研究生: |
陳姿樺 Chen, Tzu-Hua |
---|---|
論文名稱: |
以推拉模式探討「iTaiwan免費無線網路」民眾使用意願 Using Push-pull Mode to Explore Intention Usage of "iTaiwan Free Wi-Fi" |
指導教授: |
洪榮昭
Hong, Jon-Chao |
學位類別: |
碩士 Master |
系所名稱: |
工業教育學系 Department of Industrial Education |
論文出版年: | 2018 |
畢業學年度: | 106 |
語文別: | 中文 |
論文頁數: | 121 |
中文關鍵詞: | 網路危險信念 、推拉模式 、有用性 、滿意度 |
英文關鍵詞: | iTaiwan free Wi-Fi, Network dangerous belief, Push-pull mode |
DOI URL: | http://doi.org/10.6345/THE.NTNU.DIE.022.2018.E01 |
論文種類: | 學術論文 |
相關次數: | 點閱:130 下載:0 |
分享至: |
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報 |
行政院於2011年10月推出「iTaiwan免費無線網路」之服務,於公共區域及大眾運輸場所等建置無線網路環境,供民眾使用。2017年政府提出「公共區域及大眾運輸iTaiwan無線上網躍升計畫」,欲推動iTaiwan全國暢通。本研究將以推拉模式探討「iTaiwan免費無線網路」民眾使用意願,採用問卷調查法,針對有使用過「iTaiwan免費無線網路」受測者進行調查,有效問卷共計286份,經使用結構方程式進行統計分析。研究結果顯示網路危險信念對科技政策之推力、個人需求之拉力具有正相關、科技政策之推力對有用性無顯著相關、個人需求之拉力對有用性具有正相關、有用性對滿意度具有正相關、滿意度對持續使用具有正相關。研究結果發現,民眾對網路危險信念較高,但仍支持政府推動的免費公眾無線網路科技政策,且對網路的需求日益增長,免費公眾無線網路還是有存在必要性。
In October 2011, Executive Yuan launched “iTaiwan free wireless Internet services” in the public areas and public transportation by providing wireless network for public use. In 2017, the government proposed “Public areas and public transportation iTaiwan wireless Internet proposal”, to promote iTaiwan across the country. This study explored the push and pull mode to investigate public intention to use “iTaiwan free Wi-Fi”. The questionnaire survey was administered, with a total of 286 valid questionnaires collected and analyzed by using structural equation modeling (SEM). The results indicated that the dangerous belief of Internet virtual community was positively related to push effect of science and technology policy and the pull effect is positively rrelated to personal needs. Push effect of science and technology policy showed no significant correlation towards perceived usefulness. However, the pull effect of personal needs showed a positive relation to usefulness. Usefulness toward satisfaction and satisfaction toward continuous intention to use both showed positive correlation. This study found that participants’ dangerous belief of internet was high. However, they still supported the government to promote free public Wi-Fi access. In conclusion, the demand for internet is growing, thus free public wireless network is necessary.
