簡易檢索 / 詳目顯示

研究生: 林卓𠆩
Lin, Cho-Fan
論文名稱: 探討滿意和信任對於來電識別App持續使用與資訊分享意圖之影響
An Exploration on the Influence of Satisfaction and Trust on Continuous Intention and Information Sharing for Caller Identification Apps Usage
指導教授: 張晏榕
Chang, Yen-Jung
學位類別: 碩士
Master
系所名稱: 圖文傳播學系
Department of Graphic Arts and Communications
論文出版年: 2018
畢業學年度: 106
語文別: 中文
論文頁數: 115
中文關鍵詞: 來電識別軟體繼續使用意圖資訊分享
英文關鍵詞: Caller ID app, Continuance intention, Information sharing
DOI URL: http://doi.org/10.6345/THE.NTNU.DGAC.025.2018.F05
論文種類: 學術論文
相關次數: 點閱:87下載:0
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • 隨著科技快速的進步,智慧型手機為使用者們帶來更為豐富的社交、電子商務和娛樂等應用,逐漸成為現代人不可或缺的裝置。但科技進步也促使電信犯罪和詐騙與日俱增。鑑於許多智慧型手機使用者們常受到垃圾電話、推銷電話與語音釣魚騷擾。許多手機軟體開發商看準此趨勢,紛紛於近幾年推出來電識別軟體解決上述問題。

    本研究主要目的是評估來電識別軟體的資訊品質、技術品質、美學品質、服務品質會影響信任、滿意度、繼續使用與資訊分享意圖。此研究以DeLone & McLean資訊系統成功模式為基礎,並結合近期相關文獻所修正之模式,提出來電識別軟體使用者的接受度量表。以曾使用來電識別軟體之用戶為樣本,透過網路問卷調查法收集 230 份有效樣本。並以SmartPLS 3.0軟體進行偏最小平方結構方程模型(PLS-SEM)的假說檢定驗證。經本研究實證發現:
    (1)來電識別軟體之信任與滿意度會影響繼續使用與資訊分享意圖。
    (2)資訊品質會顯著影響信任。
    (3)資訊品質、技術品質、服務品質會顯著影響滿意度。
    (4)美學品質不會顯著影響信任和滿意度。

    本研究依研究結果做成結論與建議,供相關研究者與後續研究做為參考。並希望能提供給來電識別軟體業者做為未來軟體功能設計之參考,讓用戶與軟體開發商之間能夠達成互利。

    The development of mobile application software has grown explosively in conjunction with the worldwide use of smartphones in recent years. Since new forms of cyber crime and fraud are also emerging, Caller ID apps are also becoming more popular in recent years. Despite abundant research on users’ behavior intention for mobile app usage, the influential factors in the information sharing intention of apps have never been significantly explored to date.

    In this study, theoretical foundation is built based upon the IS success model, and empirical data obtained from 230 users who had experience with Caller ID app were discussed by using PLS-SEM as an analytical tool. The results indicated that information quality, technical quality and service quality are the main factors that affect users’ trust and satisfaction.

    The findings of this study provide several vital implications for researchers to further examine phone-call-related applications, especially Caller ID app.

