题名

網路購物信任與科技接受模式之實證研究

并列篇名

An Empirical Study of Trust and TAM-An Example of Online Shopping

DOI

10.6382/JIM.200801.0123

作者

吳亞馨(Ya-Hsing Wu);朱素玥(Su-Yueh Chu);方文昌(Wen-Chang Fang)

关键词

信任 ; 科技接受模式 ; 計算基礎信任 ; 熟悉基礎信任 ; 制度基礎信任 ; Trust ; technology acceptance model ; calculative-based trust ; familiarity-based trust ; institution-based trust

期刊名称

資訊管理學報

卷期/出版年月

15卷1期(2008 / 01 / 01)

页次

123 - 152

内容语文

繁體中文

中文摘要

93年12月,各大媒體爭相報導雅虎優良賣家「橘子媽媽」賣假貨的訊息,此事件引起社會軒然大波,網路詐騙案件層出不窮,網路購物的信任議題也一再地被討論。過去研究顯示,消費者在與購物網站交易前會先建立對該購物網站的信任,並且會評估其資訊科技,即科技接受模式(TAM)中,網路的知覺有用與知覺易用。故本研究目的首先配合台灣網路購物特性,提出結合信任理論與科技接受模式之延伸性模式;其次,檢測消費者對購物網站的信任前因;最後,探討購物網站如何提高消費者之使用意願。本研究以321位大專生為研究對象,採問卷調查方法,並以結構方程模式進行分析。研究結果顯示,(1)本文提出之模式具合理配適度,此模式很成功地結合了TAM與信任理論,可用以解釋台灣網路購物者對新科技的採用行為;(2)在台灣的網路購物環境中,信任的前因包含「計算基礎」、「熟悉基礎」,以及「制度基礎」的信任;(3)網路購物者對網站系統的使用會受到對購物網站信任的影響,且藉由增加與網路購物者的溝通,可以提高消費者的信任程度,以及消費者對購物網站的知覺易用與知覺有用的評估,並進一步提昇對該網站的使用意願。本文最後亦針對重要結論分析管理意涵,並提出建議與後續研究課題。

英文摘要

Several researchers have identified that customers have to build the trust in shopping websites and evaluate its information technology before trading. The findings can be interpreted in terms of the perceived usefulness and perceived ease-of-use of the website as depicted in the technology acceptance model (TAM). Accordingly, along with the first objective of this research is to integrate trust theory and TAM into the extended model in Taiwan. The second objective of the research is to find factors which affect antecedents of trust by customers. Finally, to examine how customer's intended use can be raised by an e-vendor. We conducted a questionnaire consisting of 321 undergraduate students, and analysis the data using SEM to test the hypotheses. Results from this study suggest that; (1) the Extended TAM proposed in this study has acceptable goodness-of-fit, representing the successful combination of the TAM and trust theory, and it can interpret clearly the e-buyer's adoptable behavior toward new IT, (2) the antecedents of trust for E-vender's website in Taiwan embrace calculative-based trust, familiarity-based trust and institution-based trust, (3) customer trust toward e-vender affects their intended use. Furthermore, the evaluation of customer trust, perceived ease-of-use and perceived usefulness of the website can be promoted by enhancing the interaction with e-buyers and e-venders.

