帳號:guest(18.222.9.171)          離開系統
字體大小: 字級放大   字級縮小   預設字形  

詳目顯示

以作者查詢圖書館館藏以作者查詢臺灣博碩士論文系統以作者查詢全國書目
作者(中文):洪嬿翔
作者(外文):Hung, Yen-Hsiang
論文名稱(中文):線上註冊探討:為什麼人們要在網站上註冊?為什麼選擇使用SSO註冊?
論文名稱(外文):An exploration of online registration: why people register with websites, and why do they choose Single Sign-On (SSO)?
指導教授(中文):雷松亞
指導教授(外文):Ray, Soumya
口試委員(中文):林福仁
王貞雅
學位類別:碩士
校院名稱:國立清華大學
系所名稱:服務科學研究所
學號:101078507
出版年(民國):103
畢業學年度:103
語文別:英文
論文頁數:49
中文關鍵詞:註冊單一登入自我揭露註冊意願註冊方式
外文關鍵詞:Registrationsingle sign-onself-disclosureregistration intentionregistration method
相關次數:
  • 推薦推薦:0
  • 點閱點閱:421
  • 評分評分:*****
  • 下載下載:1
  • 收藏收藏:0
線上註冊逐漸在使用者及企業間扮演重要角色,許多線上網站要求使用者註冊已獲取使用者的個人資料,公司可以分析使用者資料來了解使用者,進而改善行銷並建立顧客關係。儘管公司重視使用者在網站上註冊,但目前仍少有研究探討影響使用者行為的動機。本研究著重在了解影響註冊意願及註冊方式的因素,我們結合了自我揭露理論,從認知利益及認知成本的觀點探討使用者註冊。
研究結果顯示註冊意願會受到購買意願、銷售意願、分享網站至社群網站意願、信任的影響,而社群認同不影響註冊意願。此外,研究結果顯示使用Single sign-on (SSO) 的可能性會受到方便性、正確的SSO心智模型及分享網站至社群網站意願的影響。在使用者選擇註冊方式時,正確的SSO心智模型會影響使用者的抉擇,但是只有在使用者對註冊保持中立態度或是不願意登入的狀況下,對於願意登入的人並不會受到影響。
希望本研究可以引起更多人的興趣,進一步研究相關問題。此外,本研究針對研究結果進行討論,對於未來應用方式及後續研究重點加以說明,期望能對學者及實務工作者有所助益。
In order to get user’s personal information and analyze user information to improve marketing skill and build customer relationship, increasingly growth of websites ask people for registration. Although registration is important, few studies research it. This study focuses on the effects on registration intention and registration method. We researched registration based on the viewpoint of perceived benefit and risks of self-disclosure in this study. An online survey was conducted to test the models. The results suggested that user’s registration intention could be influenced by trust, intention to purchase, intention to sell product and intention to share on social network sites, but not community identification. Besides, the results suggested that people’s likelihood of using single sign-on (SSO) could be influenced by convenience, correct SSO mental model and intention to share on social network sites. Furthermore, correct SSO mental model is important but only influences people who are neutral or unwilling to register. Overall, the result of the study may draw attention to registration. Additionally, these findings have implications for researchers and managers.
CHAPTER 1 Introduction
CHAPTER 2 Conceptual development
2.1 Self-disclosure
2.2 Web Trust
2.3 Social identity
2.4 Control variables
2.5 Single Sign-On
CHAPTER 3 Methodology
3.1 Research Setting
3.2 Website Stimuli
3.3 Data collection
3.4 Measurement
CHAPTER 4 Data Analysis and Results
4.1 Measurement model results
4.2 Structure model analysis
4.3 Logistic regression analysis
4.4 Logistic regression analysis in two group
CHAPTER 5: Discussion and Conclusion
5.1 Summary of findings
5.2 implications
5.3 Limitations and Future Research
Appendix
Reference
Abrahams, S. L. (2008). Handmade online: The crafting of commerce, aesthetics and community on Etsy. com. THE UNIVERSITY OF NORTH CAROLINA AT CHAPEL HILL.
Acquisti, A., & Grossklags, J. (2003). Losses, gains, and hyperbolic discounting: An experimental approach to information security attitudes and behavior. Paper presented at the 2nd Annual Workshop on Economics and Information Security-WEIS.
Algesheimer, R., Dholakia, U. M., & Herrmann, A. (2005). The social influence of brand community: evidence from European car clubs. Journal of marketing, 69(3), 19-34.