    摘要 1 Abstract 2 致謝 3 目錄 4 圖目錄 5 表目錄 6 第一章 緒論 9 第一節、研究背景及動機 9 第二節、研究目的與問題 13 第三節、名詞釋義 15 第四節、研究流程 16 第二章 文獻探討 17 第一節、垃圾訊息與來電識別軟體 17 第二節、資訊系統成功模式 32 第三節、資訊系統與美學之理論 37 第四節、資訊系統使用者信任之理論 40 第五節、資訊系統分享資訊意圖之理論 43 第三章 研究方法 51 第一節、研究架構 51 第二節、研究變數的操作性定義與研究假設 52 第三節、研究工具 58 第四節、研究實施 66 第五節、資料分析 67 第四章 研究結果與討論 71 第一節、敘述性統計分析 71 第二節、測量模型估計 75 第三節、PLS結構方程的分析與結果 81 第五章 結論與建議 89 第一節、研究結論 89 第二節、研究貢獻 94 第三節、研究限制 96 第四節、未來研究建議 97 參考文獻 99 中文部分 99 英文部分 102 附錄一 問卷設計 111

    iThome(2018)。《資通安全管理法》順利完成立院三讀,預計六月中旬總統正式公布,正式施行日期由行政院另定。2018年6月11日,取自:https://www.ithome.com.tw/news/123101
    卜小蝶(2006)。淺談社會性標記之意涵與應用。Web2. 0 與圖書館研討會論文集,新北市:淡江大學,377-401。
    江姿慧(2000)。使用者參與虛擬社群之行為研究(碩士論文)。取自臺灣博碩士論文知識加值系統。(系統編號088NTUST396016)
    沈文龍(2011)。行動購物系統品質對消費者滿意度與購買意願之影響(碩士論文)。取自臺灣博碩士論文知識加值系統。(系統編號099ISU05396029)
    李亞芝(2014)。以使用者經驗發展色彩知覺障礙者生活協助APP之研究與設計(碩士論文)。取自臺灣博碩士論文知識加值系統。(系統編號102NTUS5619012)
    李國智(2010)。資訊分享社群網站之建置與經營(碩士論文)。取自臺灣博碩士論文知識加值系統。(系統編號098NCTU5396036 )
    李銘薰、卜小蝶(2009)。電腦與數位 3C 專業虛擬社群知識分享之影響因素研究。教育資料與圖書館學,46(3),377-401。
    宋曜廷、張國恩、於文正(2006)。行動載具在博物館學習的應用:促進「人一機一境」互動的設計。博物館學季刊,20(1),18-20。
    吳孟展(2011)。虛擬社群中使用者互動及資訊分享行為之探討(碩士論文)。取自臺灣博碩士論文知識加值系統。(系統編號099SCU05121039)
    吳統雄(1985)。測量工具信度與效度分析。2018年6月11日,取自:http://tx.liberal.ntu.edu.tw/~PurpleWoo/Methodology/Analy-Reliability_Validity.htm
    林東泰(2015)。敘事新聞與數位敘事。臺北市:五南文化。
    林耿徽(2013)。電信詐欺犯罪偵查管理之研究(碩士論文)。取自臺灣博碩士論文知識加值系統。(系統編號101CPU05126005)
    林書妤(2015)。情境崩解是禍還是福? 從情境崩解觀看Facebook使用者之印象管理策略(碩士論文)。取自臺灣博碩士論文知識加值系統。(系統編號104NCTU5376005)
    胡公權(2010)。以使用者介面角度分析iGoogle之評估研究(碩士論文)。取自臺灣博碩士論文知識加值系統。(系統編號098NTTTC576063)
    財團法人臺灣網路資訊中心(2017)。2017年臺灣寬頻網路使用調查報告。2018年6月11日,取自:https://www.twnic.net.tw/download/200307/20170721e.pdf
    陳秀松(2004)。具使用者回饋機制之個人化垃圾郵件過濾系統(碩士論文)。取自臺灣博碩士論文知識加值系統。(系統編號092NCU05396066)
    黃宇辰、李峻德(2007)。電子商務系统影響初始信任感之設計因素探討。資訊社會研究,13,125-166。
    黃浩傑(2002)。線上社區資訊共享與交換行為之研究:以MP3論壇網站為例。中華傳播學會2002年會,新北市:世新大學。
    硬塞的網路趨勢觀察(2017)。市話也能來電顯示!Whoscall 攜手中華電信推出「電話盒」。2017年6月15日,取自: https://www.ithome.com.tw/news/123101
    資策會科技法律研究所(2017)。美國聯邦通訊委員會發布公告重申自動簡訊發送適用電話消費者保護法。2017年6月15日,取自:https://stli.iii.org.tw/article-detail.aspx?no=64&tp=1&i=72&d=7710
    蔡瑤昇、耿慶瑞、江沛昀、劉晏如(2013)。服飾搭配圖片類型、網路口碑數量對消費者購買意願影響之研究。第 16 屆科技整合管理研討會論文集,台北市:東吳大學。
    盧文潔、楊美雪(2012)。台灣影音社群網站創作者的資訊分享動機之研究。第23 屆國際資訊管理學術研討會,高雄市:國立高雄大學。
    顏志平、董正談、陳芳逸(2016)。家用電話詐欺預警機制之研究。資訊、科技與社會學報,16。
    Adams, P. (2010). Designing for Social Interaction. Retrieved May 23rd, 2018, from http://boxesandarrows.com/designing-for-social-interaction
    Bao, S., Xue, G., Wu, X., Yu, Y., Fei, B., & Su, Z. (2007). Optimizing web search using social annotations. In Proceedings of the 16th international conference on World Wide Web (pp. 501-510). ACM.
