簡易檢索 / 詳目顯示

研究生: 李明仁
Ming-Ren Lee
論文名稱: 社會科技使用者行為之研究-以即時通訊與部落格為例
Studies Regarding User Behavior in Social Technology–Using Instant Messaging and Blog as Examples
指導教授: 盧希鵬
Hsi-Peng Lu
口試委員: 陳文華
Wun-Hwa Chen
林娟娟
Judy Chuan-Chuan Lin
吳玲玲
Ling-Ling Wu
李國光
Gwo-Guang Lee
學位類別: 博士
Doctor
系所名稱: 管理學院 - 資訊管理系
Department of Information Management
論文出版年: 2011
畢業學年度: 99
語文別: 英文
論文頁數: 119
中文關鍵詞: 社會科技關鍵多數經驗差異知識資本認知需求認知娛樂自我揭露社會資本社會影響
外文關鍵詞: social technology, critical mass, experience difference, knowledge capital, need for cognition, perceived enjoyment, self-disclosure, social capital, social influence
相關次數: 點閱:529下載:4
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • 本論文旨在探討社會科技的採用、黏性、及分享行為。
    子研究一以即時通訊為例,探討影響使用者採用社會科技的重要因素。此研究以科技接受模式與社會認知理論為基礎,提出認知有用、易用、歸屬感需求、認知娛樂、關鍵多數、及社會影響為重要因子。有效樣本為302位即時通訊使用者,經結構化分析模式(SEM)的結果顯示,即時通訊的娛樂價值(認知娛樂)達顯著,但功利價值(歸屬感需求)未達顯示。科技因素(認知有用、易用)與環境因素(關鍵多數、社會影響)對其擴散採用有直接或間接的顯著影響。此外,使用者對科技的認知(有用、易用)能透過社會心理因素改善:社會影響有助於增加認知有用與易用;關鍵多數有助於提升認知易用。經驗證,本研究模式具備72%解釋能力。
    子研究二以部落格為例,探討部落格黏性的前置因子與人口學變項差異。此研究以社會認知理論、資訊系統成功模式、及個人差異理論為基礎,提出部落格品質、認知需求、及社會影響為其重要因素。231位部落格使用者的樣本分析結果顯示,內容品質在部落格環境中扮演重要角色;社會影響能延長使用者的造訪時間,但對重複造訪部落格沒有直接的顯著影響。性別差異方面,女性讀者最關注內容品質,而男性在意系統品質與社會影響。在部落格經驗方面,老手與重度使用者關注內容與社會影響,而新手較在乎格式與系統品質。學生與非學生對部落格黏性也有差異存在。這些差異將有助於瞭解部落格的黏性與目標族群行銷。
    子研究三探討部落格分享行為的影響因素為何及部落格經驗差異。此研究以社會科技理論、社會認知理論、及社會交換理論為基礎,提出認知可用性、自我揭露、資訊素養、社會影響、經濟資本的期望、知識資本的期望、及社會資本的期望為部落格分享的重要因子。藉由268位部落格作者的問卷分析,結果顯示認知可用性扮演最重要的角色;部落格分享出自於內在的自我揭露,而非外在的資訊素養或社會影響。對於知識資本與社會資本的期望,會促進其部落格分享意願。部落格經驗差異分析顯示,對知識資本的期望吸引新進入者進行分享,但對社會資本的期望能維持部落格老手持續地分享。
    根據上述子研究的結果,本論文提出科技價值、個人特質、社交價值與結果期望的概念架構以探討社會科技的使用行為。雖然本論文嘗試以過去學者所提出的使用者行為相關理論進行三角驗證,仍需要更多的後續研究來驗證此概念架構。本論文僅探討採用行為、黏性行為與分享行為,未來仍有許多社會科技使用者行為尚待進一步探討,例如社會科技的信任建立模式(信任行為)、商業獲利模式(商業行為)與離線-線上關係的差異等。未來研究亦應重視社會科技帶來的負面效應,如隱私問題、成癮問題與欺騙問題等。


    This study explores three kinds of user behavior in social technology, including diffusion, stickiness, and sharing. Some insights are obtained after empirical validation.
