博碩士論文 etd-0018117-160444 詳細資訊


[回到前頁查詢結果 | 重新搜尋]

姓名 林安柔(An-Lou Lin) 電子郵件信箱 E-mail 資料不公開
畢業系所 國際經營管理碩士學程(Master of Business Administration Program in International Business)
畢業學位 碩士(Master) 畢業時期 105學年第1學期
論文名稱(中) 行動支付成功發展的關鍵因素-以微信錢包為例
論文名稱(英) The Key Factors on Development of Mobile Payment – The Case of Wechat Wallet
檔案
  • etd-0018117-160444.pdf
  • 本電子全文僅授權使用者為學術研究之目的,進行個人非營利性質之檢索、閱讀、列印。
    請遵守中華民國著作權法之相關規定,切勿任意重製、散佈、改作、轉貼、播送,以免觸法。
    論文使用權限

    紙本論文:5 年後公開 (2022-01-18 公開)

    電子論文:使用者自訂權限:校內校外均不公開

    論文語文/頁數 英文/66
    統計 本論文已被瀏覽 5392 次,被下載 0 次
    摘要(中) 隨著科技的發展,人們對智慧型手機的依附著度隨之增高,付款方式也日新月異。從古早的以物易物,到發行公認的現金貨幣,隨著手機的蓬勃發展,付款方式也漸漸轉為手機支付,人們的生活型態漸漸的轉型,行動裝置帶給人們前所未有的便利性。
    中國大陸是世界上使用行動支付人數最多的國家,隨著物聯網的發達,中國人出門只需要帶一隻手機,任何事情都可以用手機執行,行動支付漸漸已成為大陸人民不可或缺的工具。當科技技術已經準備好時,相較於其他亞洲國家,行動支付在台灣的發展比較緩慢, 消費習慣仍舊停留在現金與信用卡,因此,本研究將以中國大陸的微信銭包為範例,探討行動支付發展的成功關鍵因素,為將來投入台灣行動支付市場的借鏡與參考。
    本研究以科技接受模型為主,探討人類對於新科技的反應與接受模式,並加入知覺安全性、從眾行為、折價三個自變數,探討消費者對使用意圖以及實際使用的影響與關聯。利用「問卷調查法」在網際網路與社群平台進行研究資料的蒐集,總計回收有效樣本數達三百一十六份,並透過SPSS與PLS進行資料分析,以檢驗研究假說。研究結果發現:知覺有用性、知覺易用性、知覺安全性、折價與從眾行為皆對使用意圖有顯著影響。
    摘要(英) With technology advanced, people tend to consume more and more time on mobile phone. The paying tool has been diversified from barter, cash to mobile payment. The method of payment has been transformed to mobile. It brings much convenience to people. China has become the largest and fast-growing market for mobile payment. Wechat is the most popular social application in China. Since Chinese people began accepting mobile payment, Tencent Company has been successfully leveraging users to Wechat wallet. In this research, Wechat wallet is a case to discover key factors for consumer’s acceptance and to find out which factors make impact on mobile payment for Taiwanese market.
    The research contributes to technology acceptance model. Perceived security, herd behavior, discounts are added as extra variables for further analysis. These variables are discussed the effect for behavioral intention to use and actual use. The collection of survey was conducted through the Internet and social media platform. The valid survey samples are three hundred and sixteen. Hypotheses are verified through SPSS and PLS software. According to the result of data analysis, perceived usefulness, perceived ease of use, perceived security, herd behavior, discounts are positively related to behavioral intention to use and actual use.
    關鍵字(中)
  • 折價
  • 從眾行為
  • 知覺安全性
  • 科技接受模型
  • 行動支付
  • 電子錢包
  • 關鍵字(英)
  • Herd behavior
  • E-wallet
  • Discount
  • Technology acceptance model
  • Perceived security
  • Mobile payment
  • 論文目次 論文審定書………………………………………………………………………………………………….......i
    Chinese Abstract..................................................................................................................................ii
    English Abstract..................................................................................................................................iii
    Content....................................................................................................................................................iv
    Figure of Content...............................................................................................................................vii
    Table of Content...............................................................................................................................viii
    Chapter 1 Introduction..................................................................................................................1
    1.1 Research Background............................................................................................................1
    1.2 Research Motivation and Objectives......................................................................................2
    1.3 The Procedure of Research...................................................................................................3
    Chapter 2 Literature Review……………………………………………………………………………4
    2.1 Mobile Payment.....................................................................................................................4
    2.2 Technology Acceptance Model..............................................................................................4
    2.3 Discount.................................................................................................................................7
    2.4 Perceived Security.................................................................................................................7
    2.5 Herd Behavior........................................................................................................................7
    Chapter 3 Methodology................................................................................................................9
    3.1 Hypothesis Framework..........................................................................................................9
    3.2 Survey...................................................................................................................................10
    3.2.1 Survey Design....................................................................................................................12
    3.3.2 Survey Measurement.........................................................................................................12
    3.3.3 Channels for Data Collection..............................................................................................13
    Chapter 4 Data Analysis..............................................................................................................14
    4.1 Data Collection.......................................................................................................................14
    4.2 Descriptive Statistics..............................................................................................................14
    4.3 Data analysis.........................................................................................................................19
    4.3.1 Reliability Analysis..............................................................................................................19
    4.3.2 Convergent Validity.............................................................................................................20
    4.3.3 Pearson Correlation...........................................................................................................22
