Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

Language: English

You searched for +publisher:"NSYSU" +contributor:("Cathy S. Lin"). Showing records 1 – 2 of 2 total matches.

Search Limiters

Last 2 Years | English Only

No search limiters apply to these results.

▼ Search Limiters


NSYSU

1. Hsu, Chieh-Ju. Developing a Dual Factor Model to Investigate Technology Product Usersâ Continue to Use Intention-The Case of Android.

Degree: Master, Information Management, 2012, NSYSU

Smart phones are an important facet of the functionality of daily life. The main smart phone operating systems are Android and iOS. We cannot predict which one will be the winning smart phone operating system in the future. Hence, it is an important issue for consumers and enterprises to know which factors influence consumers to continue to use Android. We construct a dual factor model to explain consumersâ Android use continuance. The dual factors include (1) dedication vs. constraint, (2) cognitive constraints vs. psychological constraints, and (3) internal lock effect vs. external lock effect. Data collected from 296 Android consumers in Taiwan were tested against the research model and confirmed our hypotheses. The results support the theoretical model in explaining the effect of ECT theory and status quo bias theory on consumersâ intentions to continue to use Android. Finally, we find inertia is the most important factor influencing consumersâ continued use of Android. The main contribution of this study is to provide a dual factor model for consumersâ use continuance behavior. This model can also be applied to different technology products. Advisors/Committee Members: Jen-Ruei Fu, (chair), Tung-Chin Lin (committee member), Cathy S. Lin (chair), Shih-Chieh Hsu (committee member).

Subjects/Keywords: Status Quo Bias Theory; ECT; Inertia; Relative Advantages; Switching Cost.; Network Effect

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Hsu, C. (2012). Developing a Dual Factor Model to Investigate Technology Product Usersâ Continue to Use Intention-The Case of Android. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0820112-163809

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Hsu, Chieh-Ju. “Developing a Dual Factor Model to Investigate Technology Product Usersâ Continue to Use Intention-The Case of Android.” 2012. Thesis, NSYSU. Accessed December 02, 2020. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0820112-163809.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Hsu, Chieh-Ju. “Developing a Dual Factor Model to Investigate Technology Product Usersâ Continue to Use Intention-The Case of Android.” 2012. Web. 02 Dec 2020.

Vancouver:

Hsu C. Developing a Dual Factor Model to Investigate Technology Product Usersâ Continue to Use Intention-The Case of Android. [Internet] [Thesis]. NSYSU; 2012. [cited 2020 Dec 02]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0820112-163809.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Hsu C. Developing a Dual Factor Model to Investigate Technology Product Usersâ Continue to Use Intention-The Case of Android. [Thesis]. NSYSU; 2012. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0820112-163809

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

2. Wang, Yu-ching. A Study of Employee Unauthorized Computer Access Intention â An Integration of Neutralization, Differential Association and Containment Theory.

Degree: Master, Information Management, 2012, NSYSU

Unauthorized computer access by employees is the most common hacking behavior in every company. Hence, it is necessary to first understand why an employee engages to commit it and then find effective methods of prevention to reduce the crime rate. Many studies on computer hacking has discussed the reasons for the behavior, for example: neutralization theory, differential association theory and containment theory. However, those theories and perspectives were adopted independently in past research. In this study, we combine those perspectives and create an integrated model to explain the employeeâs intention to commit unauthorized computer access. Data collected from 351employees in Taiwan confirmed our hypotheses and were tested against the research model. The results support the theoretical model in explaining how neutralization theory and containment theory may affect an employeeâs intention to commit unauthorized computer access. Finally, we found that neutralization is the most important factor to take into account when organizations develop and implement security policies or education which can decrease employeesâ intentions to commit unauthorized computer access. Advisors/Committee Members: Tung-Chin Lin (committee member), Jen-Ruei Fu (chair), Jack Shih-Chieh Hsu (committee member), Cathy S. Lin (chair).

Subjects/Keywords: Differential Association Theory; Neutralization Theory; Unauthorized Computer Access; Containment Theory; Computer Hacking

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Wang, Y. (2012). A Study of Employee Unauthorized Computer Access Intention â An Integration of Neutralization, Differential Association and Containment Theory. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0817112-194405

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Wang, Yu-ching. “A Study of Employee Unauthorized Computer Access Intention â An Integration of Neutralization, Differential Association and Containment Theory.” 2012. Thesis, NSYSU. Accessed December 02, 2020. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0817112-194405.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Wang, Yu-ching. “A Study of Employee Unauthorized Computer Access Intention â An Integration of Neutralization, Differential Association and Containment Theory.” 2012. Web. 02 Dec 2020.

Vancouver:

Wang Y. A Study of Employee Unauthorized Computer Access Intention â An Integration of Neutralization, Differential Association and Containment Theory. [Internet] [Thesis]. NSYSU; 2012. [cited 2020 Dec 02]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0817112-194405.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Wang Y. A Study of Employee Unauthorized Computer Access Intention â An Integration of Neutralization, Differential Association and Containment Theory. [Thesis]. NSYSU; 2012. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0817112-194405

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

.