    Study I investigated the antecedents of instant messaging (IM) diffusion. Based on technology acceptance model and social cognitive theory, this study proposed perceived usefulness, ease of use, need for belonging, perceived enjoyment, critical mass, and social influence as the antecedents of IM diffusion. Surveying 302 IM users, the results demonstrated that IM diffusion is driven by its hedonic value, not utilitarian value of social connection. In addition, technical factors (PU and PEOU) and environmental factors (CM and SI) can facilitate IM diffusion directly or indirectly. The results also revealed that social influence is helpful to increase user perceptions about usefulness and ease of use, and critical mass is related to perceived ease to use. This implies that characteristics of IM can come from environmental origins, and IM is treated as hedonic-oriented and small group media. The research model explains 72 percent of variance of user intention to use IM.
    Study II investigated the demographic differences and the antecedents of blog stickiness. Based on social cognitive theory, IS success model, and individual differences theory, this study proposed blog quality, need for cognition, and social influence as the antecedents of blog stickiness. Surveying 231 blog users, the results demonstrate that content is still the king in the blog environment. Social influence only affects the duration in the blog directly, but not the retention to the blog. For gender differences, female readers care for content mainly, but males further care about system quality and social influence. For blog experience and usage differences, while blog veterans or heavy users care about content and social influence, blog newbies care about the quality of context and system. Students and non-students also have different antecedents of blog stickiness. This study not only provides a further understanding into the blog stickiness, but also offers an impetus to future researches.
    Study III investigated the blog experience differences and the antecedents of blog sharing. Based on socio-technical theory, social cognitive theory, and social exchange theory, this study proposed perceived usability, self-disclosure, information literacy, social influence, outcome expectation for financial capital, knowledge capital, and social capital as the antecedents of blog sharing. Surveying 268 blog authors, the results demonstrate that usability is a necessity for blog sharing. Blog sharing is primarily a personal endeavor driven by inner self-disclosure, not external information literacy or outer social influence. Sharing behavior is also encouraged by outcome expectancy for knowledge capital and social capital rather than financial capital. In addition, the results also indicated that expectancy for knowledge capital can enhance new entrants to write a blog, whereas expectancy for social capital keeps blog veterans sharing in blogs.
    According to above empirical survey, as a conclusion, this dissertation attempts to propose a conceptual framework (technological value, personal characteristic, social value, and outcome expectancy) for investigating user behavior in social technology. Although this framework is supported by theoretical triangulation, it needs more empirically test and validation in future research. In addition adoption behavior, stickiness behavior, and sharing behavior, there still exists several issues such as trust behavior, commercial behavior, and offline-online relationship. Future studies should also emphasize the negative effects such privacy, addiction, and cheating in social technology. The dissertation provides preliminary studies, there still exists many interesting issues need to be investigated in future studies.

