博碩士論文 etd-0128110-114616 詳細資訊

[回到前頁查詢結果 | 重新搜尋]

姓名 張偉志(Wei-chih Chang) 電子郵件信箱 E-mail 資料不公開
畢業系所 資訊管理學系研究所(Information Management)
畢業學位 碩士(Master) 畢業時期 98學年第1學期
論文名稱(中) 網路使用及智慧財產權之研究
論文名稱(英) A Research of Internet Usage and Intelligence Property
  • etd-0128110-114616.pdf
  • 本電子全文僅授權使用者為學術研究之目的,進行個人非營利性質之檢索、閱讀、列印。


    論文語文/頁數 中文/67
    統計 本論文已被瀏覽 5652 次,被下載 6062 次
    摘要(中) 今日人們對於娛樂的需求愈多以透過資訊科技來滿足,例如線上遊戲、MP3、線上電視、電影等,這些需求的成長也伴隨著盜版的動機及行為的增加。本研究旨在探討經由網路下載未授權(非法)電影的認知及決策模式,並詴圖加入情緒的影響,瞭解一般大學生願意或不願意下載的行為意圖。
    摘要(英) In recent years, people using information technology more to meet their demand for entertainment. For example, on-line game, MP3, on-line TV, movies and so on, which are belong such technology. The increasing of this demand is accompanied the growth of motivation and behavior of piracy. This study focused on recognize and decision pattern of behavior that downloading unauthorized movies, and tried to join the emotion impact, and, understanding college students’ intention of downloading.
    The research model of this study based on triangle interaction from Social Cognitive Theory (SCT) and its core ─ Self-efficacy, and developing questionnaire from literature review. The questionnaire measuring the social cognize and personal belief about the behavior which downloading unauthorized movies, and make up an movie with text and post, in order to engagement into the situation, and measuring the impact of intention.
    The results showed that the research model based on SCT will explain the detail of motivations and decision making about the intention to illegal downloading of common college students, and verified that emotion have the impact in decision making process. According to result, we recommend the irrational factor to research about piracy. For practice, we recommend the preventive of piracy will not only by viewpoint of “crime” but also by investigate the motivation of piracy.
  • 認知有趣性
  • 社會認知理論
  • 電影
  • 非法下載
  • 盜版
  • 關鍵字(英)
  • perceive enjoyment
  • social cognitive theory
  • movie
  • illegal download
  • piracy
  • 論文目次 第一章 ... 緒論 1
    第一節 研究背景 1
    第二節 研究動機與目的 4
    第三節 研究流程 6
    第二章 ... 文獻探討 8
    第一節 理性行為模式、計畫行為理論與議題情境模式 8
    第二節 社會認知理論、自我效能及相關研究 11
    第三節 臺灣的盜版研究 13
    第四節 研究模式與假說 14
    第三章 ... 研究方法 19
    第一節 研究對象及資料蒐集 19
    第二節 研究構念定義及問卷設計 20
    第三節 資料分析方法及工具 23
    第四章 ... 資料分析 26
    第一節 資料處理與基本資料分析 26
    第二節 信度及效度分析 29
    第三節 研究模式與假說檢定 32
    第五章 ... 結論與建議 35
    第一節 研究結果與討論 35
    第二節 研究貢獻 37
    第三節 研究限制與未來研究方向 39
    參考文獻 41
    附錄 研究問卷 49
    參考文獻 Ajzen, I. “From intentions to actions: A theory of planned behavior”, Action-control: From cognition to behavior, pp. 11- 39,1985.
    Ajzen, I., & Fishbein, M. “Belief, attitude, intention and behavior: an introduction to theory and research”, Addsion - Wesley , Reading, 1976.
    Bandura, A. The Social Cognition Theory of Moral Thought and Action. Hillsdale, New York, 1991.
    Bandura, A., Barbaranelli, C., Caprara, G.V., and Pastorelli, C. "Mechanisms of Moral Disengagement in the Exercise of Moral Agency," Journal of personality and social psychology (71:2) 1996, pp. 364-374.
    Banerjee, D., Cronan, T.P., and Jones, T.W. "Modeling IT Ethics: A Study in Situational Ethics," MIS Quarterly (22:1) 1998, pp. 31-60.
    Cheng, H.K., Sims, R.R., and Teegen, H. "To purchase or to pirate software: an empirical study," Journal of Management Information Systems (13) 1997, pp. 49-60.
    Christensen, A.L., and Eining, M.M. "Factors Influencing Software Piracy: Implications for Accountants," Journal of Information Systems (Spring) 1991, pp. 67-80.
    Cruz, C.A., Shafer, W.E., and Strawser, J.R. "A Multidimensional Analysis of Tax Practitioners' Ethical Judgments," Journal of Business Ethics, 24, 2000, pp.223-244.
    Davis, F. D. “Perceived usefulness, perceived ease of use, and user acceptance of information technology.” MIS Quarterly (13:3) 1989, pp.319-340.
    Ferrell, O.C., and Gresham, L.G. "A Contingency Framework for Understanding Ethical Decision making in Marketing," Journal of Marketing (49:3) 1985, pp. 87-96.
    Donelson R. Forsyth and William L. Scott, “Attributions and moral judgments: Kohlberg’s stage theory as a taxonomy of moral attributions,” Bulletin of the Psychonomic Society (22:4), 1984, pp. 321-323.
    Gold berg, Stimson, Lewensten, Scott, and Wichansky “Eye tracking in web search tasks: design implications,” Symposium on Eye tracking research & applications, 2002, pp. 51-58.
    James H. Gerlach, Feng-Yang Kuo, and Cathy S. Lin, "Self Sanction and Regulative Sanction against Copyright Infringement: A Comparison between US and China College Students," Journal of the American Society for Information Science and Technology, 60:6, 2009, pp.1-15.
    Jones, T.M. "Ethical decision making by individuals in organizations: an issue-contingent model," Academy of management review (16:2) 1991, pp. 366-395.
    Just, M. A., & Carpenter, P. A. “Eye fixations and cognitive processes,” Cognitive Psychology, 8, 1976, pp. 441-480.
    Kini, R.B., Ramakrishna, H.V., and Vijayaraman, B.S. "Shaping of moral intensity regarding software piracy: a comparison betwen thailand and U.S. student," Journal of Business Ethics (49) 2004, pp. 91-104.
    Kuo, F.Y., and Hsu, M.H. "Development and Validation of Ethical Computer Self-Efficacy Measure: The case of Softlifting," Journal of Business Ethics (32) 2001a, pp. 299-315.
    Kuo, F.Y., and Hsu, M.H. "An Investigation of Volitional Control in Information Ethics," Twenty-Second International Conference on Information Systems, 2001b.
    Lam, S.P. "Predicting intentions to conserve water from the theory of planned behavior, perceived moral obligation, and perceived water right," Journal of Applied Psychology (29) 1999, pp. 1058-1071.
    Loch, K.D., and Conger, S. "Evaluating Ethical Decision Making and Computer Use," Communications of the ACM (39:7) 1996, pp. 74-83.
    Logsdon, J.M., Thompson, J.K., and Reid, R.A. "Software piracy: is it related to level of moral judgment," Journal of Business Ethics (13:11) 1994, pp. 849-857.
    Oliver, P., Marwell, G., & Teixeira, R. (1985). A theory of the critical mass. I. Interdependence, group heterogeneity, and the production of collective action. Amer J Sociology, Vol. 91, No. 3,
    pp. 522-556.
    Pan, Qinan and Chunyu “An Example-Based Study on Chinese Word Segmentation Using Critical Fragments,” Natural Language Processing, Lecture Notes in Artificial Intelligence: Springer-Verlag Berlin(No. 3248), 2005, pp. 714-722.
    Peace, A.G., F.Galletta, D., and Thong, J.Y.L. "Software piracy in the workplace: a model and empirical test," Journal of Management Information Systems (20) 2003, pp. 153-177.
    Ramakrishna, H.V., Kini, R.B., and Vijayaraman, B.S. "Shaping of moral intensity regarding software piracy in university students: immediate community effects," Journal of Computer Information Systems (41:4) 2001, pp. 47-51.
    Rayner, K. “Eye movements in reading and information processiong: 20years of research,” Psychological bulletin(124:3) 1998, pp. 372-422.
    Rest, J. Moral development: Advances in research and theory Praeger, New York, 1986.
    Tan, B. "Understanding consumer ethical decision making with respect to purchase of pirated software," Journal of consumer makketing (19:2) 2002, pp. 96-111.
    Thong, J.Y.L., and Yap, C.S. "Testing an Ethical Decision-Making Theory: The Case of Softlifting," Journal of Management Information Systems (15:1) 1998, pp. 213-237.
    Trevino, L.K. "Ethical Decision Making in Organizations: A Person-Situation Interactionist Model," Academy of management review (11:3) 1986, pp. 601-617.
    Vallerand, Fortier, Guay. “Self-Determination and Persistence in a Real-Life Setting Toward a Motivational Model of High School Dropout,”Journal of Personality and Social Psychology, 1997, Vol. 72, NO. 5, pp. 1161-1176
    Volkmann, F. C. “Human visual suppression,” Vision Research(26) 1986, pp. 1401-1416.
