論文使用權限 Thesis access permission:自定論文開放時間 user define
開放時間 Available:
校內 Campus: 已公開 available
校外 Off-campus: 已公開 available
論文名稱 Title |
我國「航前旅客資訊系統」科技採用之研究-以入出國及移民署為例 An Empirivcal Study of User Technology Acceptance with Taiwan’s Advanced Passenger Information System :The Case of National Immigration Agency |
||
系所名稱 Department |
|||
畢業學年期 Year, semester |
語文別 Language |
||
學位類別 Degree |
頁數 Number of pages |
92 |
|
研究生 Author |
|||
指導教授 Advisor |
|||
召集委員 Convenor |
|||
口試委員 Advisory Committee |
|||
口試日期 Date of Exam |
2012-07-10 |
繳交日期 Date of Submission |
2012-07-23 |
關鍵字 Keywords |
航前旅客資訊系統、科技採用模型、電子化政府、態度 Advanced Passenger Information System, Technology Acceptance Model, E-government, Attitude |
||
統計 Statistics |
本論文已被瀏覽 5849 次,被下載 225 次 The thesis/dissertation has been browsed 5849 times, has been downloaded 225 times. |
中文摘要 |
內政部入出國及移民署為提升一般入出國旅客快速查驗通關效率,針對相關行政流程等管制政策進行調整,以國內各大港口所建構之航前旅客資訊系統為例,該系統主要由各船舶公司於各國港口將船舶相關資料、船員姓名等基本資料,於其入境或離境前傳輸至目的國資料處理中心預作審查,以從中判別有無管制對象,進而可預作防範及事先處理,該系統為我國國家安全重大政策之一。 透過相關文獻蒐集發現,目前入出國及移民署所建構之航前旅客資訊系統雖業已執行,但針對導入該新興資訊系統後之使用者意圖為何,以及何者為影響採用意圖之因素了解較少,更無法瞭解施行後相關業者、航商之採用意願及成效。因此本研究擬以科技接受模型為主軸,發展一旅客航前資訊系統之科技接受模型,並以入出國及移民署高雄港隊轄區為研究範圍,船務代理業者為研究對象,針對導入旅客航前資訊系統之科技採用情形,及影響其採納該系統之因素,進行相關研究調查與評估,以該系統執行成效及後續精進方向,並提供後續推行建議。 研究發現,航前旅客資訊系統之有效性將有助於提升使用者正面態度,但該系統之態度無法有效提升使用者正面行為意圖、資訊安全有待強化、行為控制能力有待加強以提高使用者採用意圖,以及相關業者任主管職之人員使用航前旅客資訊系統意願偏低,此外,成立時間較長且具規模之相關業者認同該系統之程度較高,而也將學歷影響採用該系統之意願。後續研究建議應重新檢視航前旅客資訊系統推廣規劃並擬定改善計畫,且相關單位應針對人力資源結構改善提供協助、擬定相關激勵政策、強化資訊安全措施,並且持續進行政策學習,以利該系統可加以改善並順利推行。 |
Abstract |
To increase the efficiency of speedy customs clearance for the outboard and inboard passengers, the Nation Immigration Agency under the Ministry of Interior has adjusted the related administrative procedures, such kind of management policies. Take the Advanced Passenger Information System (APIS) constructed in the major ports of Taiwan as an example. It requires the ship lines submit the related information of the ships and the basic information of the crewmembers to the information-processing center of the target state for advanced inspection before entry or exit. The center can judge whether there are control subjects among them by the submitted information, and further take some prevention measures in advance. This system is one of the key policies of national security in Taiwan. It is found from the literature review that although the APIS built by the National Immigration Agency has put into practice, the system performance evaluation is so rare, furthermore, the use willingness and achievement of the related practitioners and carriers can’t be known. Therefore, this study takes the Technology Acceptance Model (TAM) as the main axis to develop a TAM for the APIS. Moreover, it takes the Kaohsiung Port Brigade of Nation Immigration Agency as study scope, and the freight forwarders as the study objects, to conduct investigative