主题分类 基礎與應用科學 > 資訊科學
社會科學 > 管理學
参考文献
  1. 奇摩雅虎新聞網
  2. 蕃薯藤新聞網
  3. 奇摩雅虎新聞網
  4. 奇摩雅虎新聞網
  5. (2003)。經濟部商業司 電子商務環境整備及B2C推動計畫。資策會ACI。
  6. Agarwal, R.,Karahanna, E.(2000).Time Flies When You're Having Fun: Cognitive Absorption and Beliefs About Information Technology Usage.MIS Quarterly,24(4),665-694.
  7. Akelof, G.A.(1970).The Market for Lemons:Quality Under Uncertainty and the Market Mechanism.Quarterly Journal of Economics,84,488-500.
  8. Anderson, J.R.(1985).Cognitive Psychology and Its Implication.New York:W. H. Freeman and Company.
  9. Aydin, C.,Rice, R.E.(1991).Social worlds, individual differences, and implementation: predicting attitudes toward a medical information system.Information and Management,20,119-136.
  10. Ba, S.,Pavlou, P.A.(2002).Evidence of the effect of trust building technology in electronic markets: price premium and buyer behavior.MIS Quarterly,26(3),243-268.
  11. Barber, B.(1983).The logic and limits of trust.New Brunswick, NJ:Rutgers University Press.
  12. Blau, P.M.(1964).Exchange and Power in Social Life.John Wiley& Sons:New York.
  13. Boon, S.D.,Holmes, J.G.,Robert A. Hinde,Jo Groebel (eds.)(1985).Cooperation and Personal Behavior.New York:Cambridge University.
  14. Brancheau, J. C.(1987).The innovation of information technology: extending innovation diffusion theory in the context of end-user computing.University of Minnesota.
  15. Brancheau, J.C.,Wetherbe, J.C.(1990).The adoption of spreadsheet software: testing innovation diffusion theory in the context of end-user computing.Information Systems Research,1(2),115-143.
  16. Buckley, P.J.,Casson, M.,F.J. Contractor,P. Lorange (Eds.)(1988).Cooperative strategies in international business.Lexington, MA:Lexington Books.
  17. Butler, J.K.,Cantrell, R.S.(1984).A behavioral decision theory approach to modeling dyadic trust in superiors and subordinates.Psychological Reports,55,19-28.
  18. Compeau, D.,Higgins, C.,J. DeGross,I. Benbasat,G. Desanctis, C. Beath (Eds.)(1991).A social cognitive theory perspective on individual reactions to computing technology.Proceedings of the 12th Annual Conference on Information Systems
  19. Cortina, Jose M.(1993).What Is Coefficient Alpha? An Examination of Theory and Application.Journal of Applied Psychology,78,98-104.
  20. Cronbach, L.(1951).Coefficient alpha and the internal structure of tests.Psychometrika,16,297-334.
  21. Dasgupta, P.,D. GAmbetta (Ed.)(1988).Trust: Making and breaking cooperative relations.
  22. Davenport, Davis, S. J.,Grimes, C.(1999).Collaborative Research Programmes: Building Trust from Difference.Technovation,19(1),31-40.
  23. Davis, F. D.(1989).Perceived Usefulness, Perceived Ease of Use and User Acceptance of Information Technology.MIS Quarterly,13(3),319-340.
  24. Davis, F.D.(1986).Doctoral Dissertation, MIT Sloan School of Management.Cambridge, MA:
  25. Davis, F.D.,Bagozzi, R.P.,Warshaw, P.R.(1989).User acceptance of computer technology: A comparison of two theoretical models.Management Science,35(8),982-1003.
  26. Davis, F.D.,Bagozzi. R.P.,Warshaw, P.R.(1992).Extrinsic and Intrinsic Motivation to Use Computers in the Workplace.Journal of Applied Social Psychology,22(14),1111-1132.
  27. Deutsch, M.(1962).Cooperation and Trust: Some Theoretical Notes.Industrial Relations,8(1),1-27.
  28. Deutsch, M.(1960).The effect of motivational orientation upon trust and suspicion.Human Relations,13,123-139.
  29. Dirks, K.T.(1999).The effects of interpersonal trust on work group performance.Journal of Applied Psychology,84(3),445-455.
  30. Dirks, K.T.(2000).Trust in Leadership and Team performance:Evidence from NCCA Basketrball.Journal of Applied Psychology,85(6),1004-1012.
  31. Doll, W.J.,Xia. W.,Torkzadeh. G.A.(1994).A Confirmatory Factor Analysis of the End-User Computing Satisfaction Instrument.MIS Quarterly,18,453-461.
