跳到主要內容

簡易檢索 / 詳目顯示

研究生: 王振浩
Zhin-Hou Wang
論文名稱: 影響消費者採用網路銀行行為意向之因素研究
指導教授: 范錚強
Cheng-Kiang Farn
口試委員:
學位類別: 碩士
Master
系所名稱: 管理學院 - 資訊管理學系
Department of Information Management
畢業學年度: 89
語文別: 中文
論文頁數: 68
中文關鍵詞: 網路銀行知覺風險計畫行為理論創新擴散理論科技接受模型
相關次數: 點閱:29下載:0
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報

  • 本研究以「計畫行為理論」作為解釋消費者採用網路銀行行為意向的理論基礎。再由「創新擴散理論」、「科技接受模型」,探討「相對優勢」、「知覺易用性」、「相容性」對於消費者採用網路銀行「態度」的影響。及「計畫行為理論」中對控制信念的探討,將其解構為「自我效能」與「便利的狀態」,探討消費者在採用網路銀行時對「知覺行為控制」影響。
    本研究設計以「問卷調查法」進行,共143位受測樣本。經實徵研究的結果發現,當消費者具有愈正向的「態度」與愈正向的「主觀規範」時,對其採用網路銀行的「行為意向」愈高。同時當消費者知覺到愈高的「相對優勢」與愈高的「相容性」時,對其採用網路銀行的「態度」愈正向,以及當消費者具有愈高的「自信心」與愈高的「便利的狀態」時,對其採用網路銀行的「知覺行為控制」愈高。


    目錄 目錄I 圖目錄III 表目錄IV 第一章緒論1 第一節研究背景1 第二節研究動機2 第三節研究目的3 第四節研究範圍3 第五節論文架構與研究程序3 第二章文獻探討6 第一節網路銀行6 第二節行為理論基礎10 第三節知覺風險20 第四節創新擴散理論22 第五節小結24 第三章研究模型與方法26 第一節研究模型26 第二節研究假說28 第三節變數定義與操作化39 第四節問卷設計45 第五節研究設計47 第六節資料分析方法48 第四章資料分析50 第一節樣本基本資料分析50 第二節效度與信度檢定52 第三節假說檢定56 第五章結論與建議63 第一節研究結果63 第二節管理實務建議65 第三節研究限制66 第四節未來研究建議67 參考文獻69 一、中文部分69 二、英文部分70 附錄一 試測問卷75 附錄二 正式問卷79 圖目錄 圖1-1 研究程序5 圖2-1 慎思行動理論11 圖2-2 計畫行為理論14 圖2-3 科技接受模型18 圖3-1 研究模型28 圖3-2 構念因素關係圖38 圖3-3 資料分析流程49 圖4-1 迴歸係數估計結果62 表目錄 表2-1 銀行各服務管道比較表9 表3-1 研究假說彙整 38 表3-2 變數操作化彙整44 表3-3 試測問卷之信度分析表47 表4-1 樣本資料來源 50 表4-2 樣本基本特性表51 表4-3 與「態度」相關的構念因素分析53 表4-4 與「知覺行為控制」相關的構念因素分析54 表4-5 「主觀規範」、「知覺風險」、「行為意向」構念因素分析 55 表4-6 本研究各構念信度56 表4-7 影響「行為意向」因素的複迴歸分析57 表4-8 影響「行為意向」各因素構面敘述統計分析58 表4-9 影響行為「態度」因素的複迴歸分析59 表4-10 影響「知覺行為控制」因素的複迴歸分析60 表4-11 研究假說檢定結果彙整表61

    一、中文部分
    1. 王存國,「資訊密度在組織特性與資訊科技角色間的中介性」,第八屆國際資訊管理學術研討會論文集,1997年5月。
    2. 江怡慧、陳怡樺,「網路銀行使用者之行為分析」,產業金融,第107期,2000年6月,頁88-102。
    3. 林名正,「網路銀行能為你做什麼?」,數位周刊,第33期,2001年4月,頁68-73。
    4. 吳肇銘,「影響網站使用意向之因素研究─以入門網站為例」,國立中央大學資訊管理研究所未出版之博士論文,1999年。
    5. 李怡菁,「等待型態與等待發生的時點對消費者行為影響之研究--以網路銀行為例」,國立中央大學資訊管理研究所未出版之碩士論文,1999年。
    6. 周景弘,「網路銀行安全性對使用者知覺風險與使用意願之影響」,國立台灣大學會計學研究所未出版之碩士論文,1997年。
    7. 徐蕙萍,「網路銀行之風險分析與安全控管」,財金資訊,2001年4月。
    8. 黃智強,「影響採用網路購物因素之研究─以網路書店為例」,國立中央大學資訊管理研究所未出版之碩士論文,2000年。
    9. 馮炫竣,「消費者使用電子銀行之行為研究--以ATM、電話銀行及網路銀行為例」,私立元智大學管理研究所未出版之碩士論文,2000年。
    10. 楊國樞、文崇一、吳聰賢、李亦園,「社會及行為科學研究法」,東華,1997年。
    11. 蔡佩鈴,「台灣高科技廠商使用網路銀行之相關因素研究」,國立交通大學經營管理研究所未出版之碩士論文,2000年。
    12. 網際網路資訊情報中心,「蕃薯藤2000年台灣網路使用大調查結果出爐」,2001年,,Accessed June 1, 2001。
    二、英文部分
    1. Ajzen, Icek and Martin Fishbein (1980), Understanding Attitude and Predicting Social Behavior, Englewood Cliffs, N.J.: Prentice-Hall.
