English  |  正體中文  |  简体中文  |  Post-Print筆數 : 11 |  Items with full text/Total items : 88987/118697 (75%)
Visitors : 23575154      Online Users : 166
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version
    政大機構典藏 > 商學院 > 資訊管理學系 > 學位論文 >  Item 140.119/35206
    Please use this identifier to cite or link to this item: http://nccur.lib.nccu.edu.tw/handle/140.119/35206


    Title: 個人管理電子郵件行為之研究
    Authors: 朱筱琪
    Contributors: 管郁君
    朱筱琪
    Keywords: 郵件管理行為
    理性行為理論
    使用經驗
    Date: 2003
    Issue Date: 2009-09-18 14:26:39 (UTC+8)
    Abstract: 電子郵件為網路之殺手級應用,因其傳遞迅速、價廉等特性,讓電子郵件成為病毒、廣告信及色情郵件等非使用者期望之資訊的散佈媒介,造成電腦與網路資源之浪費,使用者亦為管理這些片斷、非結構性的電子訊息所苦。為此本研究以個人資訊管理之角度重新看待電子郵件之使用行為,並以理性行為理論為基礎,探討使用經驗、管理態度、主觀規範、郵件管理意願與郵件管理行為之關係,架構出個人管理郵件行為之研究模式。
    本研究之研究對象為國內電子郵件使用者,以網路問卷調查的量化研究方式為主,輔以焦點團體訪談與深入訪談之質化研究彌補電子郵件管理相關文獻之不足。在本研究中發現個人之直接(郵件)與間接(電腦)使用經驗皆會顯著地影響個人對其郵件之管理態度,但影響的程度不高;郵件管理意願會受到管理態度、主觀規範以及郵件困擾深度的影響,以管理態度之影響最深;在郵件管理行為上,不同郵件管理意願之個人在單挑傾向、群組傾向以及個人化傾向上有顯著的不同,高郵件管理意願之個人其上述3種管理傾向較強。
    Reference: 一、中文參考文獻
    中國互聯網絡信息中心(China Internet Network Information Center, CINNCI)(民93年1月15日)。第13次中國互聯網絡發展狀況統計報告。北京:中國互聯網絡信息中心。民93年2月1日,取自:http://www.cnnic.com.cn/html/Dir/2004/01/15/2080.htm
    社會科學研究方法與資料分析(朱柔若譯)。台北:揚智文化(民89)。(原著作出版年:1996)
    社會科學研究方法(李美華等譯)(民87)。台北:時英。(原著作出版年:1997年)
    吳明隆(民90)。教育行動研究導論:理論與實務。台北:五南。
    李雅萍(民92年12月8日)。2003年第三季我國商用網際網路帳號達928萬戶。資策會FIND。民93年1月20日,取自:http://www.find.org.tw/0105/howmany/howmany_disp.asp?id=61
    李雅萍(民92年12月25日)。2003年我國家庭資訊通信技術應用概況之調查研究。資策會FIND。民93年1月20日,取自:http://www.find.org.tw/0105/howmany/howmany_disp.asp?id=65
    周文賢(民91)。多變量統計分析─SAS STAT使用方法。台北:智勝文化。
    邱皓政(民93)。社會與行為科學的量化研究與統計分析─SPSS中文視窗版資料分析範例解析(2版)。台北:五南。
    黃淑如、莊玲玉(民86年5月)。電子郵件系統探討。商業職業教育季刊,68,8-22。
    焦點團體:理論與實務(歐素汝譯)(民89)。台北:弘智。(原著出版年:1990年)
    焦點團體訪談:教育與心理學適用(王文科、王智弘譯)(民88)。台北:五南。(原著作出版年:1996年)
    劉芳梅(民92年10月1日)。2004年垃圾郵件將佔60%。資策會FIND。民93年3月3日,取自:http://www.find.org.tw/news_disp.asp?news_id=2844
    二、英文參考文獻
    Ajzen, I. (1988). Attitudes, personality, and behavior. Chicago, IL: The Dorsey Press.
    Ajzen I. & Fishbein M. (1975). Belief, attitude, intension, and behavior: an introduction to theory and research. MA: Addison-Wesley.
    Ajzen, I. & Fishbein, M. (1980). Understanding attitudes and predicting social behavior. Englewood Cliffs, NJ: Prentice Hall.
    Allport, G. W. (1935). Attitudes. In C. Murchinson (Ed.), A handbook of social psychology (pp. 798-884). Worchester, Mass: Clark University Press.
    Belsley, D.A., Kuh, E., & Welsch, R.E. (1980). Regression Diagnostics. New York: John Wiley & Sons.
    Brown, S. A., Fuller, R. M., & Vician, C. (working paper). Individual characteristics and e-Learning: The role of computer anxiety and communication apprehension. Information System Department, Kelley School of Business.
    DeLone, W. H. & McLean, E. R. (1992). Information systems success: the quest for the dependent variable. Information Systems Research, 3(1), 60-95.
    DeLone, W. H. & McLean, E. R. (2003). The DeLone and McLean model of information systems success: a ten-year update. Journal of Management Information Systems, 19(4), 9-30.
    Eagly, A. H. & Chaiken, S. (1993). The psychology of attitudes. San Diago: Harcourt Bruce Jovannovich.
    Groove Network. (2002). There shouble be more to collaboration than Email. Retrived January 22, 2004, form World Wide Web: http://www.groove.net/pdf/idc-collaboration.pdf
    Hair, J. F., Anderson, R. E., Tatham, R. L., & Black, W. C. (1992). Multivariate Data Analysis. Englewood Cliffs, NJ: Prentice-Hall.
    Hendtickson, A. R. & Collins, M. R. (1996). An assessment of structure and causation of IS usage. ACM SIGMIS, 27(2). Retrieved January 27, 2004, from ACM SIGMIS Database.
    Hess, J. M. (1968). Group interviewing. In R. L. King (Ed.), New science of planning. Chicago: American Marketing Association.
    Hirt, S. G. & Limayem, M. (2000). Integrating three theoretical perspectives to explain Internet-based technology usage by university students: a qualitative study. International Conference on Information Systems December 10-13, 2000. Retrived January 20, 2004, from World Wide Web: http://portal.acm.org/citation.cfm?id=359640.359790
    Hoxmeier, J. A., Nie, W., & Purvis, G.. T. (2002). The impact of gender and experience on user confidence in electronic mail. Journal of Organizational and End User Computing, 12(4), 11-20.