  32. Doney, P.M.,Cannon, J.P.(1997).An Examination of the Nature of Trust in Buyer-Seller Relationships.Journal of Marketing,61,35-51.
  33. Doney, Patricia. M.,Cannon, J. P.,Mullen, M. R.(1998).Understanding The Influence of National Culture on the Development.Academy of Management, The Academy of Management Review,23(3),601-620.
  34. Etezadi-Amoli, J.,Farhoomand, A.F.(1996).A structural model of end user computing satisfaction and user performance.Information and Management,30(2),65-73.
  35. Fukuyama, F.(1995).Trust: The Social Virtues and the Creation of Prosperity.New York:The Free Press.
  36. Fulk, J,Schmitz, J.,Steinfield, C.W.,J. Fulk, C. Steinfield (Eds.)(1990).A social influence model of technology use in organizations and communication technology.Newbury Park, CA:Sage.
  37. Fulk, J,Steinfield, C.W.,Schmitz, J.,Power, G.J.(1987).A socil information processing model of media use in organizations.Communication Research,14(5),529-552.
  38. Ganesan, S.(1994).Determinants of Long-Term Orientation in Buyer-Seller Relationships.Journal of Marketing,58,1-19.
  39. Gefen, D.(1997).Georgia State University.
  40. Gefen, D.(2000).E-Commerce: The Role of Familiarity and Trust.Omega,28(6),725-735.
  41. Gefen, D.,Keil, M.(1998).The Impact of Developer Responsiveness on Perceptions of Usefulness and Ease of Use: An Extension of the Technology Acceptance Model.The Data Base for Advances in Information Systems,29(2),35-49.
  42. Gefen, D.,Straub, D. W.(2000).The Relative Importance of Perceived Ease-of-Use in IS Adoption: A Study of E-Commerce Adoption.Journal of the Association for Information System,1(8),1-30.
  43. Gefen, David,Karahanna, E.,Straub, D. W.(2003).Inexperience and Experience With Online Stores: The Importance of TAM and Trust.IEEE Transactions on Engineering Management,50(3),307-321.
  44. Gefen, David,Karahanna, E.,Straub, D. W.(2003).Trust and TAM in Online Shopping: An Integrated Model.MIS Quarterly,27(1),51-90.
  45. Gefen, David,Straub, D.W.,Boudreau, M.C.(2000).Structural Equation Modeling and Regression: Guidelines for Research Practice.Communications of the Association for Information Systems,4(7),1-70.
  46. Good, D,,D. G. Gambetta (Ed.)(1988).Individuals, Interpersonal Relations, and Trust.New York:Basil Blackwell.
  47. Goodhue, D. L.,Thompson, R. L.(1995).Task-Technology Fit and Individual Performance.MIS Quarterly,19(2),213-236.
  48. Granovetter, M.(1985).Economic action and social structure: A theory of embeddeness.American Journal of Sociology,91,481-510.
  49. Hatcher, L.(1994).A Step-by-Step Approach to Using the SAS System for Factor Analysis and Structural Equation Modeling.NC:SAS Institute.
  50. Hayduk, L.A.(1987).Structural Equation Modeling with LISREL: Essentials and Advances.Baltimore, MD:The Johns Hopkins University Press.
  51. Hoffer, J.A.,Alexander, M.B.(1992).The diffusion of database machines.Data Base,23,13-19.
  52. Holmes, J.G.,W. H. Jones,D. Perlman (eds.)(1991).in Advances in Personal Relationships.London:Jessica Kingsley.
  53. Jarvenpaa, S.L.,Knoll, K.,Leidner, D.E.(1998).Is Anybody Out There? Antecedents of Trust in Global Virtual Teams.Journal of Management Information Systems,14(4),29-64.
  54. Jarvenpaa, S.L.,Tod, P.A.(1997).Consumer reactions to electronic shopping on the world wide web.International Journal Electron Commerce,1(2),59-88.
  55. Jarvenpaa, S.L.,Tractinsky, N.,Vitale, M.(2000).Consumer Trust in and Internet Store.Information Technology and Management,1,45-71.
  56. Jarvenpaa, S.L.,Tractinsky. N.(1999)."Consumer trust in an internet store: A cross-cultural validation," Journal Comput.Mediated Commun,5(2),1-35.
  57. Jöeskog, K.G.,Sörbom, D.(1993).Structural equation modeling with the SIMPLIS command language.Chicago:Scientific Software International.