study and evaluation on the situation of importing the APIS technology and the factors affecting the use of that system. The purpose of this study is to realize the effectiveness of the system implementation and subsequent improvement directions, as well as provide suggestions on how to carry out the system in the future. The study shows that the APIS effectiveness can help to increase the users’ positive attitude, but the attitude towards the system can’t effectively improve the users’ positive intention, the information security awareness needs to be strengthened, the behavior control can’t effectively increase the users’ positive intention, and the persons who are in charge of the related fields show low willingness of using the APIS. Besides, the practitioners that have been founded for a longer time and developed into a large scale show a higher recognition degree to that system, and the education level also affects the willingness of using the APIS. The follow-up studies suggest reviewing the APIS promotion plan and making some improvements for it. Moreover, the involved institutions should provide assistance in the improvement of the human resource structure, make some related incentive, and enhance the information security concept, as well as conduct policy study, so as to facilitate the improvement and smooth implementation of the system. |
目次 Table of Contents |
論文審定書 i 謝辭 ii 摘 要 iii Abstract iv 目 錄 vi 圖 次 vii 表 次 viii 第一章緒論 1 第一節研究動機 1 第二節研究目的 3 第三節研究流程 4 第四節研究限制 6 第二章文獻探討 7 第一節航前旅客資訊系統 7 第二節理性行為理論 16 第三節計劃行為理論 19 第四節科技接受模型 24 第五節資訊科技能力 29 第三章研究方法與架構 33 第一節研究架構與假設 33 第二節研究方法 37 第三節問卷設計 39 第四章資料分析與討論 42 第一節樣本背景資料 42 第二節信度分析 43 第三節假設檢定 44 第五章結論與建議 69 第一節研究結論 69 第二節研究建議 72 第三節後續研究建議 74 參考文獻 75 附錄 81 |
參考文獻 References |
榮泰生,2007,《企業研究方法第二版》,五南圖書出版公司。 吳明隆,2005,《SPSS 統計應用學習實務》,台北:知城數位。 余泰魁、李能慧、吳桂森,2005,<金門觀光客旅遊行為意向實證研究性結構模式之交叉效度驗證>,《觀光研究學報》,11(4),355-384。 余泰魁、楊淑斐,2005,<線上學習系統使用意向之模式建構與比較分析研究>,《台灣管理學刊》,5(2),311-337。 吳盛、林東清,2007,<以計劃行為理論探討資訊人員的知識分享行為>,《資訊管理學報》,14(2),75-110。 李婉怡、趙珮如,2004,<醫療產業員工對電子病歷之科技接受模式探討 –以中南部地區為例>,《醫務管理期刊》,5(2),243-269。 周家慧、張善斌、范垂仁、顧為元,2004,<綜合所得稅網路結算申請系統的接受度之研究>,《電子商務研究》,2(4),359-380。 林彣珊、許應哲、黃馨儀,2009,<消費者採用網路平臺傳播購後訊息意圖之研究>,《商管科技季刊》,10(2),197-223。 胡凱傑、鍾文鑑、丘志文,2010,<以科技接受模式探討光纖寬頻網路使用者行為意向之影響因素>,《行銷評論》,7(2),161-186。 張紹勳,2002,〈兩性採用資訊科技的徑路比較〉,《管理評論》,21(4),19-45。 梁世安、余國瑋,2005,<以科技接受模式探討二輪式電動代步車消費者接受程度>,《行銷評論》,2(2),135-148。 蔡宗宏、池文海、許瑋麟,2007,<運用TAM 模式探討個人動機與社會系絡影響使用者接受知識管理系統之因素-以高科技公司為例>,《電子商務研究》,5(1),81-108。 林福仁,2002,<從社會與科技觀點探討教育領域的知識管理-教師專業網路社群的理論與實務>,《知識管理與教育革新發展研討會論文集》,5月31日,嘉義:國立中正大學教育學院。 張書勳、錢玉芬、林于新,2009,<以科技接受整合模式探討消費者使用購物網站之行為意圖>,《數位創世紀學術實務國際研討會發表論文》,5月15日,台北:社團法人中華白絲帶關懷協會。 蕭乃沂、林德芳,2003,〈電子化政府人力資源規劃之研究〉,《電子化政府 的挑戰與策略研討會》,10月21日,台北:行政院研究發展考核委會。 林金李,2009,<資訊科技能力與電子化實施意願之關係:以臺灣地方議會為例>,國立成功大學政治經濟學研究所碩士學位論文。 吳肇銘,1998,<影響網站使用意向之因素研究--以入門網站為例>,中央大學資訊管理學研究所博士學位論文。 何政浩,2010,<信任、主觀規範、涉入程度與知覺價值之研究-以電視關鍵字搜尋廣告為例>,國立屏東商業技術學院行銷與流通管理系碩士學位論文。 