請用此 Handle URI 來引用此文件:
http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/57968
完整後設資料紀錄
DC 欄位 | 值 | 語言 |
---|---|---|
dc.contributor.advisor | 許瑋元(Wei-Yuan Hsu) | |
dc.contributor.author | Chung-Yao Hwang | en |
dc.contributor.author | 黃重堯 | zh_TW |
dc.date.accessioned | 2021-06-16T08:04:00Z | - |
dc.date.available | 2017-07-11 | |
dc.date.copyright | 2014-07-11 | |
dc.date.issued | 2014 | |
dc.date.submitted | 2014-07-02 | |
dc.identifier.citation | Abrahamson, E. (1991). Managerial fads and fashions: the diffusion and rejection of innovations. Academy of Management Review, 16(3), 586-612.
Agrawal, R., & Srikant, R. (2000). Privacy-preserving data mining. ACM Sigmod Record, 29(2), 439-450. Altman, I. (1976). Privacy: a conceptual analysis. Environment and Behavior, 8(1), 7-29. Amason, A. C. (1996). Distinguishing the effects of functional and dysfunctional conflict on strategic decision making: resolving a paradox for top management teams. Academy of Management Journal, 39(1), 123-148. Bantel, K. A., & Jackson, S. E. (1989). Top management and innovations in banking: does the composition of the top team make a difference? Strategic Management Journal, 10(S1), 107-124. Bettini, C., Wang, X. S., & Jajodia, S. (2005). Protecting privacy against location-based personal identification. In Proceedings of the 2nd VLDB Workshop Secure Data Managemen, 185-199. Beldad, A., de Jong, M., & Steehouder, M. (2010). Reading the least read? Indicators of users' intention to consult privacy statements on municipal websites. Government Information Quarterly, 27(3), 238-244. Benlian, A., & Hess, T. (2011). Opportunities and risks of software-as-a-service: findings from a survey of IT executives. Decision Support Systems, 52(1), 232-246. Bowman, E. H., & Hurry, D. (1993). Strategy through the option lens: an integrated view of resource investments and the incremental-choice process. Academy of Management Review, 18(4), 760-782. Brewer, T. L. (1993). Government policies, market imperfections, and foreign direct investment. Journal of International Business Studies, 24(1), 101-120. Burgoon, J. K. (1982). Privacy and communication. Communication Yearbook, 6, 206-249. Burgoon, J. K., Parrott, R., Le Poire, B. A., Kelley, D. L., Walther, J. B., & Perry, D. (1989). Maintaining and restoring privacy through communication in different types of relationships. Journal of Social and Personal Relationships, 6(2), 131-158. Carter, D. L., & Katz, A. J. (1996). Computer crime: an emerging challenge for law enforcement. FBI Law Enforcement Bulletin, 65(12), 1-8. Certo, S. T., Lester, R. H., Dalton, C. M., & Dalton, D. R. (2006). Top management teams, strategy and financial performance: a meta‐analytic examination. Journal of Management Studies, 43(4), 813-839. Chang, S. E., & Ho, C. B. (2006). Organizational factors to the effectiveness of implementing information security management. Industrial Management & Data Systems, 106(3), 345-361. Chellappa, R. K., & Sin, R. G. (2005). Personalization versus privacy: an empirical examination of the online consumer’s dilemma. Information Technology and Management, 6(2-3), 181-202. Chen, H. L., Hsu, W. T., & Huang, Y. S. (2010). Top management team characteristics, R&D investment and capital structure in the IT industry. Small Business Economics, 35(3), 319-333. Child, J. (1972). Organizational structure, environment and performance: the role of strategic choice. Sociology, 6(1), 1-22. Chwelos, P., Benbasat, I., & Dexter, A. S. (2001). Research report: empirical test of an EDI adoption model. Information Systems Research, 12(3), 304-321. Damanpour, F. (1991). Organizational innovation: a meta-analysis of effects of determinants and moderators. Academy of Management Journal, 34(3), 