    Barber, B. (1983). The logic and limits of trust. New Brunswick, NJ: Rutgers University Press.
    Barbrook, R. (1998). The hi-tech gift economy. first monday, 3(12).
    Bhattacherjee, A. (2001). Understanding information systems continuance: an expectation-confirmation model. MIS quarterly, 351-370.
    Boyd, D. M., & Ellison, N. B. (2007). Social network sites: Definition, history, and scholarship. Journal of computer‐mediated Communication, 13(1), 210-230.
    Cai, S., & Xu, Y. (2011). Designing not just for pleasure: Effects of Web site aesthetics on consumer shopping value. International Journal of Electronic Commerce, 15(4), 159-188.
    Carver, C. (1999). Building a Virtual Community for a Tele-Learning Environment. IEEE Communications Magazine, 37(3), 114-118.
    Chang, H. H., & Chuang, S. S. (2011). Social capital and individual motivations on knowledge sharing: Participant involvement as a moderator. Information & Management, 48(1), 9-18.
    Constant, D., Kiesler, S., & Sproull, L. (1994). What's mine is ours, or is it? A study of attitudes about information sharing. Information systems research, 5(4), 400-421.
    DeLone, W. H., & McLean, E. R. (1992). Information systems success: The quest for the dependent variable. Information systems research, 3(1), 60-95.
    Delone, W. H., & McLean, E. R. (2003). The DeLone and McLean model of information systems success: a ten-year update. Journal of Management information systems, 19(4), 9-30.
    Doney, P. M., & Cannon, J. P. (1997). An examination of the nature of trust in buyer-seller relationships. The Journal of Marketing, 61(2), 35-51.
    Elliot, S., Li, G., & Choi, C. (2013). Understanding service quality in a virtual travel community environment. Journal of Business Research, 66(8), 1153-1160.
    Ellison, N. B. (2007). Social network sites: Definition, history, and scholarship. Journal of Computer‐Mediated Communication, 13(1), 210-230.
    European Parliament and the Council of the European Union. (1995). Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 Retrieved June 14, 2017, from http://ec.europa.eu/justice/policies/privacy/docs/95-46-ce/dir1995- 46_part1_en.pdf
    European Parliament and the Council of the European Union. (2016). REGULATION (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 Retrieved June 10, 2018, from https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:32016R0679
    Federal Communications Commission. (2016). FCC Enforcement Advisory “Robotext Consumer Protection Text Message Senders Must Comply With The Telephone Consumer Protection Act”. Retrieved June 14th, 2017, from https://Apps.fcc.gov/edocs_public/attachmatch/DA-16-1299A1.pdf
    Ford, R. A. (2005). Preemption of state spam laws by the federal CAN-SPAM Act. The University of Chicago Law Review, 355-384.
    Gao, L., Waechter, K. A., & Bai, X. (2015). Understanding consumers’ continuance intention towards mobile purchase: A theoretical framework and empirical study–A case of China. Computers in Human Behavior, 53, 249-262.
    Garbarino, E., & Johnson, M. S. (1999). The different roles of satisfaction, trust, and commitment in customer relationships. The Journal of Marketing, 63(2), 70-87.
    Gefen, D. (2002). Customer Loyalty in E-Commerce. Journal of Association for Information Systems, 3(1), 27-51.
