跳到主要內容

簡易檢索 / 詳目顯示

研究生: 韓翔陵
Hsiang-Ling Han
論文名稱: 隱私機制對行動銀行使用意圖知覺之研究
指導教授: 范懿文
蘇雅惠
口試委員:
學位類別: 碩士
Master
系所名稱: 管理學院 - 資訊管理學系
Department of Information Management
論文出版年: 2016
畢業學年度: 104
語文別: 中文
論文頁數: 88
中文關鍵詞: 行動銀行隱私機制資訊隱私顧慮
外文關鍵詞: Mobile Banking, Privacy mechanism, Information privacy concerns
相關次數: 點閱:20下載:0
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • 隨著智慧型手機的用戶快速成長,行動網路普及率大增,越來越多的銀行業務都可
    以透過手機來完成,也能夠提供客製化的服務給顧客。當銀行開始涉及每個人的生活時,
    勢必需要存取客戶的隱私資訊,此時使用者是否願意分享隱私資料給銀行的問題也相對
    受到重視。本研究透過行動銀行資訊分享模型(Mobile bank Information Sharing Model,
    MBIS Model),探討當銀行提供不同的隱私機制時,是否能夠提升使用者對於隱私資訊
    的分享意圖?研究方法根據隱私機制的不同而設計兩種問卷,調查對象為對金融產品、
    銀行產業有初步認知者、且目前不願意分享個人的資訊隱私。
    研究結果發現,透過隱私機制確實可以提升使用者對行動銀行的信任知覺以及降低
    使用時的知覺風險態度,進而影響後續的使用意圖知覺,但不同的隱私機制有不同的效
    果,提供隱私機制類別為「隱私賦權」會有較顯著的效果。期望本研究能夠在未來銀行
    在推行行動服務時,提供適當的決策方向,降低顧客個人隱私資訊的顧慮,並提升對行
    動銀行的使用意圖知覺。


    Along with the rapid growth of smart phone users, mobile Internet penetration increased,
    more and more of banking service can be done by smart phone, it can also provide customized
    services to customers. When mobile bank began to touch everyone's life, it will access the
    customer's private information, and in this time, it will be the important issue whether user is
    willing to share the private information. In this study, sharing information through mobile
    banking model (Mobile bank Information Sharing Model, MBIS Model), to explore when
    banks offer different privacy mechanism, the user is able to enhance the privacy of
    information shared intention? Methods depending on privacy mechanisms to design two kinds
    of questionnaire survey for the subjects who is interesting in financial products, banking
    industry, and unwilling to share personal information private.
    The results found that through the mechanism of privacy can really enhance the user's
    trust perception and reduce perceived risk perception, indirect effecting subsequent intended
    use perception, but different privacy mechanisms have different effects, providing privacy
    mechanism category "Privacy empowerment" will be more significant effect. This study
    expected when the mobile bank service will be implemented in the future, providing
    appropriate policy direction, to reduce customer concerns about the privacy of personal
    information, and to enhance the use of mobile banking intentions.

    摘要 ............................................................................................................................................. i Abstract ....................................................................................................................................... ii 第一章 緒論 .............................................................................................................................. 1 1-1 研究背景與動機 ......................................................................................................... 1 1-2 研究重要性 ................................................................................................................. 5 1-3 研究目的與問題 ......................................................................................................... 6 1-4 論文章節 ..................................................................................................................... 7 第二章 文獻探討 ...................................................................................................................... 8 2-1 銀行的演進 ................................................................................................................. 8 2-2 行動銀行 ................................................................................................................... 12 2-3 資訊隱私顧慮 ........................................................................................................... 19 2-4 信任知覺及知覺風險態度 ....................................................................................... 23 2-5 隱私機制 ................................................................................................................... 28 第三章 研究方法 .................................................................................................................... 33 3-1 研究架構 ................................................................................................................... 33 3-2 研究假說 ................................................................................................................... 34 3-3 變數的操作型定義與衡量 ....................................................................................... 38 3-4 調查對象與問卷設計 ............................................................................................... 43 3-5 資料分析方法 ........................................................................................................... 44 第四章 資料分析 .................................................................................................................... 46 4-1 前測樣本回收與資料分析 ....................................................................................... 46 4-2 問卷發放與回收 ....................................................................................................... 51 4-3 問卷樣本之統計與信效度分析 ............................................................................... 52 4-4 結構模型分析 ........................................................................................................... 54 4-5 使用者族群之差異分析 ........................................................................................... 60 第五章 結論與建議 ................................................................................................................ 62 5-1 研究結論 ................................................................................................................... 62 5-2 管理意涵 ................................................................................................................... 65 5-3 研究限制 ................................................................................................................... 66 5-4 研究方向 ................................................................................................................... 66 參考文獻 .................................................................................................................................. 68 附錄 問卷內容 ........................................................................................................................ 74