    4.4 Hypothesis Testing................................................................................................................23
    4.5 Mediation...............................................................................................................................25
    Chapter 5 Conclusion .................................................................................................................29
    5.1 Research Conclusion.............................................................................................................29
    5.1.1 Relationship between Perceived Usefulness and Behavioral Intention to Use..............................................................................................................................................29
    5.1.2 Relationship between Perceived Ease of Use and Behavioral Intention to Use..............................................................................................................................................29
    5.1.3 Relationship between Discount and Behavioral Intention to Use..................................... 30
    5.1.4 Relationship between Perceived Security and Behavioral Intention to Use..............................................................................................................................................30
    5.1.5 Relationship between Herd Behavior and Behavioral Intention to Use.............................30
    5.1.6 Relationship between Behavioral Intention to Use to Actual Use.......................................31
    5.2 Theoretical Implications.........................................................................................................31
    5.3 Managerial Implications.........................................................................................................32
    5.4 Limitation and Future Direction..............................................................................................33
    Reference....................................................................................................................................34
    Appendix 1: Survey......................................................................................................................40
    Appendix 2: PLS..........................................................................................................................55
    Appendix: Bootstrap....................................................................................................................56
    參考文獻 Agarwal, R., & Karahanna, E. (2000). Time flies when you're having fun: Cognitive absorption and beliefs about information technology usage. MIS Quarterly, 665-694.
    Ajzen, I. (1985). From Intentions to Actions: A Theory of Planned Behavior. Heidelberg: Springer.
    Ajzen, I., & Madden, T. J. (1986). Prediction of goal-directed behavior: Attitudes, intentions, and perceived behavioral control. Journal of Experimental Social Psychology, 22(5), 453-474.
    Allen, V. L. (1966). Situational Factors in conformity. Advances in Experimental and Social Psychology, Volume 2, 133-175.
    Asch, S. E. (1951). Effects of group pressure upon the modification and distortion of judgments. Organizational Influence Processes, 295-303.
    Bagozzi, R. P., & Yi, Y. (1988). On the evaluation of structural equation models. Academic of Marketing Science, 16 (1), 76-94.
    Bauer, R. Y. (1960). Consumer Behavior as Risk Taking. Paper presented at the Dynamic Marketing for A Changing World, Chicago Illinois:American Marketing Association
    Bearden, W. O., Netemeyer, R. G., & Teel, J. E. (1989). Measurement of consumer susceptibility to interpersonal influence. Journal of Consumer Research, 473-481.
    Bentler, P. M., & Bonett, D. G. (1980). Significance tests and goodness of fit in the analysis of covariance structures. Psychological Bulletin, 88(3), 588.
    Bettman, J. R. (1973). Perceived risk and its components: a model and empirical test. Journal of Marketing Research, 184-190.
    Bollen, K. A., & Long, J. S. (1993). Testing structural equation models (Vol. 154): Sage Publications, Inc.
    Browne, M. W., & Cudeck, R. (1993). Alternative ways of assessing model fit (Vol. 154): Newbury PArk, CA: Sage.
    Burke, P. J. (1997). An Identity Model for Network Exchange. American Sociological Review, 62(1), 134–150
    Burnkrant, R. E., & Cousineau, A. (1975). Informational and normative social influence in buyer behavior. Journal of Consumer Research, 2(December), 206-214.
    Carlos F. & Miguel G. (2006) "Consumer trust, perceived security and privacy policy: Three basic elements of loyalty to a web site", Industrial Management & Data Systems, Vol. 106 Iss: 5, pp.601 - 620
    Chen, Y. F. (2008). Herd behavior in purchasing books online. Computers in Human Behavior, 24(5), 1977-1992.
    Cho, J. (2004). Likelihood to Abort an Online Transaction: Influences from Cognitive Evaluations, Attitudes, and Behavioral Variables. Information & Management, 41(7), 827-838.
    Cox, D. F., & Rich, S. U. (1964). Perceived risk and consumer decision-making: The case of telephone shopping. Journal of Marketing Research, 32-39.
    Cronbach, L. J. (1951). Coefficient alpha and the internal structure of tests. Psychometrika, 16(3), 297-334.
    Davis, F. D. (1986). A technology acceptance model for empirically testing new end-user information systems: Theory and results. Massachusetts Institute of Technology, Sloan School of Management.
    Davis, F. D. (1989). Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS Quarterly, 319-340.
    Davis, F. D., Bagozzi, R. P., & Warshaw, P. R. (1989). User acceptance of computer technology: a comparison of two theoretical models. Management Science, 982-1003.
    Fishbein, M., & Ajzen, I. (1975). Belief, attitude, intention and behaviour: An introduction to theory and research: Addison-Wesley.
    Flavián, C. and Guinalíu, M. (2006), “Consumer trust, perceived security and privacy policy: three basic elements of loyalty to a web site”, Industrial Management & Data Systems, Vol. 106 No. 5, pp. 601-20.
    Fornell, C. R. & Larcker, F. F. (1981), “Structural Equation Models with Unobservable Variables and Measurement Error,” Journal of Marketing Research, 18, pp.39-51.
    Hair, J. F., Anderson, R. E., Tatham, R. L., & Black, W. C. (1998). Multivariate data analysis (5th ed.). New York: Macmillan.
    Hanson, W. A., & Putler, D. S. (1996). Hits and misses: Herd behavior and online product popularity. Marketing Letters, 7(4), 297-305.
    Herzberg, A. (2003). Payments and Banking with Mobile Personal Devices. Communications of the ACM, 46(5), 53-58.