    Igbaria, M., Pavri, F. N., & Huff, Sid L. (1989). Microcomputer applications: an empirical look at usage. Information and Management, 16(4), 187-196.
    Igbraria, M., Guimaraes, T., & Davis, G. B. (1995). Testing the determinants of microcomputer usage via a structural equation model. Journal of Management Information Systems, 11(4), 87-114.
    Kim, J. & Mueller, C. W. (1978). Factor analysis: Statistical methods and practical issues. Newbury Park, CA: Sage.
    Lassila, K. S., & Brancheau, J. C. (1999). Adoption and utilization of commercial software packages: Exploring utilization equilibria, tramsitions, triggers, and tracks. Journal of Management Information Systems, 16(2), 63-90.
    Mahlke, S. (2002). Factors influencing the experience of website usage. Conference on Human Factors in Computing Systems April 20-25, 2002. Retrived January 30, 2004, from World Wide Web: http://portal.acm.org/citation.cfm?id=506628&coll=GUIDE&dl=GUIDE&CFID=22481731&CFTOKEN=71444039
    Markus, M. L. (1987). Toward a ‘critical mass’ theory of interactive media. Communication Research, 14(5), 491-511.
    Neter, J., Wasserman, W. & Kutner, M. H. (1989). Applied Linear Regression Models. Homewood, IL: Richard D. Irwin.
    Oliver, P., Marwell, G. & Teixeira, R. (1985). A theory of the critical mass interdependence, group heterogeneity, and the production of collective action. American Journal of Sociology, 93(3), 522-556.
    Rawstorne, P., Jayasuriya, R., & Caputi, P. (2000). Issues in predicting and explaining usage behaviors with the technology acceptance model and the theory of planned behavior when usage is mandatory. International Conference on Information Systems December 15-18, 2000. Retrived March 2, 2004, from World Wide Web: http://portal.acm.org/citation.cfm?id=359640.359721
    Research Focus: SPAM. (n.d.). Ferris Research.Retrived March 1, 2004, from World Wide Web: http://www.ferris.com/offer/spam.html#report3
    Rudy, I. A. (1996). A critical review of research on electronic mail. European Journal of Information Systems, 4, 198-213.
    Seddon, P. B. (1997). A respecification and extension of the DeLone and McLean model of IS success. Information Systems Research, 8(3), 240-253.
    Shannon, D. M., Johnson, T. E., Searcy, S., & Lott, A. (2002). Using electronic surveys: advice from survey professionals. Practical Assessment, Research & Evaluation, 8(1).
    Solomon, D. J. (2001). Conducting web-based surveys. Practical Assessment, Research & Evaluation, 7(19).
    Taylor, S. & Todd, P. A. (1995a). Assessing IT usage: the role of prior experience. MIS Quarterly, 19(4), 561-570.
    Taylor, S. & Todd, P. A. (1995b). Understanding information technology usage: a test of competing models. Information Systems Research,6(2), 144-176,.
    Thomas, P. J., Meech, J. F., & Macredie R. D. (1994). Personal Information Management using integrated information appliances. Proceedings of the BCS Graphics and Displays Group Conference on Digital Media and Electronic Publishing. Leeds, UK.
    UCLA Center for Communication Policy. (2003). The UCLA Internet Report-Surveying the Digital Future- Year Three. Retrieved January 10, 2004, from World Wide Web: http://www.ccp.ucla.edu/
    United Nations Conference On Trade and Development, UNCTAD. (2003). E-Commerce and Development Report. Retrieved January 10, 2004, from World Wide Web: http://www.unctad.org/ecommerce/
    Venkatesh, V. & Morris, M. G. (2000). Why don’t men ever stop to ask for directions? Gender, Social influence, and their role in technology acceptance and usage behavior. MIS Quarterly, 24(1), 115-139.
    Whittaker, S. & Sidner, C. (1996). Email overload: exploring personal information management of email. Proceedings of the ACM CHI96 Conference on Human Factors in Computing Systems April 13-18, 1996. Retrived March 1, 2004, from World Wide Web: http://www.acm.org/sigchi/chi96/proceedings/papers/Whittaker/sw_txt.htm
    Xia, Weidong & Lee, Gwanhoo (2000). The influence of persuasion, training and experience on user perceptions and acceptance of IT innovation. International Conference on Information System Augest 14-16, 2000. Retrived January 25, 2004, from World Wide Web: http://portal.acm.org/citation.cfm?id=359640.359764
    Description: 碩士
    國立政治大學
    資訊管理研究所
    91356021
    92
    Source URI: http://thesis.lib.nccu.edu.tw/record/#G0091356021
    Data Type: thesis
    Appears in Collections:[資訊管理學系] 學位論文