    68

    參考文獻
    一、 英文部分
    [1] Ajzen, I. and M. Fishbein (1980). "Understanding attitudes and predicting social
    behaviour."

    [2] Baird, I. S. and H. Thomas (1985). "Toward a contingency model of strategic risk
    taking." Academy of Management review 10(2): 230-243.

    [3] Bauer, R. (1960). Consumer Behavior as Risk Taking. W: Dynamic Marketing for a
    Changing World. Red. RS Hancock. Proceedings of the 43rd Conference of the
    American Marketing Association, Chicago.

    [4] Byrne, B. M., R. J. Shavelson and B. Muthén (1989). "Testing for the equivalence of
    factor covariance and mean structures: The issue of partial measurement invariance."
    Psychological bulletin 105(3): 456.

    [5] Chaudhuri, A. and M. B. Holbrook (2001). "The chain of effects from brand trust and
    brand affect to brand performance: the role of brand loyalty." Journal of marketing 65(2):
    81-93.

    [6] Chou, C.-P. and P. M. Bentler (1995). "Estimates and tests in structural equation
    modeling."

    [7] Cox, D. F. (1964). " Perceived Risk and Consumer Decision-Making: The Case of
    Telephone Shopping" Journal of marketing research 1(4): 32-39.

    [8] D Harrison McKnight, N. L. C. (2001). "What trust means in e-commerce customer
    relationships: an interdisciplinary conceptual typology." International Journal of
    Electronic Commerce 6(2): 35-59.

    [9] Dowling, G. R. and R. Staelin (1994). "A model of perceived risk and intended
    risk-handling activity." Journal of consumer research: 119-134.
    69

    [10] Fornell, C. and D. F. Larcker (1981). "Structural equation models with unobservable
    variables and measurement error: Algebra and statistics." Journal of marketing research:
    382-388.

    [11] Gormley, K. (1992). "One hundred years of privacy." Wis. L. Rev.: 1335.

    [12] Guilford, J. (1965). Fundamental statistics in psychology and education 4th Ed.

    [13] Hair, J. F., W. C. Black, B. J. Babin, R. E. Anderson and R. L. Tatham (2006).
    Multivariate data analysis, Pearson Prentice Hall Upper Saddle River, NJ.

    [14] Hetcher, S. A. (2001). "Norm Proselytizers Create a Privacy Entitlement in Cyberspace."
    Berkeley Technology Law Journal: 877-935.

    [15] Hoffman, D. L., T. P. Novak and M. Peralta (1999). "Building consumer trust online."
    Communications of the ACM 42(4): 80-85.

    [16] Hourahine, B. and M. Howard (2004). "Money on the move: Opportunities for financial
    service providers in the ‘third space’." Journal of Financial Services Marketing 9(1):
    57-67.

    [17] Jaccard, J. and R. Turrisi (2003). Interaction effects in multiple regression, Sage.

    [18] Jacoby, J. and L. B. Kaplan (1972). "The components of perceived risk." Advances in
    consumer research 3(3): 382-383.

    [19] Jarvenpaa, S. L., N. Tractinsky and L. Saarinen (1999). "Consumer trust in an internet
    store: a cross‐cultural validation." Journal of Computer‐Mediated Communication 5(2):
    0-0.

    [20] Jöreskog, K. G. and D. Sörbom (1989). LISREL 7: A guide to the program and
    applications, Spss.

    [21] Kimery, K. M. and M. McCord (2002). "Third-party assurances: Mapping the road to
    trust in e-retailing." JITTA: Journal of Information Technology Theory and Application
    4(2): 63.