    Gong, J., & Tarasewich, P. (2004). Guidelines for Handheld Mobile Device Interface Design. Proceedings of the 2004 DSI Annual Meeting, Boston, MA, USA. Retrieved from https://personal.cis.strath.ac.uk/sotirios.terzis/classes/52.504/2010/GuidelinesGongTarase.pdf
    Granovetter, M. (1983). The strength of weak ties: A network theory revisited. Sociological theory, 201-233.
    Hagel, J., & Armstrong, A. G. (1997). Net gain. Boston, MA: Harvard Business School Press.
    Hair, J. F., Black, W. C., Babin, B. J., Anderson, R. E., & Tatham, R. L. (2006). Multivariate data analysis 6th Edition. Pearson Prentice Hall. New Jersey. Humans: Critique and reformulation. Journal of Abnormal Psychology, 87, 49-74.
    Hair, J. F., & Lukas, B. (2014). Marketing research (Vol. 2). Sydney, NSW: McGraw-Hill Education Australia.
    Hiskey, R. (2010). How the word spam came to mean “Junk message”. Retrieved June 14th, 2017, from http//www.todayifoundout.com/index.php/2010/09/how-the-word-spam-came-to-mean-junk-message
    Hur, K., Kim, T. T., Karatepe, O. M., & Lee, G. (2017). An exploration of the factors influencing social media continuance usage and information sharing intentions among Korean travellers. Tourism Management, 63, 170-178.
    Hurley, R. F., & Estelami, H. (1998). Alternative indexes for monitoring customer perceptions of service quality: A comparative evaluation in a retail context. Journal of the academy of Marketing Science, 26(3), 209.
    Jones, Q., & Rafaeli, S. (2000). Time to split, virtually: 'Discourse architecture' and 'community building' create vibrant virtual publics. Electronic Markets, 10(4), 214-223.
    Joseph, C., Wylie II., Molly, K. & McGimley. (2016). FCC Reiterates Its Position that Robotexts are Subject to TCPA. Retrieved June 14th, 2017, from http://www.natlawreview.com/article/fcc-reiterates-its-position-robotexts-are- subject-to-tcpa.
    Jung, Y., Perez-Mira, B., & Wiley-Patton, S. (2009). Consumer adoption of mobile TV: Examining psychological flow and media content. Computers in Human Behavior, 25(1), 123-129.
    Lee, F. S., Vogel, D., & Limayem, M. (2003). Virtual community informatics: A review and research agenda. Journal of Information Technology Theory and Application, 5(1), 47.
    Lee, S., Shin, B., & Lee, H. G. (2009). Understanding post-adoption usage of mobile data services: The role of supplier-side variables. Journal of the Association for Information Systems, 10(12), 2.
    Lee, T. (2005). The impact of perceptions of interactivity on customer trust and transaction intentions in mobile commerce. Journal of Electronic Commerce Research, 6(3), 165.
    Li, E.Y., Loh, S., Evans, C., & Lorenzi, F. (2013). Organizations and Social Networking: Utilizing Social Media to Engage Consumers. Hershey, PA: IGI Global.
    Loiacono, E., Chen, D., & Goodhue, D. (2002). WebQual TM revisited: Predicting the intent to reuse a web site. AMCIS 2002 Proceedings, 46.
    Kärkkäinen, L., & Laarni, J. (2002). Designing for small display screens. In Proceedings of the second Nordic conference on Human-computer interaction (pp. 227-230). ACM.
    Kim, G., Shin, B., & Lee, H. G. (2009). Understanding dynamics between initial trust and usage intentions of mobile banking. Information Systems Journal, 19(3), 283-311.
    Kim, H. W., Xu, Y., & Koh, J. (2004). A comparison of online trust building factors between potential customers and repeat customers. Journal of the Association for Information Systems, 5(10), 13.
    Koh, J., & Kim, Y. G. (2004). Knowledge sharing in virtual communities: an e-business perspective. Expert systems with applications, 26(2), 155-166.
    Koops, B. J. (2014). The trouble with European data protection law. International Data Privacy Law, 4(4), 250-261.
    Malhotra, N. K., Kim, S. S., & Agarwal, J. (2004). Internet users' information privacy concerns (IUIPC): The construct, the scale, and a causal model. Information systems research, 15(4), 336-355.