一、中文文獻
王宏安(2012)。Taipei Free臺北公眾區免費無線上網服務滿意度之研究(未出版之碩士論文),天主教輔仁大學,新北市。
行政院(2017)。林揆:全力完善無線上網服務 加速推動「前瞻基礎建設計畫」數位建設。行政院。取自https://goo.gl/nJ37xC
行政院(2017)。公共區域及大眾運輸iTaiwan無線上網躍升計畫。行政院。取自https://goo.gl/NjQS4U
吳卓夫、林琪培、紀慧禎(2003)。雪霸國家公園服務品質滿意度之研究。內政部營建署雪霸國家公園管理處委託研究報告(編號:092-301020500G-003)。苗栗縣:內政部。
吳明隆(2008)。SPSS 操作與應用問卷統計分析實務。臺北市:五南。
林玫玫(2005),服務品質與顧客滿意度關係之研究,經營管理論叢 第一屆管理決策2005年學術研討會特刊,287-294。
林玫芳(2002)。公眾無線區域網路服務之研究(未出版之碩士論文),國立交通大學,新竹市。
林建興(2006)。民眾使用公眾無線區域網路上網行為之研究(未出版之碩士論文),國立中山大學,高雄市。
林淑惠(2017)。WI-FI爆資安風險 NCC:籲更新WI-FI設備修補程式。工商時報。取自https://goo.gl/SZ3WVY
邱昱中(2006)。公眾無線區域網路使用者採用意願影響因素之研究-以台北市無線區域網路為例(未出版之碩士論文),銘傳大學,臺北市。
洪詩詩(2015)。諾頓發布2015網路安全調查報告,近 6 億人曾在今年遭受網路犯罪攻擊。T客邦。取自https://goo.gl/Y8aMFf
洪榮昭、葉建宏、范靜媛(印製中)。技術及職業教育政策之接受度:實踐研究新視角。教育學研究期刊。
唐政(2003)。802.11 無線區域網路通訊協定及應用。臺北市:文魁資訊。
桑任榮(2004)。公眾無線區域網路(PWLAN)服務品質滿意度之研究:以曜正科技台北地區使用者為例(未出版之碩士論文)。國立臺灣師範大學,臺北市。
財團法人台灣網路資訊中心(2015)。「台灣無線網路使用調查」結果公布。財團法人台灣網路資訊中心。取自https://www.twnic.net.tw/download/200307/20160108a.pdf
財團法人台灣網路資訊中心(2016)。2016 年台灣寬頻網路使用調查報告。財團法人台灣網路資訊中心。取自https://www.twnic.net.tw/download/200307/20160922e.pdf
財團法人台灣網路資訊中心(2017)。「2017年台灣寬頻網路使用調查」結果公布。財團法人台灣網路資訊中心。取自https://www.twnic.net.tw/NEWS4/144.pdf
高健倫、瀋唯(2015)。LINE曝安全漏洞 使用公共WI-FI要當心。新唐人。取自http://www.ntdtv.com/xtr/b5/2015/03/17/a1185161.html
國家通訊委員會(2016)。「數位創新基礎環境」行動計畫。國家通訊委員會。取自https://goo.gl/XaywhR
陳禹辰、侯正裕、尚榮安、陳靜枝、張翊宏(2009)。玩家為何轉換線上遊戲-人口遷徙理論觀點。電子商務學報,11(4),723-752。
陳素華(2006)。臺北市公眾無線區域網路(PWLAN)發展策略之研究(未出版之碩士論文)。天主教輔仁大學,新北市。
黃芳銘(2002)。結構方程成模式:理論與應用。台北:五南。
黃彥棻(2018)。政府首度明定資安預算比例,10億元計畫至少要投5千萬元在資安。iThome。取自https://www.ithome.com.tw/news/122324
詹姆士(2017)。中間人的危機:過度信任公共 Wi-Fi 對個人資料構成風險。HKITBLOG。取自https://www.hkitblog.com/?p=39917
雷鋒網(2016)。看完這駭客四部曲,保證你以後再也不敢連到公共Wi-Fi了。TechNews 科技新報。取自https://goo.gl/sm2W3K
廖禎松(2010)。製造商運用行銷推式策略在開發通路商之研究-以太陽能產業為例(未出版之碩士論文)。國立中興大學,臺中市。
廖則竣、陶蓓麗、劉玉萍、蕭銘偉、黃姮儀(2012)。網路隱私顧慮及網站信任對使用意向之影響--比較初始顧客及重複顧客之觀點。資訊管理學報,19(3),509-531。
劉選吉(2008)。公眾無線區域網路戶外使用之關鍵因素分析(未出版之碩士論文)。天主教輔仁大學,新北市。
蔡宏進、廖正宏(1987)。人口學。臺北市:巨流。
蔡志敏(2014)。資訊科技教育政策接受模式之建立-以教師 e 化教學自我效能及教師使用新科技之態度為例(未出版之碩士論文),國立師範大學,臺北市。
羅正漢(2017)。6個你該意識到的Wi-Fi上網安全風險。iThome Online 。取自https://www.ithome.com.tw/news/112740
二、英文文獻
Ahmad, N., Omar, A., & Ramayah, T. (2010). Consumer lifestyles and online shopping continuance intention. Business Strategy Series, 11(4), 227-243.