    2. Ajzen, Icek (1985), “From Intention to Action: A Theory of Planned Behavior,” in Julius Kuhl and Jurgen Beckmann, ed., Action Control: From Cognition to Behavior, Heidelberg: Springer-Verlag.
    3. Ajzen, Icek and Thomas J. Madden (1986), “Prediction of Goal-Directed Behavior: Attitude, Intention, and Perceived Behavioral Control,” Journal of Experimental Social Psychology, 22, p. 453-474.
    4. Ajzen, Icek (1988), Attitudes, Personality, and Behavior, Chicago, IL: The Dorsey Press.
    5. Ajzen, Icek (1991), “The Theory of Planned Behavior,” Organization Behavior and Human Decision Processes, 50, p. 179-211.
    6. Bagozzi, Richard P. (1981), “Attitude, Intention, and Behavior: A Test of Some Key Hypotheses,” Journal of Personality and Social Psychology, 41, p. 607-627.
    7. Bagozzi, Richard P. and Paul R. Warshaw (1990), “Trying to Consume,” Journal of Consumer Research, 17(2), p. 127-140.
    8. Bagozzi, Richard P., Hans Baumgartner and Youjae Yi (1992), “State Versus Action Orientation and the Theory of Reasoned Action,” Journal of Consumer Research, 18(4), p. 505-528.
    9. Bandura, Albert (1977), “Self-Efficacy: Toward a Unifying Theory of Behavioral Change,” Psychological Review, 84, p. 191-215.
    10. Bandura, Albert (1982), “Self-Efficacy Mechanism in Human Agency,” American Psychologist, 37, p. 122-147.
    11. Bauer, Raymond A. (1960), “Consumer Behavior as Risk Taking,” in R. S. Hancock, ed., Dynamic Marketing for a Changing World, Chicago: American Marketing Association, p. 389-393.
    12. Busselle, Rick, Joey Reagan, Bruce Pinkleton and Kim Jackson (1999), “Factors Affecting Internet Use in a Saturated-Access Population,” Telematics and Informatics, 16(1-2), p. 45-58.
    13. Compeau, Deborah R. and Christopher A. Higgins (1991), “A Social Cognitive Theory Perspective on Individual Reactions to Computing Technology,” in J. I. DeGross et al., eds., Proceeding of the 12th International Conference on Information Systems, New York, p. 187-198.
    14. Compeau, Deborah R. and Christopher A. Higgins (1995), “Computer Self-Efficacy: Development of a Measure and Initial Test,” MIS Quarterly, 19(2), p. 189-211
    15. Cooper, R. G. (1997), “Examining Some Myths About New Product Winners,” in Katz, R., ed., The Human Side of Managing Technological Innovation, Oxford, p. 550-560.
    16. Cox, Donald F. ( 1967), “Risk Handling in Consumer Behavior — An Intensive Study of Two Cases,” in Donald F. Cox, ed., Risk Taking and Information Handling in Consumer Behavior, Boston: Harvard University Press, p. 34-81.
    17. Coyne, Kevin P. and Renee Dye (1998), “The Competitive Dynamics of Network-Based Business,” Harvard Business Review, 76(1), p. 99-109.
    18. Cunningham, S. M. (1967), “The Major Dimension of Perceived Risk,” in Donald F. Cox, ed., Risk Taking and Information Handling in Consumer Behavior, Boston: Harvard University Press, p. 82-108.