Andrade, E. B., Kaltcheva, V., & Weitz, B. (2002). Self-disclosure on the web: the impact of privacy policy, reward, and company reputation. Advances in Consumer Research, 29(1), 350-353.
Ashforth, B. E., & Mael, F. (1989). Social identity theory and the organization. Academy of management review, 14(1), 20-39.
Bagozzi, R. P., & Yi, Y. (1988). On the evaluation of structural equation models. Journal of the Academy of Marketing Science, 16(1), 74-94.
Bandura, A. (1977). Self-efficacy: toward a unifying theory of behavioral change. Psychological review, 84(2), 191.
Bargh, J. A., McKenna, K. Y., & Fitzsimons, G. M. (2002). Can you see the real me? Activation and expression of the “true self” on the Internet. Journal of social issues, 58(1), 33-48.
Bergami, M., & Bagozzi, R. P. (2000). Self‐categorization, affective commitment and group self‐esteem as distinct aspects of social identity in the organization. British Journal of Social Psychology, 39(4), 555-577.
Berry, L. L., Seiders, K., & Grewal, D. (2002). Understanding service convenience. Journal of marketing, 66(3), 1-17.
Bhattacharya, C. B., & Sen, S. (2003). Consumer-company identification: a framework for understanding consumers’ relationships with companies. Journal of marketing, 67(2), 76-88.
Brehm, J. W. (1966). A theory of psychological reactance. New York.
Chen, G., Gully, S. M., & Eden, D. (2001). Validation of a new general self-efficacy scale. Organizational research methods, 4(1), 62-83.
Chen, I. J., & Popovich, K. (2003). Understanding customer relationship management (CRM): People, process and technology. Business process management journal, 9(5), 672-688.
Chiu, C.-M., Hsu, M.-H., & Wang, E. T. (2006). Understanding knowledge sharing in virtual communities: an integration of social capital and social cognitive theories. Decision Support Systems, 42(3), 1872-1888.
Compeau, D. R., & Higgins, C. A. (1995). Computer self-efficacy: Development of a measure and initial test. MIS quarterly, 189-211.
Culnan, M. J., & Armstrong, P. K. (1999). Information privacy concerns, procedural fairness, and impersonal trust: An empirical investigation. Organization Science, 10(1), 104-115.
Culnan, M. J., & Bies, R. J. (2003). Consumer privacy: Balancing economic and justice considerations. Journal of social issues, 59(2), 323-342.
Cyr, D. (2008). Modeling web site design across cultures: relationships to trust, satisfaction, and e-loyalty. Journal of Management Information Systems, 24(4), 47-72.
Davis, F. D., Bagozzi, R. P., & Warshaw, P. R. (1989). User acceptance of computer technology: a comparison of two theoretical models. Management science, 35(8), 982-1003.
Dholakia, U. M., Bagozzi, R. P., & Pearo, L. K. (2004). A social influence model of consumer participation in network-and small-group-based virtual communities. International journal of research in marketing, 21(3), 241-263.
Dinev, T., & Hart, P. (2006). An extended privacy calculus model for e-commerce transactions. Information Systems Research, 17(1), 61-80.
Florencio, D., & Herley, C. (2007). A large-scale study of web password habits. Paper presented at the Proceedings of the 16th international conference on World Wide Web.
Fornell, C., & Larcker, D. F. (1981). Evaluating structural equation models with unobservable variables and measurement error. Journal of marketing research, 39-50.
Gabber, E., Gibbons, P. B., Matias, Y., & Mayer, A. (1997). How to make personalized web browsing simple, secure, and anonymous. Paper presented at the Financial Cryptography.
Gabisch, J. A., & Milne, G. R. (2013). Self-disclosure on the web: Rewards, safety cues, and the moderating role of regulatory focus. Journal of Research in Interactive Marketing, 7(2), 140-158.
Ganguly, B., Dash, S. B., Cyr, D., & Head, M. (2010). The effects of website design on purchase intention in online shopping: the mediating role of trust and the moderating role of culture. International Journal of Electronic Business, 8(4), 302-330.
Gefen, D., Karahanna, E., & Straub, D. W. (2003). Trust and TAM in online shopping: an integrated model. MIS quarterly, 27(1), 51-90.
Gilbert, D., Balestrini, P., & Littleboy, D. (2004). Barriers and benefits in the adoption of e-government. International Journal of Public Sector Management, 17(4), 286-301.
Harrison McKnight, D., Choudhury, V., & Kacmar, C. (2002). The impact of initial consumer trust on intentions to transact with a web site: a trust building model. The Journal of Strategic Information Systems, 11(3), 297-323.