Ajzen, I. (1989). Attitude structure and behavior. In A. R. Pratkanis, S. J. Beckler, & A. G. Greenwald (Eds.), Attitude structure and function (pp. 241-274). New Jersey, NJ: Lawrence Erlbaum.
Ajzen, I. (1991). The theory of planned behavior. Organizational Behavior and Human Decision Processes, 50, 179-211.
Anderson, E. W., & Sullivan, M. W. (1993). The antecedents and consequences of customer satisfaction for firms. Marketing Science, 12(2), 125-143.
Anderson, E., Fornell, C. & Lemann, D. (1994). Customer Satisfaction,Market Share, and Profitability:Findings from Sewden. Journal of Marketing, 58, 53-66.
Bagozzi, R. P., & Yi, Y. (1988). On the evaluation for structural equation models. Journal of the Academy of Marketing Science, 16(1), 74-94.
Bandura, A. (1977). Social learning theory (pp. 247). New Jersey, NJ: Prentice Hall.
Bansal, H. S., Taylor, S. F., & James, Y. S. (2005). Migrating to new service providers: toward a unifying framework of consumers switching behaviors. Journal of the Academy of Marketing Science, 33(1), 96-115.
Bentler P. M. (1995). EQS structural equations program manual. Encino, CA: Multivariate Software, lin.
Bentler, P. M. (1988). Theory and implementation of EQS: A structural equations program. Louisiana, LA: BMDP Statistical Software.
Bentler, P. M., & Bonett, D. G. (1980). Significance tests and goodness of fit in the analysis of covariance structures. Psychological Bulletin, 88, 588-606.
Bhattacherjee, A. (2001a). Understanding information systems continuance: An expectation-confirmation model. MIS Quarterly, 25(3), 351-370.
Bhattacherjee, A. (2001b). An empirical analysis of the antecedents of electronic commerce service continuance. Decision Support Systems, 32(2), 201-214.
Bhattacherjee, A., Perols, J., & Sanford, C. (2008). Information technology continuance: A theoretic extension and empirical test. Journal of Computer Information Systems, 49(1), 17-26.
Bourdieu, P. (1984). Distinction: A social critique of the judgment of taste. Massachusetts, MA: Harvard University Press.
Browne, M. W., & Cudeck, R. (1993). Alternative ways of assessing model fit. In K. A. Bollen & J. S. Long (Eds.), Testing structural equation models (pp. 136-162). California, CA: Sage.
Campbell, A. J. (1997). Relationship marketing in consumer markets: a comparison of managerial and consumer attitudes about information privacy. Journal of Direct Marketing, 11(3), 44-57.
Camponovo, G., & Pigneur, Y. (2006). From hype to reality: A case study on the evolution of the Swiss WISP industry. International Conference on Mobile Business, Copenhagen, Denmark.
Cardozo, R. (1965). An experimental study of customer effort, expectation, and satisfaction. Journal of Marketing Research, 2(8), 244-249.
Chang, I. C., Liu, C. C., & Chen, K. (2014). The push, pull and mooring effects in virtual migration for social networking sites. Journal Information Systems, 24(4), 323-346.
Chang, S. E., Liu, A. Y., & Shen, W. C. (2015). User trust in social networking services: A comparison of Facebook and LinkedIn. Computers in Human Behavior, 69, 207-217.
Chen, C. F., & Chen, F. S. (2010). Experience quality, perceived value, satisfaction and behavioral intentions for heritage tourists. Tourism Management, 31(1), 29-35.
Chen, E., Lewin, M. R., & Craske, M. G. (1996). Effects of state anxiety on selective processing of threatening information. Cognition and Emotion, 10, 225-240.
Chesbrough, W. (2003). Environmental influences upon firm entry into new sub-markets: Evidence from the worldwide hard-disk-drive industry conditionally. Research Policy, 32(4), 403-421.