    19. Davis, Fred D. (1986), A Technology Acceptance Model for Empirically Testing New End-User Information Systems: Theory and Results, Unpublished Ph. D. Dissertation, Sloan School of Management, MIT.
    20. Davis, Fred D., Richard P. Bagozzi and Paul R. Warshaw (1989), “User Acceptance of Computer Technology: A Comparison of Two Theoretical Model,” Management Science, 35(8), p. 982-1003.
    21. Davis, Fred D. (1989), “Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology,” MIS Quarterly, 13(3), p. 319-340.
    22. DeLone, William H. and Ephraim R. McLean (1992), “Information Systems Success: The Quest for the Dependent Variable,” Information Systems Research, 3(1), p. 60-95.
    23. Dowling, Grahame R. and Richard Staelin (1994), “A Model of Perceived Risk and Intended Risk-Handling Activity,” Journal of Consumer Research, 21(1), p. 119-134.
    24. Eagly, Alice H. and Shelly Chaiken (1993), The Psychology of Attitude, NY: Harcourt, Brace, Jovonovich.
    25. Evans, Philp B. and Thomas S. Wurster (1997), “Strategy and the New Economics of Information,” Harvard Business Review, 75(5), p. 71-82.
    26. Fishbein, Martin and Icek Ajzen (1975), Belief, Attitude, Intention, and Behavior: An Introduction to Theory and Research, Reading, MA: Addison-Wesley.
    27. Guseman, D. S. (1981), “Risk Perception and Risk Reduction in Consumer Services,” in J. M. Donnely and W. R. George, eds., in Proc., Chicago: American Marketing Association, p. 200-204.
    28. Hair, Joseph F., Rolph E. A., Ronald L. T. and William C. B. (1995), Multivariate Data Analysis: Fourth Edition, Prentice-Hall.
    29. Hamill, Jim (1997), “The Internet and International Marketing,” International Marketing Review, 14(5), p. 300-323.
    30. Harrison, David A., Peter P. Mykytyn, Jr. and Cynthia K. Riemenschneider (1997), “Executive Decisions About Adoption of Information Technology in Small Business: Theory and Empirical Tests,” Information Systems Research, 8(2), p. 171-195.
    31. Hawke, John D. Jr. (2001), “The Internet Impact,” Independent Banker, 51(3), p. 32-38.
    32. Henderson, R., D. Rickwood and P. Roberts (1998), “The Beta Test of an Electronic Supermarket,” Interacting with Computers, 10(4), p. 385-399.
    33. Hickman, Meredith (1999), “Internet Banking: Transaction to Active Selling,” Banks Systems and Technology, 36(10), p. s3, s14.
    34. Jackson, Cynthia M., Simeon Chow and Robert A. Leitch (1997), “Toward an Understanding of the Behavioral Intention to Use an Information System,” Decision Science, 28(2), p. 357-389.
    35. Jacoby, J. and Leon B. Kaplan (1972), “The Components of Perceived Risk,” in M. Venkatesan, ed., Proceedings of Third Annual Conference, Association for Consumer Research, p. 382-393.
    36. Karahanna, Elena and Detmar W. Straub (1999), “The Psychological Origins of Perceived Usefulness and Ease-of-Use,” Information and Management, 35(4), p. 237-250.
    37. Klobas, Jane E. (1995), “Beyond Information Quality: Fitness for Purpose and Electronic Information Resource Use,” Journal of Information Science, 21(2), p. 95-114.
    38. Klobas, Jane E. and Laurel A. Clyde (2000), “Adults Learning to Use the Internet: A Longitudinal Study of Attitudes and Other Factors Associated with Intended Internet Use,” Library and Information Science Research, 22(1), p. 5-34.
    39. Liao, Shaoyi, Yuan Pu Shao, Huaiqing Wang and Ada Chen (1999), “The Adoption of Virtual Banking: An Empirical Study,” International journal of Information Management, 19(1), p. 63-74.
    40. Liker, Jeffrey K. and Ahmed A. Sindi (1997), “User Acceptance of Expert Systems: A Test of the Theory of Reasoned Action,” Journal of Engineering and Technology Management, 14(2), p. 147-173.
    41. Lin, Judy Chuan-Chuan and Hsipeng Lu (2000), “Towards an Understanding of the Behavioral Intention to Use a Web Site,” International Journal of Information Management, 20(3), p. 197-208.
    42. Mahan, James S. III (1996), “Banking on the Internet at Security First Network Bank,” Journal of Retail Banking Services, 18(3), p. 23-27.