Ioinson, A. N., & Paine, C. B. (2007). Self-disclosure, privacy and the Internet. The Oxford handbook of Internet psychology, 2374252.
Jiang, Z., Chan, J., Tan, B. C., & Chua, W. S. (2010). Effects of interactivity on website involvement and purchase intention. Journal of the Association for Information Systems, 11(1), 1.
Johnson, D. S. (2007). Achieving customer value from electronic channels through identity commitment, calculative commitment, and trust in technology. Journal of interactive marketing, 21(4), 2-22.
Joseph, J., Anderson, R., Tatham, R., & Black, W. (1992). Multivariate data analysis with readings: USA.
Kiang, M. Y., Raghu, T., & Shang, K. H.-M. (2000). Marketing on the Internet—who can benefit from an online marketing approach? Decision Support Systems, 27(4), 383-393.
Kim, D. J., Ferrin, D. L., & Rao, H. R. (2009). Trust and satisfaction, two stepping stones for successful e-commerce relationships: a longitudinal exploration. Information Systems Research, 20(2), 237-257.
Kormann, D. P., & Rubin, A. D. (2000). Risks of the passport single signon protocol. Computer Networks, 33(1), 51-58.
Lai, J.-Y., & Chang, C.-Y. (2011). User attitudes toward dedicated e-book readers for reading: The effects of convenience, compatibility and media richness. Online Information Review, 35(4), 558-580.
Lin, K.-Y., & Lu, H.-P. (2011). Why people use social networking sites: An empirical study integrating network externalities and motivation theory. Computers in Human Behavior, 27(3), 1152-1161.
Liu, I.-F., Chen, M. C., Sun, Y. S., Wible, D., & Kuo, C.-H. (2010). Extending the TAM model to explore the factors that affect Intention to Use an Online Learning Community. Computers & Education, 54(2), 600-610.
Malhotra, N. K., Kim, S. S., & Agarwal, J. (2004). Internet users' information privacy concerns (IUIPC): the construct, the scale, and a causal model. Information Systems Research, 15(4), 336-355.
Maslow, A. H., Frager, R., Fadiman, J., McReynolds, C., & Cox, R. (1970). Motivation and personality (Vol. 2): Harper & Row New York.
Mazaheri, E., Richard, M.-O., & Laroche, M. (2011). Online consumer behavior: Comparing Canadian and Chinese website visitors. Journal of Business Research, 64(9), 958-965.
McKnight, D. H., Choudhury, V., & Kacmar, C. (2002). Developing and validating trust measures for e-commerce: an integrative typology. Information Systems Research, 13(3), 334-359.
Mithas, S., Krishnan, M. S., & Fornell, C. (2005). Why do customer relationship management applications affect customer satisfaction? Journal of marketing, 69(4), 201-209.
Montano, D. E., & Kasprzyk, D. (2008). Theory of reasoned action, theory of planned behavior, and the integrated behavioral model. Health behavior and health education: Theory, research, and practice, 4, 67-95.
Moon, Y. (2000). Intimate exchanges: Using computers to elicit self-disclosure from consumers. Journal of consumer research, 26(4), 323-339.
Morgan, R. M., & Hunt, S. D. (1994). The commitment-trust theory of relationship marketing. the journal of marketing, 20-38.
Nunally, J. C., & Bernstein, I. H. (1978). Psychometric theory: New York: McGraw-Hill.
Nysveen, H., & Pedersen, P. (2003). Usefulness and self-expressiveness: extending TAM to explain the adoption of a mobile parking service. BLED 2003 Proceedings, 64.
O'Reilly, C. A., & Chatman, J. (1986). Organizational commitment and psychological attachment: The effects of compliance, identification, and internalization on prosocial behavior. Journal of applied psychology, 71(3), 492.
Ong, E. Y., Ang, R. P., Ho, J., Lim, J. C., Goh, D. H., Lee, C. S., & Chua, A. Y. (2011). Narcissism, extraversion and adolescents’ self-presentation on Facebook. Personality and Individual Differences, 50(2), 180-185.
Pentina, I., Prybutok, V. R., & Zhang, X. (2008). The role of virtual communities as shopping reference groups. Journal of Electronic Commerce Research, 9(2), 114-136.
Pfitzmann, B., & Waidner, B. (2002). Token-based web single signon with enabled clients. IBMResearchReportRZ3458, 93844.
Phelps, J., Nowak, G., & Ferrell, E. (2000). Privacy concerns and consumer willingness to provide personal information. Journal of Public Policy & Marketing, 19(1), 27-41.