  58. Jones, S.,Wilkens, M.,Morris, P.,Masera, M.(2000).Trust Requirements in E-Business.Communications of The ACM,43(12),81-87.
  59. Karahanna, E.,Straub, D. W.(1999).The psychological origins of perceived usefulness and perceived ease-of-use.Information Management,35,237-250.
  60. Karahanna, E.,Straub, D.W.,Chervany, N.L.(1999).Information technology adoption across time: A cross-sectional comparison of pre-adoption and post-adoption beliefs.MIS Quarterly,23(2),183-213.
  61. Kelley, H.H.(1979).Personal Relationships: Their Structure and Processes.Mahwah, NJ:Lawrence Erlbaum Associates.
  62. Kline, R.B.(1998).Principles and Practice of Structural Equation Modeling.The Guilford Press:New York.
  63. Korsgaard, M.A.,Schweiger, D.M.,Sapienza, H.J.(1995).Building Commitment, Attachment, and Trust in Strategic Decision-Making Teams: The Role of Procedural Justice.Academy of Management Journal,38(1),60-84.
  64. Koufaris, M.(2002).Applying Technology Acceptance Model and Flow Theory to Online Consumer Behavior.Information Systems Research,13(2),205-223.
  65. Kumar, N.(1996).The Power of Trust in Manufacturer-Retailer Relationships.Havard Business Review,74(6),93-106.
  66. Lederer, A. L.,Maupin, D. J.,Sena, M. P.,Zhuang, Y.(2000).The Technology Acceptance Model and the World Wide Web.Decision Support Systems,29(3),269-282.
  67. Lee, D.,Park, J.,Ahn, J.,V. Storey,S. Sarket,J.I. DeGross (eds.)(2001).Preceedings of the 22nd International Conference on Information Systems.New Orleans, Louisiana:
  68. Lewicki, R.J.,Bunker, B.B.,J. Z. Rubin (Eds.)(1995).Conflict, Cooperation and Justice.San Francisco:Jossey-Bass.
  69. Lewicki, R.J.,Bunker, B.B.,R. M. Kramer,T. R. Tyler (eds.)(1996).Trust in Organizations :Frontiers of Theory and Research.Thousand Oaks, CA:Sage Publications.
  70. Lindskold, S.(1978).Trust development, the GRIT proposal and the effects of conciliatory acts on conflict and cooperation.Psychological Bulletin,85,772-793.
  71. Luhmann, N.(1979).Trust and Power.Chichester, England:John Wiley & Sons.
  72. Mathieson, K.(1991).Predicting User Intentions: Comparing the Technology Acceptance Model with the Theory of Planned Behavior.Information Systems Research,2(3),173-191.
  73. McAllister, D.J.(1995).Affect and Cognition-Based Trust as Foundations for Interpersonal Cooperation in Organizations.Academy of Management Journal,38(1),24-59.
  74. McKnight, D.H.,Choudhury, V.,Kacmar, C.(2002).Developing and Validating Trust Measures for E-Commerce: An Integrative Typology.Information Systems Research,13(3),334-359.
  75. McKnight, D.H.,Choudhury, V.,Kacmar, C.,W. Orlikowski,S. Ang,P. Weill,H. Krcmar,J. I. DeGross (eds.)(2000).Proceedings of the 21th International Conference on Information Systems.Brisbane, Australia:
  76. McKnight, D.H.,Cummings, L.L.,Chervany, N.L.(1998).Initial Trust Formation in New Organizational Relationships.Academy of Management Review,23(3),472-490.
  77. McLain, D.L.,Hackman, K.(1999).Trust, Risk, and Decision making in Organizational Change.Public Administration Quarterly,23(2),152-176.
  78. Milliman, R.E.,Fugate, D.(1988).Using Trust Transference as a Persuasion Technique: An Empirical Field Investigation.Journal of Personal Selling and Sales Management,8,1-7.
  79. Moon, Ji-Won,Kim , Young-Gul(2001).Extending the TAM for a Word-Wide-Web context.Information & Management,38,217-230.
  80. Morgan, R.M.,Hunt, S.D.(1994).The Commitment-trust Theory of Relationship Marketing.Journal of Marketing,58,20-38.
  81. Nooteboom, B.(1996).Trust, Opportunism, and Governance: A Process and Control Model.Organization Studies,17,985-1010.
  82. Noteberg, A.,Christiaanse, E.,Wallage, P.,P. De,J. I. DeGross (eds.)(1999).Proceedings of the 20th International Conference of Information System.Charlotte, NC:
