請用此 Handle URI 來引用此文件:
http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/34249
完整後設資料紀錄
DC 欄位 | 值 | 語言 |
---|---|---|
dc.contributor.advisor | 黃恆獎(Heng-Chiang Huang) | |
dc.contributor.author | Meng-Shiow Hsieh | en |
dc.contributor.author | 謝孟修 | zh_TW |
dc.date.accessioned | 2021-06-13T05:59:51Z | - |
dc.date.available | 2007-07-11 | |
dc.date.copyright | 2006-07-11 | |
dc.date.issued | 2006 | |
dc.date.submitted | 2006-06-26 | |
dc.identifier.citation | Agarwal, R., and Karahanna, E. (2000), “Time Flies When You’re having fun:
Cognitive Absorption and Beliefs About Information Technology Usage,” MIS Quarterly 24(4), 665-694. Ajzen, I., (1991), “The Theory of Planned Behavior,” Organization Behavior and Human Decision Processes, (50), 179-211. Ajzen, I., & Fishbein, M. (1977), “Attitude-behavior relation: A theoretical analysis and review of empirical research,” Psychological Bulletin, 888-918. Ajzen, I. (2002). Constructing a TPB Questionnaire: Conceptual and Methodological Considerations. Amherst. MA: University of Massachusetts Ajzen, I., & Drivers, B.L. (1992), “Application of the Theory of Planned Behavior to Leisure Choice,” Journal of Leisure Sciences, 24(6), 204-224. Allport, G. (1995), Attitudes: Handbook of Social Psychology. Worcester, MA: Clark University Press. Alpert, Judy I. and Alpert Mart I. (2005), “Purchase Occasion Influence on the Role of Music in Advertising,” Journal of Business Research, 58(3), 369-378. Al-Raffee, S., & Cronan, T. P. (2005). Digital piracy: Factors that influence attitude toward behavior (Working Paper). Fayetteville, AR: University of Arkansas. Altinkemer, Kemal and Bandyopadhyay, Subhajyoti (2000), “ Budling and Distribution of Digitized Music Over the Internet,” Journal of Organizational Computing & Electronic Commerce, 10(3), 209-224. Baumann, I., Cialdini, K., and Kendrick E. (1981), “The Effects of Recognition and Group Need on Volunteerism: A Social Norm Perspective.” The Journal of Consumer Research, 25(3), 262-275. Belanger, F., and Smith J.W (2002), “Trustworthiness in Electronic Commerce: The Role of privacy, Security and Site Attributes,” Journal of Strategic Information Systems, (11), 245-270. Benbasat, I., and Todd, P. (1992), “The Effects of Decision Support and Task Contingencies on model Formulation: A cognitive perspective.” Decision Support Systems, 17(4), 241-252. Bhattacharjee, S., et al. (2003), “Digital Music and Online Sharing: Software Piracy 2.0.” Communication of the ACM, 46(1), 107-111. Bridis, I. (2004), Record Industry sues more downloaders. The Sun Hearld, January 22 ( http://www.sunhearld.com/mld/sunherald/business/7766838.htm) Cassidy, J., Park, R.D., Butovsky, L. and Braungart, J.M. (1992), “Family-Peer Connections – the Roles of Emotional Expressiveness within the Family and Children’s Understanding of Emotion,” Child Development, 63, 603-618. Childers, T.L., Peck J, Carson S. (2001), “Hedonic and Utilitarian Motivation for Online Retail Shipping Behaviors.” J Retail Winter; (77)511-535. Christensen, A., & Eining, M. (1991), Factors influencing software piracy: Implications for accountants. Journal of Information Systems, 20, 67-70. Clarke and Haworth (1994), “Leisure and Wellbeing.” Manchester Metropolitan University, 22(4), 317-322. Cronan, T. P., Leonard, L. N. K., & Kreie, J. (2005), “An Empirical Validation of Perceived Importance and Behavior Intention in IT ethics.” Journal of Business Ethics. Csikzentmihalyi, M. (1975), “Plan and Intrinsic Rewards,” Journal of Humanistic Psychology, 15(3), 41-63. Dabholkar, P.A. and