Ray, S., Ow, T., & Kim, S. S. (2011). Security assurance: How online service providers can influence security control perceptions and gain trust. Decision Sciences, 42(2), 391-412.
Ridings, C. M., Gefen, D., & Arinze, B. (2002). Some antecedents and effects of trust in virtual communities. The Journal of Strategic Information Systems, 11(3), 271-295.
Samar, V. (1999). Single sign-on using cookies for Web applications. Paper presented at the Enabling Technologies: Infrastructure for Collaborative Enterprises, 1999.(WET ICE'99) Proceedings. IEEE 8th International Workshops on.
Schlosser, A. E., White, T. B., & Lloyd, S. M. (2006). Converting web site visitors into buyers: how web site investment increases consumer trusting beliefs and online purchase intentions. Journal of marketing, 70(2), 133-148.
Scott, S. G., & Lane, V. R. (2000). A stakeholder approach to organizational identity. Academy of management review, 25(1), 43-62.
Scullin, S. S., Fjermestad, J., & Romano Jr, N. C. (2004). E-relationship marketing: changes in traditional marketing as an outcome of electronic customer relationship management. Journal of Enterprise Information Management, 17(6), 410-415.
Seiders, K., Voss, G. B., Godfrey, A. L., & Grewal, D. (2007). SERVCON: development and validation of a multidimensional service convenience scale. Journal of the Academy of Marketing Science, 35(1), 144-156.
Shen, A. X., Cheung, C. M., Lee, M. K., & Chen, H. (2011). How social influence affects we-intention to use instant messaging: The moderating effect of usage experience. Information Systems Frontiers, 13(2), 157-169.
Shih, D.-H., Hsu, S.-F., Yen, D. C., & Lin, C.-C. (2012). Exploring the Individual's Behavior on Self-Disclosure Online. International Journal of Human-Computer Interaction, 28(10), 627-645.
Siau, K., & Shen, Z. (2003). Building customer trust in mobile commerce. Communications of the ACM, 46(4), 91-94.
Son, J.-Y., & Kim, S. S. (2008). Internet users' information privacy-protective responses: a taxonomy and a nomological model. MIS quarterly, 503-529.
Stets, J. E., & Burke, P. J. (2000). Identity theory and social identity theory. Social psychology quarterly, 224-237.
Sun, S.-T., Pospisil, E., Muslukhov, I., Dindar, N., Hawkey, K., & Beznosov, K. (2011). What makes users refuse web single sign-on?: an empirical investigation of OpenID. Paper presented at the Proceedings of the Seventh Symposium on Usable Privacy and Security.
Taraszow, T., Aristodemou, E., Shitta, G., Laouris, Y., & Arsoy, A. (2010). Disclosure of personal and contact information by young people in social networking sites: An analysis using Facebook profiles as an example. International Journal of Media & Cultural Politics, 6(1), 81-101.
Taylor, D. G., Strutton, D., & Thompson, K. (2012). Self-enhancement as a motivation for sharing online advertising. Journal of Interactive Advertising, 12(2), 13-28.
Taylor, S., & Todd, P. A. (1995). Understanding information technology usage: a test of competing models. Information Systems Research, 6(2), 144-176.
Van Boven, L., & Gilovich, T. (2003). To do or to have? That is the question. Journal of personality and social psychology, 85(6), 1193.
Volchkov, A. (2001). Revisiting single sign-on: a pragmatic approach in a new context. IT Professional, 3(1), 39-45.
Wang, R., Chen, S., & Wang, X. (2012). Signing me onto your accounts through facebook and google: A traffic-guided security study of commercially deployed single-sign-on web services. Paper presented at the Security and Privacy (SP), 2012 IEEE Symposium on.
Wang, S., Beatty, S. E., & Foxx, W. (2004). Signaling the trustworthiness of small online retailers. Journal of interactive marketing, 18(1), 53-69.
Winer, R. S. (2001). A framework for customer relationship management. California management review, 43(4), 89-105.
Zaichkowsky, J. L. (1994). The personal involvement inventory: Reduction, revision, and application to advertising. Journal of advertising, 23(4), 59-70.
Zanoli, R., & Naspetti, S. (2002). Consumer motivations in the purchase of organic food: a means-end approach. British food journal, 104(8), 643-653.
Zhou, T. (2011). Understanding online community user participation: a social influence perspective. Internet Research, 21(1), 67-81.
(此全文限內部瀏覽)
電子全文
摘要
 
 
 
 
第一頁 上一頁 下一頁 最後一頁 top
* *