Child, J. T. (2015). Opening closed doors: Managing identity and privacy with social media. In D. O. Braithwaite & J. T. Wood (Eds.), Casing interpersonal communication: Case studies in personal and social relationships (pp. 75-80). Iowa, IA: Kendall Hunt.
Child, J. T., Pearson, J. T., & Petronio, S. (2009). Blogging, communication, and privacy management: Development of the blogging privacy management measure. Journal of the American Society for Information Science and Technology, 60(10), 2079-2094.
Churchill, G. A., & Surprenant, C. (1982). An Investigation into the Determinants of Customer Satisfaction. Journal of Marketing Research, 19, 491-504.
Costantini, V., Crespi, F., Martini, C., & Pennacchio, L. (2015). Demand-pull and technology-push public support for eco-innovation: The case of the biofuels sector. Research Policy, 44(3), 577-595.
Davis, F. D. (1986). A technology acceptance model for empirically testing new end-user information system: Theory and results (Ph.D. issertation). MIT Sloan School of Management, Cambridge, MA.
Davis, F. D. (1989). Perceived usefulness, perceived ease of use, user acceptance of information technology. MIS Quarterly, 13(3), 319-340.
Davis, F. D. (1993). User acceptance of information technology: System characteristics, user perceptions and behavioral impacts. International Journal of Man-Machine Studies, 38(3), 475-487.
Davis, F. D., Bagozzi, R. P., & Warshaw, P. R. (1989). User acceptance of computer technology: a comparison of two theoretical models. Management Science. 35(8), 985.
Dinev, T., & Hart, P. (2006a). An extended privacy calculus model for e-commerce transactions. Information Systems Research, 17(1), 61-80.
Dinev, T., & Hart, P. (2006b). Internet privacy concerns and social awareness as determinants of intention to transact. International Journal of Electronic Commerce, 10(2), 7-29.
Doll, W. J., Xia, W., & Torkzadeh, G. (1994). A confirmatory factor analysis ofthe end-user computing satisfaction instrument. MIS Quarterly, 18(4), 453-461.
Dumouchel, P. (2005). Trust as an action. European Journal of Sociology, 46(3), 417-428.
Dunning, D., Fetchenhauer, D., & Schlösser, T. M. (2012). Trust as a social and emotional act: Noneconomic considerations in trust behavior. Journal of Economic Psychology, 33, 686-694.
Dzuljastri, A. R. & Muhamad A. (2012). Customers’ attitude towards diminishing partnership home financing in Islamic Banking. American Journal of Applied Sciences, 9(4), 593-599.
Faja, S., & Trimi, S. (2006). Influence of the web vendor's interventions on privacy related behaviors in e-commerce. Communications of the Association for Information Systems Communications of the Association for Information Systems, 17(17), 593-634.
Festinger, L. (1954). A theory of cognitive dissonance. Stanford. CA: Stanford University Press.
Fishbein, M., & Ajzen, I. (1975). Belief, attitude, intention, and behavior: An introduction to theory and research. Reading. Massachusetts, MA: Addison-Wesley.
Fornell, C. (1992). A national customer satisfaction barometer: The Swedish experience. Journal of Marketing, 56, 6-21.
Fornell, C., & Larcker, D. F. (1981). Evaluating structural equation models with unbervables and measurement error. Journal of Marketing Research, 18, 39-50.
Fornell. C. (1996). The american customer satisfaction index: Nature, purpose, and findings. Journal of Marketing, 60, 7-18.
Gefen, D., Karahanna, E., & Straub, D.W. (2003). Trust and TAM in online shopping: an integrated model. MIS Quarterly, 27(1), 51-90.
Giese, J. L., & Cote, J. A. (2000). Defining consumer satisfaction. Academy of Marketing Science Review, 1, 1-27.
Golbeck, J. A. (2005). Computing and applying trust in web-based social networks. (Doctoral dissertation) Retrieved from https://doi.org/10.1017/CBO9781107415324.004
Gupta, A., & Tayal, T. (2013). Impact of competing force of motivational factors on employees at work place. Information and Knowledge Management, 3(5), 143-148
Ha, I., Yoon, Y., & Choi, M. (2007). Determinants of adoption of mobile games under mobile broadband wireless access environment. Information & Management, 44(3), 276-286.