吳玉雯,2008,<資訊科技能力認知對電子化參與之影響-以資源基礎理論分析>,國立成功大學政治經濟學研究所碩士學位論文。 吳俊毅,2000,<科技接受模型之實徵研究─從動機角度>,國立中央大學 資訊管理研究所碩士學位論文。 周素華,1993,<電子通訊科技使用行為之研究─以交大學生為例>,交通大學土木工程研究所碩士學位論文。 康蜀嶼,1993,<企業運用電子資料交換(EDI)的實施關鍵成功因素之探討>,國立交通大學管理科學研究所碩士學位論文。 許碩博,1998,<影響企業採用企業內部網路(Intranet)的因素及研究效益>,私立淡江大學資訊管理研究所碩士論文碩士學位論文。 陳焜元,1995,<行政管理資訊系統使用者參與效果之研究─技術接受性模 式檢證>,國立政治大學公共行政學系碩士學位論文。 陳明遠,2010,<台北都會區MRT 共構住宅顧客購買意願及影響因素之研究–TAM與TPB 整合之觀點>,國立成功大學企業管理學系碩士學位論文。 陳文欽,2009,<航前旅客資訊系統對國境管理效能及個人資料保護影響之研究>,中央警察大學外事警察研究所碩士學位論文。 劉欽宏,1991,<影響企業採用新科技關鍵因素之研究>,國立政治大學企業管理研究所碩士學位論文。 蔡忠翰,2003,<政府部門資訊安全管理之研究>,國立政治大學公共行政學系碩士學位論文。 蔣麗君、蕭乃沂,2008,《政府資訊人力與資訊預算之研究:現況、挑戰與因應策略》,計畫編號(09640D002503),台北:行政院研究發展考核委員會委託電子治理研究中心執行之研究報告。 主計處,2009,<政府機關資訊安全問卷調查報告>,網址:http://www.dgbas.gov.tw/ ct.asp xItem=9022andctNode=418(瀏覽日期2012年6月01日)。 研考會,2008,<台灣性別數位落差調查報告>,網址:http://www.rdec.gov.tw/public/Attachment/92313455871.pdf(瀏覽日期:2012年6月01日)。 經濟日報,2010,<全球貨櫃港高雄掉出10大>,網http://www.chinanews.com/tw/jjwh/news/2009/02-06/1552233.shtml (瀏覽日期:2012年6月05日) 貳、英文部分 Ajzen, I. 1989. Attitude, personality, and behavioral. Milton Keynes: Open University press. Ajzen, I.1985. From Intentions to Actions: A theory of Planned Behavior. Springer, Heidelberg . Davidow, W. H. and Malone, M. S. 1992. The Virtual Corporation. New York:Edward Burlingame Books/Harper Business. Fishbein, Martin, and Isek Ajzen. 1975. Belief , Attitude , Intention , and Behavior : An Introduction to Theory and Research. MA: Addison-Wesley. Fisherbein, M. and Ajzen, I. 1980. Understanding attitudes and predicting social behavior. New Jersey:Pretice-Hall. Fukuyama, F. 1995. Trust: The Social Virutes and the Creation of Prosperity.New York:Free Press. Hair, J.F. Jr., Anderson, R.E., Tatham, R.L., Black, W.C. 1998. Multivariate Data Analysis(5th ed.),Englewood Cliffs, NJ:Prentice-Hall. Halpern, D. F.1996. Thought and Knowledge: An Introduction to Critical Thinking. (3rd ed.). Mahwah, N.J.:Erlbaum. Kwon, T. H., and Zmud, R. W. 1987. Unifying the fragmented models of information systems implementation, Critical Issues in Information System Research. New York, John Wiley.s Schumacker R. and R. Lomax. 2004. A Beginner’s Guide to Structural Equation Modeling. Mahwah, NJ:Lawrence Erlbaum Associates. Adams, D. A., Nelson, R. R. and Todd, P. A.1992. “Perceived usefulness, ease of use, and usage of information technology: A replication”, MIS Quarterly 16:227-247. Ajzen, I. 1991. “The theory of planned behavior.” Organizational Behavior and Human Decision Processes 50:179-211. Ajzen, I., and Driver, B. L. 1992. “Application of the theory of planned behavior to leisure choice.” Journal of Leisure Research 24:207- 224. Bagozzi R. and Yi Y. 1988.