-617.
Triandis, Harry C. (1977), Interpersonal Behavior, Monterey, CA: Brooks/Cole.
Venkatesh, V., and Davis, F.D., (2003), “A theoretical Extension of the technology
Acceptance model: Four longitudinal Field Studies,” Management Science 46(3),
186-204.
Venkatesh, V., Morrish, M G., Davis, G. B., and Davis, F.D., (2003), “User Acceptance
of Information Technology: Toward a Unified View,” MIS Quarterly 27(3),
425-478.
Webster, J. Trevino L.K., and Lisa Ryan. (1993), “The dimensionality and correlates
of flow in human-computer interaction.” Computer Human Behavior, 9(4), 411-426.
Webster, J. Trevino, L.K., and Stein, E.W. (2000), Making Connections:
Complementary influence on communication media choices, attitude and use.
Organization Science, 11, 163-182.
Wells, A. (1988), Self-esteem and optimal experience. In Optimal Experience:
Psychological Studies of Flow in Consciousness. Cambridge University Press,
New York, 319-326.
dc.identifier.urihttp://tdr.lib.ntu.edu.tw/jspui/handle/123456789/34249-
dc.description.abstract網路基礎設施的迅速發展和改善, 結合與分享的趨勢, 徹底改變音樂的創造和分佈交流的速度,進一步帶領數位音樂達到更高的巔峰。當音樂發行由傳統方式轉變成為數位化, 引起的熱潮使得更多和更寬廣的音樂愛好者和使用者來運用數位音樂。 在現階段大部分的美觀燈都集中於數位音樂和MP3版權何合法等議題。 而大眾所認知的道德及可隨意交換音樂的後續相關問題。 另一方面, 普及化的MP3 數位音樂應用被指責為讓音樂下載和分享成為有爭議的海盜行為問題圍攏著網際網路。 本項研究是從技術接受模型引伸而來 (TAM) Davis et al, (1989) 。技術接受模型提供對新技術的採納和用法水平的二個最顯要的因素: 被察覺的有用性, 和被察覺的易用性。由其它因素例如從心理學角度(TRA)來看待接受新的技術,然而我們提出新的假說針對與數位音樂。 關於在技術接受模型的態度和消費者的分享行為之間來做測試。 修改過的模型能知道技術接受模型和被開發以二個主要宗旨。 首先, 它應該改進理論的價值及加強行理解用戶使用上的行為何意願, 提供理論洞察。 第二, 修改過的模型應該提供一個理論依據的使用者模仿效果來求證分析可能的分享行為。 研究運用勘測格式提取資料,過LISERL 軟體來分析使用。zh_TW
dc.description.abstractThe rapid development and improvement of the network infrastructure, coupled with the increasing trend of sharing, is radically changing the way music is created and distributed and further taking it into another stage. As the traditional way of music distribution evolves into digitalization, the new means of distribution draw an even bigger and wider scope of music enthusiasts and users. Digital music and digital contents and information are becoming ubiquitous driven by the widespread of high speed broadband. The spotlight would be on the public acceptance of this digital music and the MP3 exchanging issues behind. On the other hand, the widespread of digitalized MP3 music had placed the blame on free music downloading and sharing on the internet which is surrounded by controversial piracy issues.
This study is an extension of the technology acceptance model (TAM) by Fred Davis et al, (1989). TAM provides the two most influential factors that dictate the acceptance and usage level of new technology: the perceived usefulness, and perceived ease of use. By integrating other factors from the psychological side theory of planned behavior (TRA) that accept new technology, new hypotheses are being brought up. The relationship between the technology acceptance model attitude and consumer’s sharing behavior are tested.