555-590. Dembla, P., Palvia, P., & Krishnan, B. (2007). Understanding the adoption of web-enabled transaction processing by small businesses. Journal of Electronic Commerce Research, 1-17. Dholakia, R. R., & Kshetri, N. (2004). Factors impacting the adoption of the internet among SMEs. Small Business Economics, 23(4), 311-322. DiMaggio, P.J., Powell, WW (1991). The iron cage revisited: institutional isomorphism and collective rationality in organizational fields. The New Institutionalism in Organizational Analysis. The University of Chicago Press, London, 63-82. Dimnik, T. P., & Johnston, D. A. (1993). Manufacturing managers and the adoption of advanced manufacturing technology. Omega, 21(2), 155-162. Duncan, R. B. (1973). Multiple decision-making structures in adapting to environmental uncertainty: the impact on organizational effectiveness. Human Relations, 26(3), 273-291. Fornell, C., & Larcker, D. F. (1981). Structural equation models with unobservable variables and measurement error: algebra and statistics. Journal of Marketing Research, 18, 382-388. Fornell, C., & Bookstein, F. L. (1982). Two structural equation models: LISREL and PLS applied to consumer exit-voice theory. Journal of Marketing Research, 19(4), 440-452. Galaskiewicz, J., & Wasserman, S. (1989). Mimetic processes within an interorganizational field: an empirical test. Administrative Science Quarterly, 34(3), 454-479. Gefen, D., Straub, D. W., & Boudreau, M. C. (2000). Structural equation modeling and regression: guidelines for research practice. Communications of the AIS, 4(7). Grandon, E. E., & Pearson, J. M. (2004). Electronic commerce adoption: an empirical study of small and medium US businesses. Information & Management, 42(1), 197-216. Grover, V., Teng, J. T., & Fiedler, K. D. (1998). IS investment priorities in contemporary organizations. Communications of the ACM, 41(2), 40-48. Gummerus, J., Liljander, V., Pura, M., & Van Riel, A. (2004). Customer loyalty to content-based web sites: the case of an online health-care service. Journal of Services Marketing, 18(3), 175-186. Hsu, C. W. (2009). Frame misalignment: interpreting the implementation of information systems security certification in an organization. European Journal of Information Systems, 18(2), 140-150. Hsu, C., Lee, J. N., & Straub, D. W. (2012). Institutional influences on information systems security innovations. Information Systems Research, 23(3), 918-939. Hu, Q., & Quan, J. (2006). The institutionalization of IT budgeting: empirical evidence from the financial sector. Information Resources Management Journal, 19(1), 84-97. Hu, Q., Hart, P., & Cooke, D. (2006). The role of external influences on organizational information security practices: an institutional perspective. In Proceedings of the 39th Annual Hawaii International Conference on System Sciences, 6, 127 Hu, Q., Hart, P., & Cooke, D. (2007). The role of external and internal influences on information systems security–a neo-institutional perspective. The Journal of Strategic Information Systems, 16(2), 153-172. Iacovou, C. L., Benbasat, I., & Dexter, A. S. (1995). Electronic data interchange and small organizations: adoption and impact of technology. MIS Quarterly, 19(4), 465-485. Iaquinto, A. L., & Fredrickson, J. W. (1997). Top management team agreement about the strategic decision process: a test of some of its determinants and consequences. Strategic Management Journal, 18(1), 63-75. Jarvenpaa, S. L., & Ives, B. (1991). Executive involvement and participation in the management of information technology. MIS Quarterly, 15(2), 205-227. Johnston, A. C., & Warkentin, M. (2008). Information privacy compliance in the healthcare industry. Information Management & Computer Security, 16(1), 