Ha, J., & Jang, S. (2013). Variety seeking in restaurant choice and its drivers. International Journal of Hospitality Management, 32, 155-168.
Hair, J. F., Black, W. C., Babin, B. J., & Anderson, R. E. (2013). Multivariate data analysis (7th ed.). New Jersey: Prentice Hall.
Hannon, M. J., Foxon, T. J., & Gale, W. F. (2015). ‘Demand pull’ government policies to support product-service system activity: The case of energy service companies (ESCos) in the UK. Journal of Cleaner Production, 108 (part A), 900-915.
Helmus, J. R., Spoelstra, J. C., Refa, N., Lees, M., & Hoedd, R. (2018). Assessment of public charging infrastructure push and pull rollout strategies: The case of the Netherlands. Energy Policy, 121, 35-47.
Hong, J. C., Ming-Yueh H., Chin-Hao H., Kai-Hsin T., Yen-Chun K. (2015). Belief in dangerous virtual communities as a predictor of continuance intention mediated by general and online social anxiety: The Facebook perspective. Computers in Human Behavior, 48, 663-670.
Hou, A. C. Y., Chern, C. C., Chen, H. G., & Chen, Y. C. (2011). Migrating to a new virtual world: Exploring MMORPG switching through human migration theory. Computers in Human Behavior. 27(5), 1892-1903.
Huppertz, J. W., Arenson, S. J., & Evans, R. H. (1978). An application of equity theory to buyer-seller exchange situations. Journal of Marketing Research, 15(5), 250-260.
Husig, S., & Hipp, C. (2009). The disruptive potential of Wi-Fi in the German hotspot market. International Journal of Mobile Communications, 7(6), 615-631.
Jackson, J. A. (1986). Migration. London, NY: Longman.
Jenkins, G. D., & Tabor, T. D. (1977). A Monte Carlo study of factors affecting three indices of composite scale reliability. Journal of Applied Psychology, 62 (4), 392-398.
John, D. (2008). Do Data Characteristics Change According to the number of scale points used ? An experiment using 5-point, 7-point and 10-point scales. International Journal of Market Research, 50 (1), 61-77.
Johnstone, N., Haščič, I., & Popp, D. (2010). Renewable energy policies and technological innovation: evidence based on patent counts. Environmental and Resource Economics, 45, 133-155.
Jung, J., Han, H., & Oh, M. (2017). Travelers’ switching behavior in the airline industry from the perspective of the push-pull-mooring framework. Tourism Manage, 59, 139-153.
Kahn, B. E. (1995). Consumer variety-seeking among good and services. Journal of Retailing and Consumer Services, 2(3), 139-148.
Keaveney, S. M. (1995). Customer switching behavior in service industries: an exploratory study. Journal of Marketing, 59 (2), 71-82.
Kenny, D. A., Kashy, D. A., & Cook, W. L. (2006). Dyadic data analysis (pp. 443). New York, NY: Cambridge University Press.
Kim, S. S., Lee, C. K., & Klenosky, D. B. (2003). The influence of push and pull factors at Korean national parks. Tourism Management, 24(2), 169-180.
Kirkwood, J. (2009). Motivational factors in a push‐pull theory of entrepreneurship. Gender in Management: An International Journal, 24(5), 346-364.
Klenosky, D. B. (2002). The pull of tourism destinations: A means-end investigation. Journal of Travel Research, 40(4), 385-395.
Koufaris, M. (2002). Applying the technology acceptance model and flow theory to online consumer behavior. Information Systems Research, 13, 205-224.
Lai, J. Y., Debbarma, S., & Ulhas, K. R. (2012). An empirical study of consumer switching behavior towards mobile shopping: A Push-Pull-Mooring model. International Journal of Mobile Communications archive, 10(4), 386-404.
Lee, E. S. (1966). A theory of migration. Demography, 3(1), 47-57.
Leoni, P. (2011). The antagonism of push and pull strategies and the current funding campaigns to fight orphan diseases. Social Science & Medicine, 72(2), 202-205.