    Files in This Item:

    File Description SizeFormat
    35602101.pdf44KbAdobe PDF679View/Open
    35602102.pdf81KbAdobe PDF676View/Open
    35602103.pdf68KbAdobe PDF671View/Open
    35602104.pdf87KbAdobe PDF713View/Open
    35602105.pdf133KbAdobe PDF661View/Open
    35602106.pdf178KbAdobe PDF1212View/Open
    35602107.pdf208KbAdobe PDF1220View/Open
    35602108.pdf791KbAdobe PDF1105View/Open
    35602109.pdf142KbAdobe PDF712View/Open
    35602110.pdf94KbAdobe PDF1238View/Open
    35602111.pdf415KbAdobe PDF1434View/Open


    All items in 政大典藏 are protected by copyright, with all rights reserved.


    社群 sharing

    著作權政策宣告
    1.本網站之數位內容為國立政治大學所收錄之機構典藏,無償提供學術研究與公眾教育等公益性使用,惟仍請適度,合理使用本網站之內容,以尊重著作權人之權益。商業上之利用,則請先取得著作權人之授權。
    2.本網站之製作,已盡力防止侵害著作權人之權益,如仍發現本網站之數位內容有侵害著作權人權益情事者,請權利人通知本網站維護人員(nccur@nccu.edu.tw),維護人員將立即採取移除該數位著作等補救措施。
    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback