政大機構典藏-National Chengchi University Institutional Repository(NCCUR):Item 140.119/35206
English  |  正體中文  |  简体中文  |  Post-Print筆數 : 27 |  全文笔数/总笔数 : 109953/140892 (78%)
造访人次 : 46228464      在线人数 : 796
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
搜寻范围 查询小技巧:
  • 您可在西文检索词汇前后加上"双引号",以获取较精准的检索结果
  • 若欲以作者姓名搜寻,建议至进阶搜寻限定作者字段,可获得较完整数据
  • 进阶搜寻
    政大機構典藏 > 商學院 > 資訊管理學系 > 學位論文 >  Item 140.119/35206


    请使用永久网址来引用或连结此文件: https://nccur.lib.nccu.edu.tw/handle/140.119/35206


    题名: 個人管理電子郵件行為之研究
    作者: 朱筱琪
    贡献者: 管郁君
    朱筱琪
    关键词: 郵件管理行為
    理性行為理論
    使用經驗
    日期: 2003
    上传时间: 2009-09-18 14:26:39 (UTC+8)
    摘要: 電子郵件為網路之殺手級應用,因其傳遞迅速、價廉等特性,讓電子郵件成為病毒、廣告信及色情郵件等非使用者期望之資訊的散佈媒介,造成電腦與網路資源之浪費,使用者亦為管理這些片斷、非結構性的電子訊息所苦。為此本研究以個人資訊管理之角度重新看待電子郵件之使用行為,並以理性行為理論為基礎,探討使用經驗、管理態度、主觀規範、郵件管理意願與郵件管理行為之關係,架構出個人管理郵件行為之研究模式。
    本研究之研究對象為國內電子郵件使用者,以網路問卷調查的量化研究方式為主,輔以焦點團體訪談與深入訪談之質化研究彌補電子郵件管理相關文獻之不足。在本研究中發現個人之直接(郵件)與間接(電腦)使用經驗皆會顯著地影響個人對其郵件之管理態度,但影響的程度不高;郵件管理意願會受到管理態度、主觀規範以及郵件困擾深度的影響,以管理態度之影響最深;在郵件管理行為上,不同郵件管理意願之個人在單挑傾向、群組傾向以及個人化傾向上有顯著的不同,高郵件管理意願之個人其上述3種管理傾向較強。
    參考文獻: 一、中文參考文獻
    中國互聯網絡信息中心(China Internet Network Information Center, CINNCI)(民93年1月15日)。第13次中國互聯網絡發展狀況統計報告。北京:中國互聯網絡信息中心。民93年2月1日,取自:http://www.cnnic.com.cn/html/Dir/2004/01/15/2080.htm
    社會科學研究方法與資料分析(朱柔若譯)。台北:揚智文化(民89)。(原著作出版年:1996)
    社會科學研究方法(李美華等譯)(民87)。台北:時英。(原著作出版年:1997年)
    吳明隆(民90)。教育行動研究導論:理論與實務。台北:五南。
    李雅萍(民92年12月8日)。2003年第三季我國商用網際網路帳號達928萬戶。資策會FIND。民93年1月20日,取自:http://www.find.org.tw/0105/howmany/howmany_disp.asp?id=61
    李雅萍(民92年12月25日)。2003年我國家庭資訊通信技術應用概況之調查研究。資策會FIND。民93年1月20日,取自:http://www.find.org.tw/0105/howmany/howmany_disp.asp?id=65
    周文賢(民91)。多變量統計分析─SAS STAT使用方法。台北:智勝文化。
    邱皓政(民93)。社會與行為科學的量化研究與統計分析─SPSS中文視窗版資料分析範例解析(2版)。台北:五南。
    黃淑如、莊玲玉(民86年5月)。電子郵件系統探討。商業職業教育季刊,68,8-22。
    焦點團體:理論與實務(歐素汝譯)(民89)。台北:弘智。(原著出版年:1990年)
    焦點團體訪談:教育與心理學適用(王文科、王智弘譯)(民88)。台北:五南。(原著作出版年:1996年)
    劉芳梅(民92年10月1日)。2004年垃圾郵件將佔60%。資策會FIND。民93年3月3日,取自:http://www.find.org.tw/news_disp.asp?news_id=2844
    二、英文參考文獻
    Ajzen, I. (1988). Attitudes, personality, and behavior. Chicago, IL: The Dorsey Press.
    Ajzen I. & Fishbein M. (1975). Belief, attitude, intension, and behavior: an introduction to theory and research. MA: Addison-Wesley.
    Ajzen, I. & Fishbein, M. (1980). Understanding attitudes and predicting social behavior. Englewood Cliffs, NJ: Prentice Hall.
    Allport, G. W. (1935). Attitudes. In C. Murchinson (Ed.), A handbook of social psychology (pp. 798-884). Worchester, Mass: Clark University Press.
    Belsley, D.A., Kuh, E., & Welsch, R.E. (1980). Regression Diagnostics. New York: John Wiley & Sons.
    Brown, S. A., Fuller, R. M., & Vician, C. (working paper). Individual characteristics and e-Learning: The role of computer anxiety and communication apprehension. Information System Department, Kelley School of Business.
    DeLone, W. H. & McLean, E. R. (1992). Information systems success: the quest for the dependent variable. Information Systems Research, 3(1), 60-95.
    DeLone, W. H. & McLean, E. R. (2003). The DeLone and McLean model of information systems success: a ten-year update. Journal of Management Information Systems, 19(4), 9-30.
    Eagly, A. H. & Chaiken, S. (1993). The psychology of attitudes. San Diago: Harcourt Bruce Jovannovich.
    Groove Network. (2002). There shouble be more to collaboration than Email. Retrived January 22, 2004, form World Wide Web: http://www.groove.net/pdf/idc-collaboration.pdf
    Hair, J. F., Anderson, R. E., Tatham, R. L., & Black, W. C. (1992). Multivariate Data Analysis. Englewood Cliffs, NJ: Prentice-Hall.
    Hendtickson, A. R. & Collins, M. R. (1996). An assessment of structure and causation of IS usage. ACM SIGMIS, 27(2). Retrieved January 27, 2004, from ACM SIGMIS Database.
    Hess, J. M. (1968). Group interviewing. In R. L. King (Ed.), New science of planning. Chicago: American Marketing Association.
    Hirt, S. G. & Limayem, M. (2000). Integrating three theoretical perspectives to explain Internet-based technology usage by university students: a qualitative study. International Conference on Information Systems December 10-13, 2000. Retrived January 20, 2004, from World Wide Web: http://portal.acm.org/citation.cfm?id=359640.359790
    Hoxmeier, J. A., Nie, W., & Purvis, G.. T. (2002). The impact of gender and experience on user confidence in electronic mail. Journal of Organizational and End User Computing, 12(4), 11-20.
    Igbaria, M., Pavri, F. N., & Huff, Sid L. (1989). Microcomputer applications: an empirical look at usage. Information and Management, 16(4), 187-196.
    Igbraria, M., Guimaraes, T., & Davis, G. B. (1995). Testing the determinants of microcomputer usage via a structural equation model. Journal of Management Information Systems, 11(4), 87-114.
    Kim, J. & Mueller, C. W. (1978). Factor analysis: Statistical methods and practical issues. Newbury Park, CA: Sage.
    Lassila, K. S., & Brancheau, J. C. (1999). Adoption and utilization of commercial software packages: Exploring utilization equilibria, tramsitions, triggers, and tracks. Journal of Management Information Systems, 16(2), 63-90.
    Mahlke, S. (2002). Factors influencing the experience of website usage. Conference on Human Factors in Computing Systems April 20-25, 2002. Retrived January 30, 2004, from World Wide Web: http://portal.acm.org/citation.cfm?id=506628&coll=GUIDE&dl=GUIDE&CFID=22481731&CFTOKEN=71444039
    Markus, M. L. (1987). Toward a ‘critical mass’ theory of interactive media. Communication Research, 14(5), 491-511.
    Neter, J., Wasserman, W. & Kutner, M. H. (1989). Applied Linear Regression Models. Homewood, IL: Richard D. Irwin.
    Oliver, P., Marwell, G. & Teixeira, R. (1985). A theory of the critical mass interdependence, group heterogeneity, and the production of collective action. American Journal of Sociology, 93(3), 522-556.
    Rawstorne, P., Jayasuriya, R., & Caputi, P. (2000). Issues in predicting and explaining usage behaviors with the technology acceptance model and the theory of planned behavior when usage is mandatory. International Conference on Information Systems December 15-18, 2000. Retrived March 2, 2004, from World Wide Web: http://portal.acm.org/citation.cfm?id=359640.359721
    Research Focus: SPAM. (n.d.). Ferris Research.Retrived March 1, 2004, from World Wide Web: http://www.ferris.com/offer/spam.html#report3
    Rudy, I. A. (1996). A critical review of research on electronic mail. European Journal of Information Systems, 4, 198-213.
    Seddon, P. B. (1997). A respecification and extension of the DeLone and McLean model of IS success. Information Systems Research, 8(3), 240-253.
    Shannon, D. M., Johnson, T. E., Searcy, S., & Lott, A. (2002). Using electronic surveys: advice from survey professionals. Practical Assessment, Research & Evaluation, 8(1).
    Solomon, D. J. (2001). Conducting web-based surveys. Practical Assessment, Research & Evaluation, 7(19).
    Taylor, S. & Todd, P. A. (1995a). Assessing IT usage: the role of prior experience. MIS Quarterly, 19(4), 561-570.
    Taylor, S. & Todd, P. A. (1995b). Understanding information technology usage: a test of competing models. Information Systems Research,6(2), 144-176,.
    Thomas, P. J., Meech, J. F., & Macredie R. D. (1994). Personal Information Management using integrated information appliances. Proceedings of the BCS Graphics and Displays Group Conference on Digital Media and Electronic Publishing. Leeds, UK.
    UCLA Center for Communication Policy. (2003). The UCLA Internet Report-Surveying the Digital Future- Year Three. Retrieved January 10, 2004, from World Wide Web: http://www.ccp.ucla.edu/
    United Nations Conference On Trade and Development, UNCTAD. (2003). E-Commerce and Development Report. Retrieved January 10, 2004, from World Wide Web: http://www.unctad.org/ecommerce/
    Venkatesh, V. & Morris, M. G. (2000). Why don’t men ever stop to ask for directions? Gender, Social influence, and their role in technology acceptance and usage behavior. MIS Quarterly, 24(1), 115-139.
    Whittaker, S. & Sidner, C. (1996). Email overload: exploring personal information management of email. Proceedings of the ACM CHI96 Conference on Human Factors in Computing Systems April 13-18, 1996. Retrived March 1, 2004, from World Wide Web: http://www.acm.org/sigchi/chi96/proceedings/papers/Whittaker/sw_txt.htm
    Xia, Weidong & Lee, Gwanhoo (2000). The influence of persuasion, training and experience on user perceptions and acceptance of IT innovation. International Conference on Information System Augest 14-16, 2000. Retrived January 25, 2004, from World Wide Web: http://portal.acm.org/citation.cfm?id=359640.359764
    描述: 碩士
    國立政治大學
    資訊管理研究所
    91356021
    92
    資料來源: http://thesis.lib.nccu.edu.tw/record/#G0091356021
    数据类型: thesis
    显示于类别:[資訊管理學系] 學位論文

    文件中的档案:

    档案 描述 大小格式浏览次数
    35602101.pdf44KbAdobe PDF2764检视/开启
    35602102.pdf81KbAdobe PDF2717检视/开启
    35602103.pdf68KbAdobe PDF2744检视/开启
    35602104.pdf87KbAdobe PDF2774检视/开启
    35602105.pdf133KbAdobe PDF2740检视/开启
    35602106.pdf178KbAdobe PDF21344检视/开启
    35602107.pdf208KbAdobe PDF21318检视/开启
    35602108.pdf791KbAdobe PDF21594检视/开启
    35602109.pdf142KbAdobe PDF2790检视/开启
    35602110.pdf94KbAdobe PDF21320检视/开启
    35602111.pdf415KbAdobe PDF21601检视/开启


    在政大典藏中所有的数据项都受到原著作权保护.


    社群 sharing

    著作權政策宣告 Copyright Announcement
    1.本網站之數位內容為國立政治大學所收錄之機構典藏,無償提供學術研究與公眾教育等公益性使用,惟仍請適度,合理使用本網站之內容,以尊重著作權人之權益。商業上之利用,則請先取得著作權人之授權。
    The digital content of this website is part of National Chengchi University Institutional Repository. It provides free access to academic research and public education for non-commercial use. Please utilize it in a proper and reasonable manner and respect the rights of copyright owners. For commercial use, please obtain authorization from the copyright owner in advance.

    2.本網站之製作,已盡力防止侵害著作權人之權益,如仍發現本網站之數位內容有侵害著作權人權益情事者,請權利人通知本網站維護人員(nccur@nccu.edu.tw),維護人員將立即採取移除該數位著作等補救措施。
    NCCU Institutional Repository is made to protect the interests of copyright owners. If you believe that any material on the website infringes copyright, please contact our staff(nccur@nccu.edu.tw). We will remove the work from the repository and investigate your claim.
    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - 回馈