Liao, C., Chen, J. L., & Yen, D. C. (2007). Theory of planning behavior (TPB) and customer satisfaction in the continued use of e-service: An integrated model. Computers in Human Behavior, 23(6), 2804-2822.
Limayem, M., Hirt, S. G., & Cheung, C. M. K. (2007). How habit limits the predictive power of intention: The case of information systems continuance. MIS Quarterly, 31(4), 705-737.
Lin, C. S., Wu, S., & Tsai, R. J. (2005). Integrating perceived playfulness into expectation-confirmation model for web portal context. Information & Management, 42(5), 683-693.
Lissitz, R. W., & Green, S. B. (1975). Effect of the number of scale points on reliability;A Monte Carlo approach. Journal of Applied Psychology, 60 (1), 10-13.
Liu, C., Marchewka, J. T., Lu, J. & Yu, C. S. (2004). Beyond concern: a privacy-trust behavioral intention model of electronic commerce. Information and Management, 42(1), 127-142.
Longino, C. F., Jr. (1992). The forest and the trees: Micro-level considerations in the study of geographic mobility in old age. In A. Rogers (Ed.), Elderly Migration and Population Redistribution: A Comparative Study (pp. 23-34). London: Bellhaven.
MacCallum, R. C., & Hong, S. (1997). Power analysis in covariance structure modeling using GFI and AGFI. Multivariate Behavioral Research, 32(2), 193-210.
MacCallum, R. C., Browne, M. W., & Sugawara, H. M. (1996). Power analysis and determination of sample size for covariance structure modeling. Psychological methods, 1(2), 130-149.
Malhotra, N. K., Sung, S. K. & Agarwal, J. (2004). Internet users information privacy concerns (IUIPC): the construct, the scale, and a causal model. Information Systems Research, 15(4), 336-355.
Mano, H., & Oliver, R. L. (1993). Assessing the dimensionality and structure of consumption experience: Evaluation, feeling, and satisfaction. Journal of Consumer Research, 20(3), 451-466.
Maskun, Alma, M., Noor, S. M., & Juajir, S. (2013). Cyber Security: Rule of use internet safely? Procedia - Social and Behavioral Sciences, 103, 255- 261.
Matell, M. S., & Jacoby, J. (1971). Is there an optimal number of alternatives for Likert scale items? Study I: reliability and validity. Educational and Psychological Measurement, 31(3), 657-674.
Mcgill, T., Hobbs, V. & Klobas, J. (2003). User-developed applications and information systems success: A test of De Lone and McLean's model. Information Resources Management Journal, 16(1), 24-45.
Moon, B. (1995). Paradigms in migration research: Exploring moorings as a schema. Progress in Human Geography, 19(4), 504-524.
Mulaik, S. A., James, L. R., Altine, J. V., Bennett, N., Lind, S., & Stilwell, C. D. (1989). Evaluation of goodness-of-fit indices for structural equation models. Psychological Bulletin, 105, 430-445.
Nader, S. S., Mehdi S., Rossouw V. S., Steven, F., Norjihan, A. G., Tutut H. (2015). Information security conscious care behavior formation in organizations. Computers & Security, 53, 65-78.
Namkee P., Mohja R., Jinghui H., & Kwan M. L. (2014). Understanding the acceptance of teleconferencing systems among employees: An extension of the technology acceptance model. Computers in Human Behavior, 39, 118-127.
Nemet, G. F. (2009). Demand-pull, technology-push and government-led incentives for non-incremental technical change. Research Policy, 38(5), 700-709.
Norris, D., & Moon M. J. (2005). Advancing e-government at the Grassroots: Tortoise or hare? Public Administration Review, 65(1), 64-75.
Oliver, R. L. (1981). Measurement and evaluation of satisfaction processes in retail Settings. Journal of Retailing, 57, 25-48.
Oliver, R. L. (1993). Cognitive affective and attributes bases of satisfaction response. Journal of Consumer Research, 20(3), 419-422.
Oliver, R. L. (1997). Satisfaction: A behavioral perspective on the consumer. New York, NY: McGraw-Hill, Inc.