    43. Maignan, Isabelle and Bryan A. Lukas (1997), “The Nature and Social Uses of the Internet: A Qualitative Investigation,” The Journal of Consumer Affairs, 31(2), p. 346-371.
    44. Mathieson, Kieran (1991), “Predicting User Intentions: Comparing the Technology Acceptance Model with the Theory of Planned Behavior,” Information Systems Research, 2(3), p. 173-191.
    45. Mitchell, V. W. and M. Greatorex (1993), “Risk Perception and Reduction in the Purchase of Consumer Services,” The Service Industries Journal, 13(4), p. 179-200.
    46. Moon, Ji-Won and Young-Gul Kim (2001), “Extending the TAM for a World-Wide-Web Context,” Information and Management, 38(4), p. 217-230.
    47. Moore, Gary C. and Izak Benbasat (1991), “Developmetn of an Instrument to Measure the Perceptions of Adoption an Information Technology Innovation,” Information Systems Research, 2(3), p. 192-222.
    48. Mykytyn, Peter P. and David A. Harrison (1993), “The Application of the Theory of Reasoned Action to Senior Management and Strategic Information Systems,” Information Resources Management Journal, 6(2), p. 15-26.
    49. Rogers, Everett M. (1983), Diffusion of Innovations: Third Edition, New York: Free Press.
    50. Rogers, Wendy A., D. Kristen Gilbert and Elizabeth Fraser (1997), “An Analysis of Automatic Teller Machine Usage by Older Adults: A Structured Interview Approach,” Applied Ergonomics, 28(3), p. 173-180.
    51. Roselius, Ted (1971), “Consumer Rankings of Risk Reduction Methods,” Journal of Marketing, 35, p. 56-61.
    52. Sathye, Milind (1999), “Adoption of Internet Banking by Australian Consumers: An Empirical Investigation,” International Journal of Bank Marketing, 17(7), p. 324-334.
    53. Schwab, Donald P. (1980), “Construct Validity in Organizational Behavior,” in Barry M. Staw and Larry L. Cummings, eds., Research in Organizational Behavior, 2, p. 3-34.
    54. Shimp, Terence A. and Alican Kavas (1984), “The Theory of Reasoned Action Applied to Coupon Usage,” Journal of Consumer Research, 11(3), p. 795-809.
    55. Sneddon, Mark (1997), “Cyberbanking: Remote Banking Using the Internet,” Australian Business Law Review, 25(1), p. 64-67.
    56. Swaminathan, Vanitha, Elzbieta Lepkowska-White and Bharat P. Rao (1999), “Browsers or Buyers in Cyberspace? An Investigation of Factors Influencing Electronic Exchange,” Journal of Computer-Mediated Communication, 5(2), , Accessed April 6, 2001.
    57. Takacs, Scott J. and Jon B. Freiden (1998), “Changes on the Electronic Frontier: Growth and Opportunity of the World-Wide Web,” Journal of Marketing Theory and Practice, 16(3), p. 24-37.
    58. Tan, Soo Jiuan (1999), “Strategies for Reducing Consumers’ Risk Aversion in Internet Shopping,” Journal of Consumer Marketing, 16(2), p. 163-180.
    59. Taylor, Shirley and Peter A. Todd (1995a), “Decomposition and Crossover Effect in the Theory of Planned Behavior: A Study of Consumer Adoption Intentions,” International Journal of Research in Marketing, 12(2), p. 137-155.
    60. Taylor, Shirley and Peter A. Todd (1995b), “Understanding Information Technology Usage: A Test of Competing Models,” Information System Research, 6(2), p. 144-177.
    61. Teo, Thompson S. H., Vivien K. G. Lim and Raye Y. C. Lai (1999), “Intrinsic and extrinsic motivation in Internet usage,” Omega, 27(1), p. 25-37.
    62. Thong, James Y. L. (1999), “An Integrated Model of Information Systems Adoption in Small Business,” Journal of Management Information Systems, 15(4), p. 187-214.
    63. Triandis, Harry C. (1979), “Values, Attitudes, and Interpersonal Behavior,” in Nebraska Symposium on Motivation: Beliefs, Attitudes, and Values, University of Nebraska Press, Lincoln, NE, p, 195-259.
    64. Venkatesh, Viswanath and Fred D. Davis (1996), “A Model of the Antecedents of Perceived Ease of Use: Development and Test,” Decision Sciences, 27(3), p. 451-481.
    65. Weisul, Kimberly (1997), “Consultant Study Sees Big Future for On-Line Corporate Banking,” Investment Dealers Digest, 63(18), p. 15

    QR CODE
    :::