    Hinkin, T. R. (1998). A brief tutorial on the development of measures for use in survey questionnaires. Organizational Research Methods, 1(1), 104-121.
    Huang, J. H., & Chen, Y. F. (2006). Herding in online product choice. Psychology and Marketing, 23(5), 413-428.

    Jarvenpaa, S. L., & Todd, P. A. (1996). Consumer reactions to electronic shopping on the World Wide Web. International Journal of Electronic Commerce, 1(2), 59-88.
    Karahanna, E., & Straub, D. W. (1999). The psychological origins of perceived usefulness and ease-of-use. Information & Management, 35(4), 237-250.
    Kelman, H. C. (1961). Processes of opinion change. Public Opinion Quarterly, 25(1), 57-78.
    Kotler (1997) , “Marketing Management, Analysis, Implementation and Using the Servoual Model, ” The Service Industries Journal,Vol,11,3, pp.324-343.
    Kruck, S.E., Gottovi, D., Moghadami, F., Broom, R. and Forcht, K.A. (2002), “Protecting personal privacy on the internet”, Information Management & Computer Security, Vol. 10 No. 2, pp. 77-84.
    Lascu, D., & Zinkhan, G. M. (1999). Consumer Conformity: Review and Applications for Marketing Theory and Practice. Journal of Marketing Theory and Practice, 7(3), 1-12.
    Lichtenstein, Donald R., Ridgway, Nancy M., & Netemeyer, Richard G. (1993). Price Perceptions and Consumer Shopping Behavior: A Field Study. Journal of Marketing Research, 30(2), 234-245. doi:10.2307/3172830
    Likert, R. (1932). A Technique for the Measurement of Attitudes. Archives of Psychology, 140, 1–55.
    Lim, N. (2003). Consumers perceived risk: sources versus consequences. Electronic Commerce Research and Applications, 2 (2003), pp. 216–228
    Lwin, M., Wirtz, J., and Williams, J. D. (2007) Consumer online privacy concerns and responses: a power-responsibility equilibrium perspective. Journal of the Academy of Marketing Science, 35, 4, 2007, 572–585.
    Moore, G. C., & Benbasat, I. (1991). Development of an instrument to measure the perceptions of adopting an information technology innovation. Information Systems Research, 2(3), 192-222.
    Mulaik, S. A., James, L. R., Van Alstine, J., Bennett, N., Lind, S., & Stilwell, C. D. (1989). Evaluation of goodness-of-fit indices for structural equation models. Psychological Bulletin, 105(3), 430.
    Nunnally, J. C. (1978). Psychometric theory (2nd ed.). New York: McGraw-Hill.
    Pavlou, P. A. (2003). Consumer acceptance of electronic commerce: Integrating trust and risk with the technology acceptance model. International Journal of Electronic Commerce, 7(3), 101-134.
    Rogers, E. M. (1983). Diffusion of Innovations New York: Free Press.