Bagozzi, R.P. (2002), “An Attitudinal Model of Technology-Based Self-Service: Moderating effects of consumer traits and situational factors” Journal of the Academy of Marketing Science, 30(3), 184-201. Davis, Fred D. (1986), “Technology Acceptance model for Empirically Testing New End user Information systems: Theory and results.” Doctoral dissertation, Sloan School of Management, Massachusetts Institute of Technology. Davis, Fred D, Bagozzi, P, Richard and Warshaw Paul R. (1989), “User acceptance of computer technology: A comparison of two theoretical models,” Management Science,5 (8),82-1003. Deci, Edward L., and Ryan, Richard M., (1996), “Need Satisfaction and The Self-Regulation of Learning,” Academic Search Premier, 8(3) 1024-37. Delino, M., (2004), Spyware on My Machine? Wired News Eagly, A. H., & Chaiken, S. (1993), The Psychology of Attitudes. Fort Worth, TX; Hardcourt Brace Jovanovich. Fehr, E. & Fischbacher, U. (2003), The nature of human altruism. In Nature, 425, 785 – 791. Fekadu, Z., & Kraft, P. (2001), “Self-Identity in Planned Behavior Perspective: Past Behavior and Its Moderating Effects on Self-Identity-Intention Relations. Social Behavior and Personality,” (29), 671-686. Finlay, K.A., Trafimow, D., & Villarreal, A. (2002), “Predicting exercise and health Behavioral intentions: Attitude, subject norms, and other behavioral determinants,” Journal of Applied Social Psychology, (32), 342-358. Fitzmaurice J, (2005), Incorporating Consumers’ Motivations into the Theory of Reasoned Action, Psychology &Marketing, , 22(11), 911-929. Foxall, Gordon R. (1984), “ Marketing Domain, “ European Journal of Marketing 18(1), 25-40. Fukukawa, I. Millar and Shevlin, O. (2003), “Perceptions of Senior Managers Toward knowledge-sharing behaviour,” Management Decision, 42(1), 108-132. Garbarino, E. Johnson, M., (1999), “The Different Roles of Satisfaction, Trust and Commitment in Customer Relation,” Journal of Marketing, 63(2), 70-87. Gatignon, Hubert and Thomas S.Robertson. (1985), “A Propositional inventory for new diffusion research,” Journal of Consumer research, March, 849-867. Gefen, D. and Straub, D.W. (1997), “Gender differences in the perception of email: an extension to the technology acceptance model,” MIS Quarterly, Dec, 389-400. Gentery, L. and Calantone, R. (2002), A comparison off three models to explain shop-bot use on the web, Psychology and Marketing 19(11), 945-956. Goldsmith Ronald E. (1994). Consumer Psychology for Marketing, London, UK, Routeledge. Guo, Yi and Amoroso Donald. (2006), “An Analysis of the Acceptance of File Sharing Technologies By Music Consumers,” Hawaii International Conference on System Science, Jan, 15-25. Hirschman, Elizabeth C. 1980. “Innovativeness, Novelty Seeking Consumer creativity,” Journal of Consumer Research, 7(Dec), 283-295. Horrigan, J. and Raine, L., (2002), “The Broadband Difference,” Pew Internet and American Life Project http://www.pewinternet.org/reports/toc.asp??report=31 Hoyle, R.H. (1995), Structuring Equation Modeling: Concepts, Issue and Application, Sage Publication, London. Hu, Qing and Dinev Tamara (2005), “Is Spyware an Internet a Nuisance or Public Menace.” Communication of the ACM, 8(5),61-67. Jiang,Z.,and Benbasat, I.(2004), “Virtual Product Experience: Effects of Visual and Functional Control of Products on Perceived Diagnostic and Flow in Electronic Shopping,” Journal Of management information Systems, 21(3),111-147. Joreskog, K.G. and Sorbom, D. (1996), LISREL, 8: Structuring Equation Modeling, Scientific Software International Corp., Chicago, IL. Jupiter Research Portable Device 2005/4 in US www.jupiterresearch.com/bin/ item.pl/research:concept/105/id=96211 Koufaris, M. (2002), “Applying the technology acceptance model and flow theory to online consumer behaviors,” Information Systems Research, 13(2), 205-223. Kraut R., et al, (1998), Internet Paradox: A Social Technology That Reduces Social Involvement and Psychological Well-Being? American Psychologist, Vol. 53. Kwong, T. C. H., & Lee, M. K. O. (2002), “ Behavioral intention model for the exchange mode internet music piracy.” Proceedings of the 35th Annual Hawaii International Conference on system science, Computer Society (Electronic document) Larson, A., David B. Wake, and Yanev Kay P., (1984), “Measuring Gene Flow Among Populations Having High Levels of Genetic Fragmentation.” PNAS, 97(4) 1640 – 1647. Lee, M.K.O, Turban, E., (2001), “A Trust Model for Internet Shopping,” International Journal of Electronic Commerce, 6(1), 75-91. Lee, W.J., Kim, T.U. and Chung, J-Y (2002), “User acceptance of the mobile internet”, working paper, IT Management Research Center, Graduate School of Business, Sungkynkwan University, Seoul. Liebowitz, Stan (2005), “Pitfalls in Measuring The Impact of File Sharing on the Sound Recording Market.” CESiFO Economics Studies, 51(2), 439-77. Ling, R.S. (2001), “It is in, it doesn’t matter if you need it or not, just that you have it: fashion and the domestitication of the mobiles telephone among teens in Norway”, working papers, Telenor R&D, Fornebu. Mannetti, L., Pierro, A., and Livi, S. (2002), “Explaining consumer conduct: From planned to self-expressive behavior.” Journal of Applied Social Psychology, 32, 1431-1451. Massimini, D., and Carli, J. (1988),“Measurement and analysis issues with explanation of variance in daily experience using the flow model.” Journal of Leisure Research, 26, 35-46. Matt Curtin (2001), Developing Trust: Online Privacy and Security. APRESS. November 2001. Mehrabian, Albert and James A.Russell. (1984), An Approach to Environmental Psychology. Cambridge, MA: MIT Press. Montpetit, D., Alain d’Astous, E. and Colbert, François (2005), “Music Piracy on the Web – How Effective are Anti-Piracy Arguments? Evidence from the Theory of Planned Behavior.” Journal of Consumer Policy, 28(3), 289-310. Nelson, R R; and Todd P.A (1996), “Perceived Usefulness, ease of use and usage of digital music information technology: A replication.” MIS Quarterly, June, 227-247. Novak, Thomas P., Donna L. Hoffman, Yiu-Fai Yung. (1998), Modeling the structure the flow experience among webs users. ____,____,____ (2000). Measuring the customer experience in online environments: A structural modeling approach. Marketing Science, 19(1), 22-42. Nunnally, J.C. (1978), Psychomertric theory 2nd edition. New York: McGraw Hill. Olson, J., & Zanna, M. ( 1993), Attitudes and attitude change. Annual Review of Psychology, 44, 117-154. Parasuraman, A. (2000), “Technology Readiness Index: A multiple-item Scale to measure readiness to embrace new technologies.” Journal of Service Research, 2(4), 307-320. Pavolu, P (2003), “Consumer Acceptance of Electronic Commerce: Integrating Trust and Risk with the Technology Acceptance Model.” International Journal of Electronic Commerce, 7(3), 101-135. Peace, A. G., Galletta, D. F., & Thong, J. Y. L. (2003), “Software piracy in the workplace: A model and empirical test.” Journal of Information Systems, 20, 153-177. PEW/Internet (2005), Music and Video downloading moves beyond P2P (http://www.pewinternet.org/PPF/f/153/report_display.asp). Randall, D., & Gibson, A. (1991), “Ethical decision making in the medical profession: An application of the theory of planned behavior.” Journal of Business Ethics, JO, 111-122. Robert, P. (Oct, 2004), AOL surveys finds rampant online threat, clueless user. Computerworld. Rogers, Everett M. (1983), Diffusion of Innovations. New York Free Press. Solomon, S., & O'Brien, J. (1990), “The effect of demographic factors on attitudes toward software piracy.” The Journal Of Computer Information Systems, 45-45. Stafford, T.F. and Urbacewski, A. (2004), “Spyware: The Ghost in the Machine.” Common AIS 14, 291-306. Sudip Bhattacharjee, Ram D. Gopal, G..Sanders, Lawrence (2003), “Digital Music And online sharing: Software piracy 2.0?, “ Communication of the ACM, 46(7), 107-111. Trafimow, D., & Finlay, K. (1996), “The importance of subjective norms for a minority of people: Between-subjects and within-subjects analyses.” Personality & Social Psychology Bulletin, 22, 820-829. Trevino, L. K. (1986), “Ethical decision making in organizations: A Person Situation Interactionist Model.” Academy of Management Review, 11(3), 601-617. Triandis, Harry C. (1977), Interpersonal Behavior, Monterey, CA: Brooks/Cole. Venkatesh, V., and Davis, F.D., (2003), “A theoretical Extension of the technology Acceptance model: Four longitudinal Field Studies,” Management Science 46(3), 186-204. Venkatesh, V., Morrish, M G., Davis, G. B., and Davis, F.D., (2003), “User Acceptance of Information Technology: Toward a Unified View,” MIS Quarterly 27(3), 425-478. Webster, J. Trevino L.K., and Lisa Ryan. (1993), “The dimensionality and correlates of flow in human-computer interaction.” Computer Human Behavior, 9(4), 411-426. Webster, J. Trevino, L.K., and Stein, E.W. (2000), Making Connections: Complementary influence on communication media choices, attitude and use. Organization Science, 11, 163-182. Wells, A. (1988), Self-esteem and optimal experience. In Optimal Experience: Psychological Studies of Flow in Consciousness. Cambridge University Press, New York, 319-326. | |
dc.identifier.uri | http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/34249 | - |
dc.description.abstract | 網路基礎設施的迅速發展和改善, 結合與分享的趨勢, 徹底改變音樂的創造和分佈交流的速度,進一步帶領數位音樂達到更高的巔峰。當音樂發行由傳統方式轉變成為數位化, 引起的熱潮使得更多和更寬廣的音樂愛好者和使用者來運用數位音樂。 在現階段大部分的美觀燈都集中於數位音樂和MP3版權何合法等議題。 而大眾所認知的道德及可隨意交換音樂的後續相關問題。 另一方面, 普及化的MP3 數位音樂應用被指責為讓音樂下載和分享成為有爭議的海盜行為問題圍攏著網際網路。 本項研究是從技術接受模型引伸而來 (TAM) Davis et al, (1989) 。技術接受模型提供對新技術的採納和用法水平的二個最顯要的因素: 被察覺的有用性, 和被察覺的易用性。由其它因素例如從心理學角度(TRA)來看待接受新的技術,然而我們提出新的假說針對與數位音樂。 關於在技術接受模型的態度和消費者的分享行為之間來做測試。 修改過的模型能知道技術接受模型和被開發以二個主要宗旨。 首先, 它應該改進理論的價值及加強行理解用戶使用上的行為何意願, 提供理論洞察。 第二, 修改過的模型應該提供一個理論依據的使用者模仿效果來求證分析可能的分享行為。 研究運用勘測格式提取資料,過LISERL 軟體來分析使用。 | zh_TW |
dc.description.abstract | The rapid development and improvement of the network infrastructure, coupled with the increasing trend of sharing, is radically changing the way music is created and distributed and further taking it into another stage. As the traditional way of music distribution evolves into digitalization, the new means of distribution draw an even bigger and wider scope of music enthusiasts and users. Digital music and digital contents and information are becoming ubiquitous driven by the widespread of high speed broadband. The spotlight would be on the public acceptance of this digital music and the MP3 exchanging issues behind. On the other hand, the widespread of digitalized MP3 music had placed the blame on free music downloading and sharing on the internet which is surrounded by controversial piracy issues.