5-19. Juels, A., Syverson, P., & Bailey, D. (2006). High-power proxies for enhancing RFID privacy and utility. In Proceedings of the 5th Workshop on Privacy Enhancing Technologies, 210-226. Kantarcioglu, M., & Clifton, C. (2004). Privacy-preserving distributed mining of association rules on horizontally partitioned data. IEEE Transactions on Knowledge and Data Engineering, 16(9), 1026-1037. Kankanhalli, A., Teo, H. H., Tan, B. C., & Wei, K. K. (2003). An integrative study of information systems security effectiveness. International Journal of Information Management, 23(2), 139-154. Ke, W., Liu, H., Wei, K. K., Gu, J., & Chen, H. (2009). How do mediated and non-mediated power affect electronic supply chain management system adoption? The mediating effects of trust and institutional pressures. Decision Support Systems, 46(4), 839-851. Khalifa, M., & Davison, M. (2006). SME adoption of IT: the case of electronic trading systems. IEEE Transactions on Engineering Management, 53(2), 275-284. Kim, D. J., Ferrin, D. L., & Rao, H. R. (2008). A trust-based consumer decision-making model in electronic commerce: the role of trust, perceived risk, and their antecedents. Decision Support Systems, 44(2), 544-564. Knapp, K. J., Marshall, T. E., Rainer, R. K., & Ford, F. N. (2006). Information security: management's effect on culture and policy. Information Management & Computer Security, 14(1), 24-36. Kor, Y. Y. (2006). Direct and interaction effects of top management team and board compositions on R&D investment strategy. Strategic Management Journal, 27(11), 1081-1099. Kotulic, A. G., & Clark, J. G. (2004). Why there aren’t more information security research studies. Information & Management, 41(5), 597-607. Kuan, K. K., & Chau, P. Y. (2001). A perception-based model for EDI adoption in small businesses using a technology–organization–environment framework. Information & Management, 38(8), 507-521. Lawler, J. P., & Molluzzo, J. C. (2010). A study of the perceptions of students on privacy and security on social networking sites (SNS) on the internet. Journal of Information Systems Applied Research, 3(12), 3-18. Lawson, R., Alcock, C., Cooper, J., & Burgess, L. (2003). Factors affecting adoption of electronic commerce technologies by SMEs: an Australian study. Journal of Small Business and Enterprise Development, 10(3), 265-276. Leino-Kilpi, H., Valimaki, M., Dassen, T., Gasull, M., Lemonidou, C., Scott, A., & Arndt, M. (2001). Privacy: a review of the literature. International Journal of Nursing Studies, 38(6), 663-671. Liang, H., Saraf, N., Hu, Q., & Xue, Y. (2007). Assimilation of enterprise systems: the effect of institutional pressures and the mediating role of top management. MIS Quarterly, 31(1), 59-87. Lieberman, M. B., & Montgomery, D. B. (1988). First‐mover advantages. Strategic Management Journal, 9(S1), 41-58. Liu, C., Marchewka, J. T., Lu, J., & Yu, C. S. (2004). Beyond concern: a privacy–trust–behavioral intention model of electronic commerce. Information & Management, 42(1), 127-142. Luarn, P., & Lin, H. H. (2005). Toward an understanding of the behavioral intention to use mobile banking. Computers in Human Behavior, 21(6), 873-891. Martinsons, M. G., & Davison, R. M. (2007). Strategic decision making and support systems: comparing American, Japanese and Chinese management. Decision Support Systems, 43(1), 284-300. Mason, R. O. (1986). Four ethical issues of the information age. MIS Quarterly, 10(1), 5-12. Mizruchi, M. S., & Fein, L. C. (1999). The social construction of organizational knowledge: a study of the uses of coercive, mimetic, and normative isomorphism. Administrative Science Quarterly, 44(4), 653-683. Nunnally, J.C., (1978), Psychometric Theory, New York: McGraw Ohkubo, M., Suzuki, K., & Kinoshita, S. (2005). RFID