    Roselius, T. (1971). Consumer rankings of risk reduction methods. The Journal of Marketing, 56-61.
    Schierz, P. G., Schilke, O., & Wirtz, B. W. (2010). Understanding consumer acceptance of mobile payment services: An empirical analysis. Electronic Commerce Research and Applications, 9(3), 209-216
    Suh, B. and Han, I. (2003), “The impact of customer trust and perception of security control on the acceptance of electronic commerce”, International Journal of Electronic Commerce, Spring, pp. 135-61.
    Sun, S. Y., Ju, T. L. and Su, C. F. (2006). A Comparative Study of Value-added Mobile Services in Finland and Taiwan. International Journal of Mobile Communications, 4(4), 436-458.

    Van der Heijden, H. (2002). Factors affecting the successful introduction of mobile payment systems. In proceedings of the 15th Bled Electronic Commerce Conference (Bled 2002), Bled, Slovenia, Paper 20.
    Veijalainen, J., Terziyan, V., & Tirri, H. (2006). Transaction management for m-commerce at a mobile terminal. Electronic Commerce Research and Applications, 5(3), 229-245.
    Venkatesh, V., Morris, M. G., Davis, G. B., & Davis, F. D. (2003). User acceptance of information technology: Toward a unified view. MIS Quarterly, 27(3), 425-478.
    Wilkie, W. L. (1994). Consumer Behavior, 3rd ed. New York: John Wiley and Sons Inc.
    江濡伃 (2013)。行動支付服務的三篇研究:策略、商業模式與成功因素。國立成功大學 電信管理研究所碩士論文,未出版,台南市。
    吳明隆. (2009b). 結構方程模式: AMOS 的操作與應用: 臺北市: 五南.
    吳明隆. (2011). 論文寫作與量化研究. 台北市: 五南圖書出版股份有限公司.
    吳明隆, & 涂金堂. (2006). SPSS 與統計應用分析. 台北市: 五南圖書出版股份有限公司.
    張翔. (2009). 提綱挈領學統計. 台北市: 鼎茂圖書出版股份有限公司.
    許嘉琤 (2012)。行動支付可用性相關因素探討。國立宜蘭大學應用經濟與管理學系經營 管理碩士論文,未出版,宜蘭縣。
    黃騰緯 (2012)。在Android平台上之NFC旅遊資訊電子零錢包設計與實作。雲林科技大 學電機工程系碩士論文,未出版,雲林縣。
    曾春瑜 (2013)。以延伸式科技接受模型探討行動支付帳單之使用意願。東吳大學資訊管 理學系碩士論文,未出版,台北市。
    葉展皓 (2013)。行動支付機制之研究。國立政治大學經營管理碩士學程碩士論文,未出 版,台北市。
    劉軒宏 (2013)。行動支付模型之研究。中國文化大學資訊管理學系碩士在職專班碩士論 文,未出版,台北市。
    鄭詠怡 (2010)。行動付款機制之發展現況與機會。國立交通大學科技管理研究所碩士論 文,未出版,新竹市。
    謝麗美 (2012)。消費者使用NFC行動支付行為意圖之研究。開南大學資訊學院碩士在職 專班碩士論文,未出版,桃園縣。
    口試委員
  • 宋兆賢 - 召集委員
  • 林豪傑 - 委員
  • 楊淯程 - 指導教授
  • 口試日期 2017-01-11 繳交日期 2017-01-18

    [回到前頁查詢結果 | 重新搜尋]


    如有任何問題請與論文審查小組聯繫