The modified model could be known as the integrated model of technology acceptance and is developed with two major objectives. First, it should improve our understanding of user acceptance behavior, providing theoretical insights on attitude and intention. Secondly, the integrated model should provide a theoretical basis using analysis approach that would enable to simulate the possible sharing behaviors. The research utilized survey format to extract data, which was in turn analyzed using the LISERL software.
en
dc.description.provenanceMade available in DSpace on 2021-06-13T05:59:51Z (GMT). No. of bitstreams: 1
ntu-95-R93724082-1.pdf: 632786 bytes, checksum: e4f4f7671d71d8d6522bc1b980006928 (MD5)
Previous issue date: 2006
en
dc.description.tableofcontentsAbstact 2
Table of Contents 4
Lists of Figures 6
List of Tables 7
Chapter 1 Introduction 8
1.1 Motivation and Background 8
1.2 The Emergence of MP3 9
1.3 Research Purpose 14
1.4 Organization of Thesis 15
Chapter 2 Literature Review 16
2.1 Technology Acceptance Model 16
2.2 Unified Theory of Acceptance and Use of Technology 18
2.3 Theory of Reasoned Action 21
2.4 Theory of Planned Behavior 22
2.5 Flow 24
2.6 Self-Efficacy 27
2.7 Risk of Downloading and Sharing 30
2.8 Intellectual Property Rights 33
Chapter 3 Research Methodology 37
3.1 Research Framework 37
3.2 Research Hypotheses 39
3.3 Sampling and Measurments 45
3.3.1 Design of the Questionnaires 45
3.3.2 Research Variable and Measurements 47
3.4 Statistical Approach 51
Chapter 4 Empirical Results 53
4.1 Sample Profiles 53
4.2 Goodness of-fit Indices 61
4.3 Results of Measurement Model 63
4.3.1 Evaluation of the Reliability 66
4.4 Results of Structural Model 70
4.5 Verifying the Hypotheses 72
4.6 Discussion 77
Chapter 5 Conclusions and Implications 82
5.1 Major Findings 84
5.2 Research Limitation 84
5.3 Direction for Future studies 85
Reference 87
Appendix A: Chinese Version of Survey 93
Appendix B: English Version of Survey 97
dc.language.isoen
dc.subject被察覺的有用性zh_TW
dc.subject計畫性行為理論zh_TW
dc.subject技術接受模型zh_TW
dc.subject被察覺的易用性zh_TW
dc.subject數位音樂.zh_TW
dc.subjectTheory of Reasoned Actionen
dc.subjectTheory of Planned Behavioren
dc.subjectPerceived Usefulnessen
dc.subjectTechnology Acceptance Modelen
dc.subjectDigital Music.en
dc.title技術接受模型之應用:以MP3數位音樂為例zh_TW
dc.titleThe Application of Technology Acceptance Model on MP3 Digital Musicen
dc.typeThesis
dc.date.schoolyear94-2
dc.description.degree碩士
dc.contributor.oralexamcommittee王仕茹(Shi-Ru Wong),趙義隆(Yi-Long Chao)
dc.subject.keyword技術接受模型,被察覺的有用性,被察覺的易用性,計畫性行為理論,數位音樂.,zh_TW
dc.subject.keywordTechnology Acceptance Model,Perceived Usefulness,Theory of Planned Behavior,Theory of Reasoned Action,Digital Music.,en
dc.relation.page100
dc.rights.note有償授權
dc.date.accepted2006-06-27
dc.contributor.author-college管理學院zh_TW
dc.contributor.author-dept國際企業學研究所zh_TW
顯示於系所單位:國際企業學系

文件中的檔案:
檔案 大小格式 
ntu-95-1.pdf
  未授權公開取用
617.96 kBAdobe PDF
顯示文件簡單紀錄


系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。

社群連結
聯絡資訊
10617臺北市大安區羅斯福路四段1號
No.1 Sec.4, Roosevelt Rd., Taipei, Taiwan, R.O.C. 106
Tel: (02)33662353
Email: ntuetds@ntu.edu.tw
意見箱
相關連結
館藏目錄
國內圖書館整合查詢 MetaCat
臺大學術典藏 NTU Scholars
臺大圖書館數位典藏館
本站聲明
© NTU Library All Rights Reserved