  83. Palmer, J.W.,Bailey, J.P.,Faraj, S.(2000).The Role of Intermediaries in the Development of Trust in the WWW: The Use and Prominence of Trusted Third Parties and Privacy Statements.Journal of Computer-Mediated Communication,5(3)
  84. Reichheld, F.F.,Schefter, P.(2000).E-loyalty: Your secret weapon on the web.Havard Business Review,78(4),105-113.
  85. Rempel, J.K.,Holmes, J.G.(1986).How do I trust thee?.Psychology Today,20(2),28-34.
  86. Rice, R.E.,Aydin, C.(1991).Attitudes towards new organizational technology: network proximity as a mechanism for social information processing.Administrative Science Quarterly,36,219-244.
  87. Rice, R.E.,Grant, A.,Schmitz, J.,Torobin, J.(1990).Individual and network influences on the adoption and perceived outcomes of electronic messaging.Social Networks,12(1),27-55.
  88. Ring, P.S.,Van de Ven, A. H.(1992).Structuring Cooperative Relationships between Organizations.Strategic Management Journal,13,483-498.
  89. Rogers, E.M.(1983).Diffusion of Innovations.New Work:The Free Press.
  90. Rose, G.,Straub, D. W.(1998).Predicting General IT Use:Applying TAM to the Arabic World.Journal of Global Information Management,6(3),39-46.
  91. Rotter, J.B.(1980).Interpersonal Trust, Trustworthiness and Qullibility.American Psychology,35,1-7.
  92. Rousseau, D.M.,Sitkin, S.B.,Burt, R.S.,Camerer, C.(1998).Not So Different After All A Cross Discipline View of Trust.The Academy of Management Review,23(3),393-404.
  93. Schmitz, J.,Fulk, J.(1991).Organizational colleagues, media richness, and electronic mail: a test of the social influence model of technology use.Communication Research,18(4),487-523.
  94. Shapiro, D.L.,Sheppard, B.H.,Cheraskin, L.(1992).Business on a Handshake.Negotiation Journal,3,365-377.
  95. Shapiro, S.P.(1987).The Social Control of Impersonal Trust.American Journal of Sociology,93,623-658.
  96. Simon, H.A.,Gilmartin, K.(1973).A Simulation of Memory for Chess Positions.Cognitive Psychology,5,29-46.
  97. Sjazna, B.(1994).Software Evaluation and Choice:Predictive Validation of the Technology Acceptance Instrument.MIS Quarterly,17(3),319-324.
  98. Stewart, K.J.,P. De,J.I. DeGross (eds.)(1999).Proceedings of the 20th International Conference on Information Systems.Charlotte, NC:
  99. Straub, D.W.,Keil, M.,Brennan, W.(1997).Testing the Technology Acceptance Model Across Cultures: A Three Country Study.Information & Management,33,1-11.
  100. Strub, P.J.,Priest, T.B.(1976).Two patterns of establishing trust: The marijuana user.Sociological Focus,6,399-411.
  101. Tan, K.C.(2001).A Structural Equation Model of New Product Design and Development.Decision Sciences,32(2),195-226.
  102. Thompson, R.L.,Higgins, C.A.,Howell, J.M.(1991).Personal computing: toward a conceptual model of utilization.MIS Quarterly,15(1),125-143.
  103. Williamson, O.E.(1985).The economic institutions of capitalism.New York:Free Press.
  104. Williamson, O.E.(1993).Calculativeness, Trust, and Economic Organization.Journal of Law and Economics,34,453-502.
  105. Wisner, J.D.(2003).A structural equation model of supply chain management strategies and firm performance.Journal of Business Logistics,24(1),1-26.
  106. Zand, D.E.(1972).Trust and Managerial Problem Solving.Administrative Science Quarterly,17,229-239.
  107. Zucker, L.G.,B.M.Staw,L.L.Cummings (eds.)(1986).In Research in Organizational Behavior.Greenwich,CT:JAI Press.
  108. 2004台灣電子商店發展現況與趨勢
  109. 2003年我國電子商店發展現況調查分析
被引用次数
  1. 康博閔(2017)。綠色消費行為-以負面資訊為調節因子。淡江大學會計學系碩士班學位論文。2017。1-68。 
  2. 許智超(2016)。情緒勞務對客戶情感依附之影響:以關係品質為中介角色。淡江大學企業管理學系碩士在職專班學位論文。2016。1-85。 
  3. 蕭禾秦(Ho-Chin Xiao);梁朝雲(Chao-Yun Liang)(2022)。預防食安假訊息的影響因素及其效果:以計劃行為理論為基礎。台灣農學會報。21(4)。213-235。 
  4. 彭惠儀(2017)。以科技接受模式探討虛擬實境遊戲之使用意願。義守大學資訊管理學系學位論文。2017。1-70。