    [22] Koufaris, M. and W. Hampton-Sosa (2004). "The development of initial trust in an
    online company by new customers." Information & management 41(3): 377-397. 70

    [23] Lauer, T. W. and X. Deng (2007). "Building online trust through privacy practices."
    International Journal of Information Security 6(5): 323-331.

    [24] Malhotra, N. K., S. S. Kim and J. Agarwal (2004). "Internet users' information privacy
    concerns (IUIPC): The construct, the scale, and a causal model." Information Systems
    Research 15(4): 336-355.

    [25] Mayer, R. C., J. H. Davis and F. D. Schoorman (1995). "An integrative model of
    organizational trust." Academy of Management review 20(3): 709-734.

    [26] McCallister, E., T. Grance and K. Scarfone (2010). Guide to protecting the
    confidentiality of personally identifiable information (PII).

    [27] McKnight, D. H., L. L. Cummings and N. L. Chervany (1998). "Initial trust formation in
    new organizational relationships." Academy of Management review 23(3): 473-490.

    [28] Mitchell, V.-W. and M. Greatorex (1993). "Risk perception and reduction in the purchase
    of consumer services." Service Industries Journal 13(4): 179-200.

    [29] Nowak, G. J. and J. Phelps (1995). "Direct marketing and the use of individual‐level
    consumer information: Determining how and when “privacy” matters." Journal of Direct
    Marketing 9(3): 46-60.

    [30] Nunnally, J. (1978). Psychometric methods, New York: McGraw-Hill.

    [31] Park, D.-H., J. Lee and I. Han (2007). "The effect of on-line consumer reviews on
    consumer purchasing intention: The moderating role of involvement." International
    Journal of Electronic Commerce 11(4): 125-148.

    [32] Pavlou, P. A. (2003). "Consumer acceptance of electronic commerce: Integrating trust
    and risk with the technology acceptance model." International Journal of Electronic
    Commerce 7(3): 101-134.

    [33] Phelps, J., G. Nowak and E. Ferrell (2000). "Privacy concerns and consumer willingness
    to provide personal information." Journal of Public Policy & Marketing 19(1): 27-41.

    [34] Reichheld, F. F. and P. Schefter (2000). "E-loyalty: Your secret weapon on the Web."
    Harvard business review 78(4): 105-113 71

    [35] Schiffman, L. G., H. Hansen and L. L. Kanuk (2008). Consumer behaviour: A European
    outlook, Pearson Education.

    [36] Smith, H. J., S. J. Milberg and S. J. Burke (1996). "Information privacy: measuring
    individuals' concerns about organizational practices." MIS Quarterly: 167-196.

    [37] Stone, R. N. and K. Grønhaug (1993). "Perceived risk: Further considerations for the
    marketing discipline." European Journal of Marketing 27(3): 39-50.

    [38] Suh, B. and I. Han (2003). "Effect of trust on customer acceptance of Internet banking."
    Electronic Commerce research and applications 1(3): 247-263.

    [39] Thomas, K. W. and B. A. Velthouse (1990). "Cognitive elements of empowerment: An
    “interpretive” model of intrinsic task motivation." Academy of Management review
    15(4): 666-681.

    [40] Van Dyke, T. P., V. Midha and H. Nemati (2007). "The effect of consumer privacy
    empowerment on trust and privacy concerns in e‐commerce." Electronic Markets 17(1):
    68-81.

    [41] Venkatesh, V., M. G. Morris, G. B. Davis and F. D. Davis (2003). "User acceptance of
    information technology: Toward a unified view." MIS Quarterly: 425-478.

    [42] Wang, H., M. K. Lee and C. Wang (1998). "Consumer privacy concerns about Internet
    marketing." Communications of the ACM 41(3): 63-70.

    [43] Wang, Y.-S., Y.-M. Wang, H.-H. Lin and T.-I. Tang (2003). "Determinants of user
    acceptance of Internet banking: an empirical study." International Journal of Service
    Industry Management 14(5): 501-519.

    [44] Warren, S. D. and L. D. Brandeis (1890). "The right to privacy." Harvard law review:
    193-220.

    [45] Westin, A. F. (1968). "Privacy and freedom." Washington and Lee Law Review 25(1):
    166.