    孫承武 (2008年7月18日)。警方破獲盜版光碟工廠 近兩年最大宗個案。大紀元。線上檢索日期:2009年6月27日。網址: http://www.epochtimes.com/b5/8/7/18/n2196340.htm
    章忠信 (2005年9月20日)。Kuro案件之評析。著作權筆記。線上檢索日期:2009年6月27日。網址: http://www.copyrightnote.org/crnote/bbs.php?board=6&act=read&id=58
    胡守得、邱俊福、許敏溶 (2005年12月17日)。破獲網路盜版電影 逮捕一人。大紀元。線上檢索日期:2009年6月27日:網址: http://www.epochtimes.com/b5/5/12/17/n1156887.htm
    三柳英樹 (2008年5月9日)。京都府警、「Share」利用者三人を著作権法違反の疑いで逮捕。INTERNET Watch。線上檢索日期:2009年6月27日。網址: http://internet.watch.impress.co.jp/cda/news/2008/05/09/19490.html
    刑事警察局偵九隊二組 (2009年3月20日)。破獲國內首宗「線上直播盜版電
    影、MTV網站-趴趴看網站」涉嫌違反著作權法。內政部警政署刑事警察局。線上檢索日期:2009年6月27日。網址: http://www.cib.gov.tw/news/news01_2.aspx?no=2392
    白卉芳 “資訊通訊科技是軟體盜版的促進因子或抑制因子? 一個跨國的研究,” 未出版碩士論文,國立東華大學國際企業學系, 花蓮, 2007.
    周沂萍 “影音光碟盜版風險之研究-估計盜版國家容忍率,” 國立政治大學風險管理與保險研究所, 台北, 2004.
    周科鈞 “電腦軟體盜版行為之結構性分析,” 國立臺灣大學國際貿易學系, 台北, 1995.
    施佳宏 "消費者倫理信念與偶像崇拜特質對音樂盜版關係影響之研究-以臺灣與美加地區為例,” 中國文化大學國際貿易學系, 台北, 2006.
    高崇瑋 “網路盜版行為研究,” 世新大學資訊傳播學研究所, 台北, 2003.
    張建堯 “點對點檔案分享軟體使用行為—臺灣與大陸之比較研究,” 東吳大學企業管理學系, 台北, 2004.
    張瀞怡 “臺灣電影映演市場之消費者使用網路下載之行為研究,” 國立臺灣大學國際企業學, 台北, 2006.
    莊賢智 “以眼動追蹤法探討圖文配置閱讀視線軌跡之研究,” 中國文化大學資訊傳播研究所, 台北, 2004.
    許瓊文 “應用眼動儀於決策偏誤與資訊注意力研究,” 國立中山大學資訊管理學系, 高雄, 2007.
    郭峰淵, 劉家儀 "談臺灣微軟在落實與推動智慧財產權的現況," 國立中山大學資訊管理學系, 高雄, 2004.
    陳品錚 “點對點環境下檔案分享行為之倫理決策探討,” 東吳大學企業管理學系, 台北, 2004.
    陳祥源 “以消費價值探討數位音樂(MP3)下載意圖,” 東吳大學企業管理學系, 台北, 2006.
    陳毓華 “國民中學國文教科書編排設計之易讀性與閱讀眼動研究,” 輔仁大學心理學系, 台北, 2005.
    陳韻如 “軟體盜版因素之研究:臺灣.美國二國比較,” 國立中正大學資訊管理學系, 嘉義, 1998.
    閆國利 “顏色與圖形認知,” Retrieved 2007/6/30 from http://www.uespace.com/post/51.html
    黃憶婷 “網路廣告的版面配置對視覺焦點、閱讀動線的影響之研究,” 中國文化大學資訊傳播研究所, 台北, 2006.
    鄞俊波 “由言辭行動理論觀點探討資訊部門的防衛溝通行為,” 國立中山大學資訊管理學系, 高雄, 2005.
    劉佳蓉 “注意力分配及眼球運動準備歷程對於眼動潛伏時間與眼動軌跡的影響,” 國立中央大學認知與神經研究所”, 桃園, 2005.
    劉家儀 “從創作經驗與自我規範探討軟體盜版之行為意圖,” 國立中山大學資訊管理學系, 高雄, 2008.
    戴榮賦 “呈現方式一致性與自我效能對於多屬性決策表現的影響,” 國立中山大學資訊管理學系, 高雄, 2005.
    薛椀云 “消費者使用非侵權軟體之願付價格分析,” 國立中興大學行銷學系, 台中, 2005.
    謝琬婷 “誰才是盜版的推手?-反思日劇在臺灣之流通與消費,” 淡江大學大眾傳播學系, 台北, 2005
  • 林芬慧 - 召集委員
  • 林杏子 - 委員
  • 郭峰淵 - 指導教授
  • 口試日期 2009-06-22 繳交日期 2010-01-28

    [回到前頁查詢結果 | 重新搜尋]