    Mauss, M. (1954). The gift: The form and reason for exchange in archaic societies. Glencoe, IL: Free Press.
    Mayer, R. C., Davis, J. H., & Schoorman, F. D. (1995). An integrative model of organizational trust. Academy of Management review, 20(3), 709-734.
    McCarter, M. W., & Northcraft, G. B. (2007). Happy together?: Insights and implications of viewing managed supply chains as a social dilemma. Journal of operations management, 25(2), 498-511.
    McKinney, V., Yoon, K., & Zahedi, F. M. (2002). The measurement of web-customer satisfaction: An expectation and disconfirmation approach. Information systems research, 13(3), 296-315.
    New York Times (2018). Cambridge Analytica to File for Bankruptcy After Misuse of Facebook Data. Retrieved June 1, 2018, from https://www.nytimes.com/2018/05/02/us/politics/cambridge-analytica-shut-down.html
    Nielsen, J. (1994). Usability engineering. Fremont, CA: Elsevier.
    Numally, J. C. (1978). Psychometric Theory. New York, NY: McGraw-Hill.
    Ofori, K. S., Larbi-Siaw, O., Fianu, E., Gladjah, R. E., & Boateng, E. O. Y. (2016). Factors influencing the continuance use of mobile social media: The effect of privacy concerns. Journal of Cyber Security and Mobility, 4(3), 105-124.
    Oghuma, A. P., Libaque-Saenz, C. F., Wong, S. F., & Chang, Y. (2016). An expectation-confirmation model of continuance intention to use mobile instant messaging. Telematics and Informatics, 33(1), 34-47.
    Parasuraman, A., Zeithaml, V. A., & Berry, L. L. (1988). Servqual: A multiple-item scale for measuring consumer perc. Journal of retailing, 64(1), 12.
    Parboteeah, D. V., Valacich, J. S., & Wells, J. D. (2009). The influence of website characteristics on a consumer's urge to buy impulsively. Information systems research, 20(1), 60-78.
    Pinjani, P., & Palvia, P. (2013). Trust and knowledge sharing in diverse global virtual teams. Information & Management, 50(4), 144-153.
    Pitt, L. F., Watson, R. T., & Kavan, C. B. (1995). Service quality: a measure of information systems effectiveness. MIS quarterly, 173-187.
    Ramadan, R., & Aita, J. (2018). A model of mobile payment usage among Arab consumers. International Journal of Bank Marketing.
    Rheingold, H. (1993). The virtual community: Finding commection in a computerized world. Boston, MA: Addison-Wesley Longman Publishing Co., Inc..
    Ridings, C. M., Gefen, D., & Arinze, B. (2002). Some antecedents and effects of trust in virtual communities. The Journal of Strategic Information Systems, 11(3-4), 271-295.
    Robinson, S. L. (1996). Trust and breach of the psychological contract. Administrative science quarterly, 574-599.
    Roca, J. C., Chiu, C. M., & Martínez, F. J. (2006). Understanding e-learning continuance intention: An extension of the Technology Acceptance Model. International Journal of human-computer studies, 64(8), 683-696.
    Romm, C., & Clarke, R. J. (1995). Virtual community research themes: a preliminary draft for a comprehensive model. In 6th Australasian Conference On Information Systems (Vol. 1).
    Schiemer, L.J.E.E (2017). Mobile Technology and Women’s Empowerment in Post-Revolution Egypt (Master's thesis). Royal Roads University, Canada. Retrieved May 8, 2018, from https://www.researchgate.net/publication/314230769_Mobile_Technology_and_Women's_Empowerment_in_Post-Revolution_Egypt_tknwlwjya_alhatf_alnqal_wtmkyn_almrat_fy_mrhlt_ma_bd_althwrt_msr

    Schraefel, M. C., Ho, J., Chignell, M., & Milton, M. (2000). Building virtual communities for research collaboration. In Research Challenges, 2000. Proceedings. Academia/Industry Working Conference on (pp. 27-32). IEEE.