“On the Evaluation of Structural Equation Models," Academy of Marking Science 16(1):80-82. Bamberg, S., Ajzen, I. and Schmidt, P. 2003. “Choice of Traval Mode in the Theory of Planned Behavior: The roles of Past Behavior, Habit, and Reasoned Action”, Basic and Applied Social Psychology 25(3):175-187. Bandura, A. 1977. “Self-efficacy: Toward a unifying theory of behavioral change.” Human Decision Processes 50:179-211. Bandura, A. 1982. “Self-efficacy mechanism in human agency.” American Psychologist 37:122-147. Bandura, A. 1991. “Social cognitive theory of self-regulation.” Organizational Behavior and Human Decision Process 50:248-287. Bassellier G., Reich, B.H., and Benbasat, I.. 2001. “Information Technology Competence of Business Managers: A Definition and Research Model” Journal of Management Information Systems 17(4):159-182. Bentler P. M. and Bonett Douglas G.1980. “Significance Tests and Goodness of Fit in the Analysis of Covariance Structures,” Psychological Bulletin 88(3): 603-605 Bharadwaj, A.2000. “A Resource-Based Perspective on Information Technology Capability and Firm Performance: An Empirical Investigation,” MIS Quarterly 24(1):169-196. Bimber, B. 2000. “Measuring the gender gap on the Internet.” Social Science Quarterly 81: 868–876. Brown, J. and P. Duguid.1991.“Organizational Learning and Communities of Practice: Toward a Unified View of Working, Learning and Innovation,” Organization Psychological Review 84(2):191-215. Bruque, S. and Moyano, J. 2007. “Organisational determinants of information technology adoption and implementation in SMEs: The case of family and cooperative firms,” Techhnovation 27(5):241-253. Davis, F. D. 1989. “Perceived usefulness, perceived ease of use, and user acceptance of information technology.” MIS Quarterly 14:319-340. Finne, T. 2000. “Key Concepts and Business Processes, Computers and Security,” Information Systems Risk Management 19(3):234. Gefen, D. 2000. “E-commerce: the Role of Familiarity and Trust Omega 28(6):725-737. Henry J. W. and Stone W. 1994. “A Structural Equation Model of End-User Satisfaction with A Computer-Based Medical Information System,” Information Resources Management Journal 7(3):21-33. Igbaria, M.,and Iivari, J. 1995. “The effects of self-efficacy on computer usage.” Omega 23(6): 587-605. Lee, D., E. Trauth and D. Farwell.1995. “Critical Skills and Knowledge Requirements of IS Professionals: A Joint Academic/Industry Investigation,” MIS Quarterly 19(3): 313-340. Lee, J. Cerreto, F. A. and Lee, J,. 2010. “Theory of Planned Behavior and Teacher’s Decisions Regarding Use of Educational Technology”, Educational Technology and Society 13(1):152-164. MacCallum R. C. and Hong S.1997. “Power Analysis in Covariance Structure Modeling Using GFI and AGFI,” Multivariate Behavioral Research 32(2):208-209. Mulaik, S.A., James, L.R., Van Altine, J., Bennett, N., Lind, S., & Stilwell, C.D. 1989.”Evaluation of goodness-of-fit indices for structural equation models.” Psychological Bulletin 105:.430-445. Premkumar, G.,King, W. R..1992.”An Empirical Assessment of Information of Information Systems Planning and the Role of Information Systems.” Organizations.Journal of Management Information Systems 9(2):99-125. Ramaya, T., Rouibah, K., Gopi, M., and Rangel, G. J. 2009.”A decomposed theory of reasoned action to explain intention to use Internet stock trading among Malaysian investors.” Computers in Human Behavior25(6):1222-1230. Ross, J., C. Beath and D. Goodhue. 