This study is an extension of the technology acceptance model (TAM) by Fred Davis et al, (1989). TAM provides the two most influential factors that dictate the acceptance and usage level of new technology: the perceived usefulness, and perceived ease of use. By integrating other factors from the psychological side theory of planned behavior (TRA) that accept new technology, new hypotheses are being brought up. The relationship between the technology acceptance model attitude and consumer’s sharing behavior are tested. The modified model could be known as the integrated model of technology acceptance and is developed with two major objectives. First, it should improve our understanding of user acceptance behavior, providing theoretical insights on attitude and intention. Secondly, the integrated model should provide a theoretical basis using analysis approach that would enable to simulate the possible sharing behaviors. The research utilized survey format to extract data, which was in turn analyzed using the LISERL software. | en |
dc.description.provenance | Made available in DSpace on 2021-06-13T05:59:51Z (GMT). No. of bitstreams: 1 ntu-95-R93724082-1.pdf: 632786 bytes, checksum: e4f4f7671d71d8d6522bc1b980006928 (MD5) Previous issue date: 2006 | en |
dc.description.tableofcontents | Abstact 2
Table of Contents 4 Lists of Figures 6 List of Tables 7 Chapter 1 Introduction 8 1.1 Motivation and Background 8 1.2 The Emergence of MP3 9 1.3 Research Purpose 14 1.4 Organization of Thesis 15 Chapter 2 Literature Review 16 2.1 Technology Acceptance Model 16 2.2 Unified Theory of Acceptance and Use of Technology 18 2.3 Theory of Reasoned Action 21 2.4 Theory of Planned Behavior 22 2.5 Flow 24 2.6 Self-Efficacy 27 2.7 Risk of Downloading and Sharing 30 2.8 Intellectual Property Rights 33 Chapter 3 Research Methodology 37 3.1 Research Framework 37 3.2 Research Hypotheses 39 3.3 Sampling and Measurments 45 3.3.1 Design of the Questionnaires 45 3.3.2 Research Variable and Measurements 47 3.4 Statistical Approach 51 Chapter 4 Empirical Results 53 4.1 Sample Profiles 53 4.2 Goodness of-fit Indices 61 4.3 Results of Measurement Model 63 4.3.1 Evaluation of the Reliability 66 4.4 Results of Structural Model 70 4.5 Verifying the Hypotheses 72 4.6 Discussion 77 Chapter 5 Conclusions and Implications 82 5.1 Major Findings 84 5.2 Research Limitation 84 5.3 Direction for Future studies 85 Reference 87 Appendix A: Chinese Version of Survey 93 Appendix B: English Version of Survey 97 | |
dc.language.iso | en | |
dc.title | 技術接受模型之應用:以MP3數位音樂為例 | zh_TW |
dc.title | The Application of Technology Acceptance Model on MP3 Digital Music | en |
dc.type | Thesis | |
dc.date.schoolyear | 94-2 | |
dc.description.degree | 碩士 | |
dc.contributor.oralexamcommittee | 王仕茹(Shi-Ru Wong),趙義隆(Yi-Long Chao) | |
dc.subject.keyword | 技術接受模型,被察覺的有用性,被察覺的易用性,計畫性行為理論,數位音樂., | zh_TW |
dc.subject.keyword | Technology Acceptance Model,Perceived Usefulness,Theory of Planned Behavior,Theory of Reasoned Action,Digital Music., | en |
dc.relation.page | 100 | |
dc.rights.note | 有償授權 | |
dc.date.accepted | 2006-06-27 | |
dc.contributor.author-college | 管理學院 | zh_TW |
dc.contributor.author-dept | 國際企業學研究所 | zh_TW |
顯示於系所單位: | 國際企業學系 |
文件中的檔案:
檔案 | 大小 | 格式 | |
---|---|---|---|
ntu-95-1.pdf 目前未授權公開取用 | 617.96 kB | Adobe PDF |
系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。