privacy issues and technical challenges. Communications of the ACM, 48(9), 66-71. Ong, C. S., Lai, J. Y., & Wang, Y. S. (2004). Factors affecting engineers’ acceptance of asynchronous e-learning systems in high-tech companies. Information & Management, 41(6), 795-804. Premkumar, G., & Roberts, M. (1999). Adoption of new information technologies in rural small businesses. Omega, 27(4), 467-484. Puhakainen, P., & Siponen, M. (2010). Improving employees' compliance through information systems security training: an action research study. MIS Quarterly, 34(4), 757-778. Rai, A., & Bajwa, D. S. (1997). An empirical investigation into factors relating to the adoption of executive information systems: an analysis of EIS for collaboration and decision support. Decision Sciences, 28(4), 939-974. Riemenschneider, C. K., Harrison, D. A., & Mykytyn Jr, P. P. (2003). Understanding IT adoption decisions in small business: integrating current theories. Information & Management, 40(4), 269-285. Rogers, E. M. (1995). Diffusion of innovations. New York: Free Press. Sack, R. D. (1983). Human territoriality: a theory. Annals of the Association of American Geographers, 73(1), 55-74. Sanders, G. L., & Courtney, J. F. (1985). A field study of organizational influencing DSS success. MIS Quarterly, 9(1) , 77-93. Scott, W.R. (1995). Institutions and organizations. Sage Publications, Thousand Oaks, CA. Sipior, J. C., Ward, B. T., & Rainone, S. M. (1998). Ethical management of employee e-mail privacy. Information Systems Management, 15(1), 41-47. Smith, A., & Hayton, G. (1999). What drives enterprise training? Evidence from Australia. International Journal of Human Resource Management, 10(2), 251-272. Smith, H. J., Milberg, S. J., & Burke, S. J. (1996). Information privacy: measuring individuals' concerns about organizational practices. MIS Quarterly, 20(2), 167-196. Sommer, R., 1969. Personal space. The behavioral basis of design. Prentice-Hall, Englewood Cliffs, New Jersey. Stone, E. F., Gueutal, H. G., Gardner, D. G., & McClure, S. (1983). A field experiment comparing information-privacy values, beliefs, and attitudes across several types of organizations. Journal of Applied Psychology, 68(3), 459. Suh, B., & Han, I. (2003). The impact of customer trust and perception of security control on the acceptance of electronic commerce. International Journal of Electronic Commerce, 7(3), 135-161. Takabi, H., Joshi, J. B., & Ahn, G. J. (2010). Security and privacy challenges in cloud computing environments. IEEE Security & Privacy, 8(6), 24-31. Teo, H. H., Wei, K. K., & Benbasat, I. (2003). Predicting intention to adopt interorganizational linkages: an institutional perspective. MIS Quarterly, 27(1), 19-49. To, M. L., & Ngai, E. W. (2006). Predicting the organisational adoption of B2C e-commerce: an empirical study. Industrial Management & Data Systems, 106(8), 1133-1147. Wang, C., Wang, Q., Ren, K., & Lou, W. (2010). Privacy-preserving public auditing for data storage security in cloud computing. In Proceedings of IEEE INFOCOM, 1-9. Warkentin, M., Johnston, A. C., & Shropshire, J. (2011). The influence of the informal social learning environment on information privacy policy compliance efficacy and intention. European Journal of Information Systems, 20(3), 267-284. Warren, S. D., & Brandeis, L. D. (1890). The right to privacy. Harvard Law Review, 4(5), 193-220. Weiner, N., & Mahoney, T. A. (1981). A model of corporate performance as a function of environmental, organizational, and leadership influences. Academy of Management Journal, 24(3), 453-470. Weinstein, M. A. (1971). The uses of privacy in the good life. Privacy: Nomos XIII, 94. Whitman, M. E. (2003). Enemy at the gate: threats to information security. Communications