1996. “Develop Long-term Competitiveness Through IT Assets,” Sloan Management Review 38(1):31-45. Science, 2(1):. 40-57. Rose, R. 1991. “What is Lesson-Drawing?” Journal of Public Policy 1(11)3-30. Shaoyi, L., Yuan, P.S., Huaiqing, W. and Ada, C. 1999. “The Adoption of Virtual Banking: an Empirical Study?” International Journal of Information Management 19:63 - 74. Stanley A. Mulaik, Larry R. James, Judith Van Alstine, Nathan Bennett, Sherri Lind and C. Dean Stilwell. 1989. “An Evaluation of Goodness of Fit Indices for Structural Equation Models,” Psychological Bulletin 105(3):430-445. Straub, D. , Limayem D. and E. Karahanna-Evaristo, 1995. “Measuring systemusage: implications for its theory testing,” Management Science 41(8): 1328-1342. Sugawara, H. M., Mac Callum, R. C.1993.”Effect of Estimation Method on Incremental Fit Indexes for Covariance Structure Models.“ Applied Psychological Measurement 17(4):365-377. Taylor, S. and Todd, P. A. 1995. “Understanding information technology usage: A test of competing models.” Information System Research 6(2):144-176. Tomarken, A.J., and Waller, N.G. 2005. “Structural equation modeling: Strengths, limitations, and misconceptions.” Annual Review of Clinical Psychology 1 :31-65. Venkatesh, V. and Davis, F.D. 1996.“A Model of the Antecedents of Perceived Ease of Use: Development and Test,” Decision Sciences 27(3):451-481. Venkatesh, V., and Davis, D.2000. “A Theoretical Extension of the Technology Acceptance Model: Four Longitudinal Field Studies.” Information Systems Research 46(2):125-131. Voss, C.A. 1986. “Implementing manufacturing technology: a manufacturing strategy approach.” International Journal of Operations and Production Management 6(5):17-25. Russell, C.. 2009. “Security Awareness-Implementing an Effective Strategy,” GSEC Practical Version 1. 4b-Option 1 (October 25, 2002), Website: http://www. giac.org (Viewed on August 3, 2009). Stanton, E.2009. “Fortify Security through Quality Assurance Practices,” GSEC Practical Assignment Version 1.2e (April 18, 2004), Website: http://www.giac.org (Viewed on August 3, 2009) 。 |
電子全文 Fulltext |
本電子全文僅授權使用者為學術研究之目的,進行個人非營利性質之檢索、閱讀、列印。請遵守中華民國著作權法之相關規定,切勿任意重製、散佈、改作、轉貼、播送,以免觸法。 論文使用權限 Thesis access permission:自定論文開放時間 user define 開放時間 Available: 校內 Campus: 已公開 available 校外 Off-campus: 已公開 available |
紙本論文 Printed copies |
紙本論文的公開資訊在102學年度以後相對較為完整。如果需要查詢101學年度以前的紙本論文公開資訊,請聯繫圖資處紙本論文服務櫃台。如有不便之處敬請見諒。 開放時間 available 已公開 available |
QR Code |