    Selbst, A. D., & Powles, J. (2017). Meaningful information and the right to explanation. International Data Privacy Law, 7(4), 233-242.
    Shneiderman, B. (2000). Designing trust into online experiences. Communications of the ACM, 43(12), 57-59.
    Sharp, H., Rogers, Y., & Preece, J. (2007). Interaction design:beyond human-computer interaction. New York, NY: John Wiley & Sons.
    Sim, S. H., & Moon, J. Y. (2012). A study on mobile SNS attributes effects on information share, relationship formation, and user satisfaction. Journal of the Korean Society for Quality Management, 40(1), 60-72.
    Stoddart, J., Chan, B., & Joly, Y. (2016). The European Union's adequacy approach to privacy and international data sharing in health research. The Journal of Law, Medicine & Ethics, 44(1), 143-155.
    Sung, C.S., Kim, C.H., & Park, J.Y. (2017). Development of humming call system for blocking spam on a smartphone. Multimedia Tools and Applications, 76(16), 17371-17383.
    Talja, S. (2002). Information sharing in academic communities: Types and levels of collaboration in information seeking and use. New Review of Information Behavior Research, 3(1), 143-159.
    Techcrunch (2017). Hiya, a Whitepages spinout, nabs $18M for its smart caller ID technology. Retrieved May 21, 2018, from https://techcrunch.com/2017/10/19/hiya-a-whitepages-spinout-nabs-18m-to-for-its-smart-caller-id-technology/
    The Economic Times (2017). YES Bank’s bet on UPI platform helps it make space in digital payments ecosystem. Retrieved June 14, 2017, from http://economictimes.indiatimes.com/industry/banking/finance/banking/yes-banks-bet-on-upi-platform-helps-it-make-space-in-digital-payments-ecosystem/articleshow/58939122.cms
    Thomas, J. C., Kellogg, W. A., & Erickson, T. (2001). The knowledge management puzzle: Human and social factors in knowledge management. IBM systems journal, 40(4), 863-884.
    Townend, J. (2017). Data protection and the ‘right to be forgotten’in practice: a UK perspective. International Journal of Legal Information, 45(1), 28-33.
    Tsur, O., & Rappoport, A. (2012). What's in a hashtag?: content based prediction of the spread of ideas in microblogging communities. In Proceedings of the fifth ACM international conference on Web search and data mining (pp. 643-652). ACM.
    Wang, Y. D., & Emurian, H. H. (2005). An overview of online trust: Concepts, elements, and implications. Computers in human behavior, 21(1), 105-125.
    Wang, Y. S., & Liao, Y. W. (2008). Assessing eGovernment systems success: A validation of the DeLone and McLean model of information systems success. Government Information Quarterly, 25(4), 717-733.
    Yang, H. E., Wu, C. C., & Wang, K. C. (2009). An empirical analysis of online game service satisfaction and loyalty. Expert Systems with Applications, 36(2), 1816-1825.
    Xu, C., Peak, D., & Prybutok, V. (2015). A customer value, satisfaction, and loyalty perspective of mobile application recommendations. Decision Support Systems, 79, 171-183.
    Ying, J. J. C., Zhang, J., Huang, C. W., Chen, K. T., & Tseng, V. S. (2016). PFrauDetector: a parallelized graph mining approach for efficient fraudulent phone call detection. In Parallel and Distributed Systems (ICPADS), 2016 IEEE 22nd International Conference on (pp. 1059-1066). IEEE.
    Yuan, S., Liu, Y., Yao, R., & Liu, J. (2016). An investigation of users’ continuance intention towards mobile banking in China. Information Development, 32(1), 20-34.
    Zhou, T., Lu, Y., & Wang, B. (2009). The relative importance of website design quality and service quality in determining consumers’ online repurchase behavior. Information Systems Management, 26(4), 327-337.
    Zhou, T. (2013). An empirical examination of the determinants of mobile purchase. Personal and Ubiquitous Computing, 17(1), 187-195.
    Zhou, T. (2014). Understanding continuance usage intention of mobile internet sites. Universal access in the Information Society, 13(3), 329-337.

    下載圖示
    QR CODE