    [46] Wu, J.-H. and S.-C. Wang (2005). "What drives mobile commerce?: An empirical
    evaluation of the revised technology acceptance model." Information & management
    42(5): 719-729. 72


    [47] Yousafzai, S. Y., J. G. Pallister and G. R. Foxall (2003). "A proposed model of e-trust for
    electronic banking." Technovation 23(11): 847-860.

    [48] Zolin, R., P. J. Hinds, R. Fruchter and R. E. Levitt (2004). "Interpersonal trust in
    cross-functional, geographically distributed work: A longitudinal study." Information and
    organization 14(1): 1-26.


    二、 中文部分
    [1] 王振浩,"影響消費者採用網路銀行行為意向之因素研究",國立中央大學,碩士論
    文,民國 90 年。

    [2] 任文瑗、范錚強 和 許通安,"資訊隱私侵害行為意圖之研究.",資訊,科技與社會
    6(2), 77〜100 頁,民國 95 年。

    [3] 江怡慧 和 陳怡樺,"網路銀行使用者之行為分析",產業金融季刊, 107,民國 89
    年。

    [4] 吳佩芬,"BANK 3.0 銀行未來式-透過行動銀行線上開立存款帳戶可行性之探討
    [以第一銀行為例].",國立中央大學,碩士論文,民國 104 年。

    [5] 李俊磊,"網站隱私權政策分析-以台灣網站為例.",國立政治大學,碩士論文,民
    國 92 年。

    [6] 邱皓政,量化研究與統計分析,五南圖書出版股份有限公司,台北市,民國 92 年。

    [7] 張薰尹,"網際網路銀行與傳統銀行差異之研究: 以交易成本觀點探討之.",文化大
    學,碩士論文,民國 89 年。

    [8] 陳建源,"制度信任知覺, 認知有用性, 認知易用性對消費者使用意圖知覺之影響—
    以行動商務為例.",國立成功大學,碩士論文,民國 98 年。

    [9] 黃芳銘,社會科學統計方法學: 結構方程模式,五南圖書出版股份有限公司,台北
    市,民國 93 年。

    [10] 賴冠名,"使用者資訊隱私顧慮和網站引司機制對信任知覺的影響─ 以 Facebook 台灣使用者為例",國立中央大學,碩士論文,民國 99 年。

    [11] BRETT KING,BANK3.0 銀行轉型未來式,孫一仕,施祖琪,蕭俊傑 譯,二版,財
    團法人台灣金融研訓院發行,民國 104 年。

    [12] 吳珮華,"行動銀行之研究",台北市,民國 102 年。

    [13] Chris Skinner,DIGITAL BANK 數位銀行,孫一仕 譯,財團法人台灣金融研訓院
    發行,民國 103 年。

    [14] Bruce Schneier,當信任崩壞:密碼學專家告訴你,如何面對社會中的貪婪與背叛,
    防範信任機制的全球大失靈,洪慧芳 譯,漫遊者文化事業股份有限公司,民國 104
    年。

    [15] 台灣網路資訊中心:『2015 年台灣寬頻網路使用調查報告』,2015 年,取自
    http://www.twnic.net.tw/download/200307/20150901e.pdf

    [16] 資策會創研所(FIND):台灣地區使用行動裝置上網數據調查,2015 年,取自
    http://www.iii.org.tw/Press/NewsDtl.aspx?nsp_sqno=1367&fm_sqno=14

    [17] 金管會:「打造數位化金融環境 3.0」推動情形,2015 年,取自
    http://www.fsc.gov.tw/ch/home.jsp?id=96&parentpath=0,2&mcustomize=news_view.jsp
    &dataserno=201502100002&toolsflag=Y&dtable=News

    [18] 第一銀行_第 e 個網:網路銀行之提供功能,2015 年,取自
    https://www.firstbank.com.tw/A2_3_1.action

    [19] 台灣金融研訓院:落實金融 3.0 建構數位銀行資訊發展策略,2015,取自
    https://www-950.ibm.com/events/wwe/grp/grp023.nsf/vLookupPDFs/03_1106_Digital_
    Bank_Case_Study_Workshop_Hong_Wu/$file/03_1106_Digital_Bank_Case_Study_Wo
    rkshop_Hong_Wu.pdf

    QR CODE
    :::