of the ACM, 46(8), 91-95. Wiersema, M. F., & Bantel, K. A. (1992). Top management team demography and corporate strategic change. Academy of Management Journal, 35(1), 91-121. Wu, W. W. (2011). Developing an explorative model for SaaS adoption. Expert Systems with Applications, 38(12), 15057-15064. Yen, C. H., & Lu, H. P. (2008). Effects of e-service quality on loyalty intention: an empirical study in online auction. Managing Service Quality, 18(2), 127-146. Yousafzai, S. Y., Pallister, J. G., & Foxall, G. R. (2003). A proposed model of e-trust for electronic banking. Technovation, 23(11), 847-860. Zhu, K., Dong, S., Xu, S. X., & Kraemer, K. L. (2006). Innovation diffusion in global contexts: determinants of post-adoption digital transformation of European companies. European Journal of Information Systems, 15(6), 601-616. | |
dc.identifier.uri | http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/57968 | - |
dc.description.abstract | 近年來,對組織來說,保護資訊隱私的重要性是越來越高,然而組織對於保護資訊隱私所做的投資是有所不足的,因此本研究將探討該如何讓組織增加在保護資訊隱私上的投資。過往的研究發現,組織的決策相當容易受到高階主管與外在因素的影響,因此本研究以高階主管與制度理論為基礎,去探討組織對於保護資訊隱私之投資意圖。
本研究以發放問卷來收集資料,共收集95份有效樣本,並以偏最小平方法(Partial Least Squares, PLS)來檢驗研究假設。本研究發現高階主管信念會正面影響組織對於保護資訊隱私之投資意圖,而制度理論中的強制壓力、模仿壓力與規範壓力皆會正面影響高階主管信念。本研究的結果建議,如果要讓組織增加在保護資訊隱私上的投資,應透過一些外在因素讓高階主管對於保護資訊隱私產生正面想法。 | zh_TW |
dc.description.abstract | In the past few years, the importance of information privacy protection has increasingly become important in organizations. However, the investment of information privacy protection is limited owing to the budget constraints. In this study, we focus on the role of top management and draw on the institutional theory to identify the factors that might affect the managerial decision on the level of information privacy investment in organization.
We conduct our empirical test through the distribution of questionnaires. We find out top management beliefs will positively affect organizations’ investment intention on information privacy. Results also suggest that coercive pressures, mimetic pressures and normative pressures will positively affect top management beliefs. Our results suggest that it would be effective to encourage top management to invest more in privacy protection through developing more positive belief via institutional influence. | en |
dc.description.provenance | Made available in DSpace on 2021-06-16T08:04:00Z (GMT). No. of bitstreams: 1 ntu-103-R01725030-1.pdf: 562794 bytes, checksum: 66d56e5f54007da2e00b97c049babc79 (MD5) Previous issue date: 2014 | en |
dc.description.tableofcontents | 致謝 i
摘要 ii Abstract iii 圖目錄 v 表目錄 vi 第一章 導論 1 第一節 研究背景與動機 1 第二節 研究目的 4 第三節 研究問題 5 第四節 研究架構與流程 5 第二章 文獻探討 7 第一節 隱私的起源與種類 7 第二節 隱私相關技術類文獻 9 第三節 隱私相關管理類文獻 12 第三章 研究架構 17 第一節 高階主管 17 第二節 制度理論 20 第四章 研究方法 25 第一節 問卷設計 25 第二節 前測與試測 26 第五章 資料分析 29 第一節 樣本資料分析 29 第二節 信效度分析 31 第三節 偏最小平方分析 34 第六章 結論與建議 37 第一節 研究結果 37 第二節 研究貢獻 39 第三節 研究限制 41 第四節 未來研究建議 42 參考文獻 44 附錄一 正式問卷 55 | |
dc.language.iso | zh-TW | |
dc.title | 以制度理論探討高階主管對保護資訊隱私之投資意圖 | zh_TW |
dc.title | Top Management’s Intention on Information Privacy Investment:An Institutional Approach | en |
dc.type | Thesis | |
dc.date.schoolyear | 102-2 | |
dc.description.degree | 碩士 | |
dc.contributor.oralexamcommittee | 張欣綠(Hsin-Lu Chang),戴基?(Chi-Feng Tai) | |
dc.subject.keyword | 資訊隱私,投資意圖,高階主管,制度理論, | zh_TW |
dc.subject.keyword | Information Privacy,Investment Intention,Top Management,Institutional Theory, | en |
dc.relation.page | 58 | |
dc.rights.note | 有償授權 | |
dc.date.accepted | 2014-07-02 | |
dc.contributor.author-college | 管理學院 | zh_TW |
dc.contributor.author-dept | 資訊管理學研究所 | zh_TW |
顯示於系所單位: | 資訊管理學系 |
文件中的檔案:
檔案 | 大小 | 格式 | |
---|---|---|---|
ntu-103-1.pdf 目前未授權公開取用 | 549.6 kB | Adobe PDF |
系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。