Oliver, R. L., (1980). A cognitive model for the antecedents and consequences of satisfaction. Journal of Marketing Research, 17(4), 460-469.
Park, N., Lee, K. M., & Cheong, P. H. (2008). University instructors’ acceptance of electronic courseware: An application of the technology acceptance model. Journal of Computer-Mediated Communication, 13(1), 163-186.
Park, N., Rhoads, M., Hou, J., & Lee, K. M. (2014). Understanding the acceptance of teleconferencing systems among employees: An extension of the technology acceptance model. Computers in Human Behavior, 39(0), 118-127.
Park, N., Roman, R., Lee, S., & Chung, J. E. (2009). User acceptance of a digital library system in developing countries: An application of the technology acceptance model. International Journal of Information Management, 29(3), 196-209.
Parthasarathy, M., & Bhattacherjee, A. (1998). Understanding post-adoption behavior in the context of online services. Information Systems Research, 9(4), 362-379.
Peters, M., Schneider, M., Griesshaber, T., & Hoffmann, V. H. (2012). The impact of technology-push and demand-pull policies on technical change -does the locus of policies matter? Research Policy, 41(8), 1296-1308.
Pollard, C. (2003). Exploring continued and discontinued use of IT: A case study of option finder, a group support system. Group Decision and Negotiation, 12 (3), 171-193.
Preter, H. D., Van Looy, D. & Mortelmans, D. (2013). Individual and institutional push and pull factors as predictors of retirement timing in Europe: A multilevel analysis. Journal of Aging Studies, 27(4), 299-307.
Richins, M. L. (1985). The role of product importance in complaint initiation. In H. K. Hunt & R. L. Day (Eds.), Consumer satisfaction, dissatisfaction and complaining behavior (pp. 50-53). Indiana, IN: Indiana University, Bloomington.
Shih, H. P. (2006). Technology-push and communication-pull forces driving message-based coordination performance. The Journal of Strategic Information Systems, 15(2), 105-123.
Shin, S., & Weiss, M. B. H. (2010). Analysis of mobile broadband competition: 3G vs. WiFi. International Journal of Mobile Communications, 8(5), 586-601.
Taylor, S., & Todd, P. A. (1995). Understanding information technology usage: A test of competing models. Information Systems Research, 6(2), 144-176.
Tsai, H. T., Huang, H. C., & Jaw, Y. L. (2006). Why on-line customers remain with a particular e-retailer: An integrative model and empirical evidence. Psychology and Marketing, 23(5), 447-464.
Ullman, J. B. (2001). Structural equation modeling. In B. G. Tabachnick, & L. S. Fidell (Eds.), Using multivariate statistics (pp. 653-771). Boston, MA: Pearson Education.
Venkatesh, V., & Davis, F. D. (2000). A theoretical extension of the technology acceptance model: four longitudinal field studies. Management Science, 46(2), 186-204.
Weiner, B., Amirkhan, J., Folkes, V. S., & Verette, J. A. (1987). An attributional analysis of excuse giving: Studies of a naive theory of emotion. Journal of Personality and Social Psychology, 52(2), 316-324.
Westbrook, R. A. (1980). Interpersonal affective infuences on consumer satisfaction with product. Journal of Consumer Research, 7, 49-54.
Woodruff, R. B., Ernest, R. C., & Roger, L. J. (1983). Modelling consumer satisfaction processes using experience-based norms. Journal of Marketing Research, 20(3), 296-304.
Yang, K. C. C. (2007). Exploring factors affecting consumer intention to use mobile advertising in Taiwan. Journal of International Consumer Marketing, 20(1), 33-49.
Yohanes, E., & Jonathan, Y. X. W. (2018). Directed trust and trustworthiness in a social network: An experimental investigation. Journal of Economic Behavior & Organization, 151, 234-253.
Zeithaml, V. A. (1981). How consumer evaluation processes differ between goods and services. In J. Donelly & W. George (Eds.), Marketing of services proceedings series (pp. 186-190). Chicago: American Marketing Association.