    1. Introduction 1 2. Study I: the diffusion of social communication media 4 2.1 Introduction 4 2.2 Theoretical background and research hypotheses 5 2.3. Methodology 16 2.4. Results 17 2.5 Discussion 28 2.6. Conclusion and limitation 30 3. Study II: the stickiness of social technology, using blogs as subject 33 3.1 Introduction 33 3.2 Theoretical background and research hypotheses 35 3.3 Methodology 42 3.4 Results 44 3.5 Discussion and Implications 55 3.6 Conclusion limitation and future research 59 4. Study III: the share behavior in social technology, using blogs as subject 60 4.1 Introduction 60 4.2 Theoretical background and research hypotheses 61 4.3. Methodology 70 4.4. Results 72 4.5 Discussion and implications 83 4.6. Conclusion, limitations, and future research 88 5. Conclusion and future research 89 5.1. Findings of three studies 89 5.2. The proposed framework 91 5.3. Integrated conclusion and future study 93 References 99 Appendix A: Questionnaire of study I 117 Appendix B: Questionnaire of study II 118 Appendix C: Questionnaire of study III 119

    Adams, S. A., “Blog-based applications and health information: Two case studies that illustrate important questions for Consumer Health Informatics (CHI) research,” International Journal of Medical Informatics, Vol. 79, No. 6, pp. 89-96 (2008)
    Agarwal, R. and Prasad, J., “Are individual differences germane to the acceptance of new information technologies?” Decision Sciences, Vol. 30, No. 2, pp. 361-391 (1999)
    Ahn, T., Ryu, S., and Han, I., “The impact of the online and offline features on the user acceptance of Internet shopping malls,” Electronic commerce Research and Applications, Vol. 3, No. 4, pp. 405-420 (2004)
    Ajzen, I. and Fishbein, M., Understanding attitudes and predicting social behavior, Englewood Cliffs, NJ: Prentice-Hall. (1980).
    Ajzen, I., “The theory of planned behavior,” Organizational Behavior and Human Decision Process, Vol. 50, No. 2, pp. 179-211 (1991)
    Aladwani, A. M. and Palvia, P. C., “Developing and validating an instrument for measuring user-perceived web quality,” Information & Management, Vol. 39, No. 6, pp. 467-476 (2002)
    Algesheimer R., Dholakia, U. M., and Herrmann A., “The Social Influence of Brand Community: Evidence from European Car Clubs,” Journal of Marketing, Vol. 69, No. 3, pp.19-34 (2005)
    Allen, J. P., “The evolution of new mobile applications: A sociotechnical perspective,” International Journal of Electronic Commerce, Vol. 8, No. 1, pp. 23-36 (2003)
    Amichai-Hamburger, Y., Kaynar, O., and Fine, A., “The effects of need for cognition on Internet use,” Computers in Human Behavior, Vol. 23, No. 1, pp. 880-891 (2007)
    Anderson, J. and Lee, R., “The future of social relations,” The Pew Internet & American Life Project, retrieved from http://www.pewinternet.org/Reports/2010/The-future-of-social-relations.aspx (2010)
    Arnold, J., Chittenden, L., Ellis, K. D., Eubanks, J., Godwin, I., McDonald, E., Morris, S. E., Ovadia, S., Shrode, F., and Teplitzky, S., “What’s the Ballyhoo about Blogs?” Serials Review, Vol. 33, No. 3, pp. 175-187 (2007)
    Asch, S. E., “Forming impressions of personality,” Journal of Abnormal and Social Psychology, Vol. 41, No. 3, pp. 258-290 (1946).
    Association of College & Research Libraries (ACRL), “Information literacy competency standards for higher education,” retrieved from http://www.ala.org/ala/mgrps/divs/acrl/standards/informationliteracycompetency.cfm (2000)
    Bandura, A., “Organizational application of social cognitive theory,” Australian Journal of Management, Vol. 13, No. 2, pp. 275-302 (1988)
    Bandura, A., Social foundations of thought and action: A social cognitive theory, Prentice-Hall, Englewood Cliffs, NJ. (1986)
    Baumgartner, H. and Homburg, C., “Applications of structural equation modeling in marketing and consumer research: A review,” International Journal of Research in Marketing, Vol. 13, No. 2, pp. 139-161 (1996)
    Behrens, S., “A conceptual analysis and historical overview of information literacy,” College and Research Libraries, Vol. 55, No. 4, pp. 309-322 (1994)
    Bentler, P. M. and Bonett, D. G., “Significance tests and goodness-of-fit in the analysis of covariance structures,” Psychological Bulletin, Vol. 88, No, 3, pp. 588-606 (1980)
    Bhatnagar, A. and Ghose, S., “An analysis of frequency and duration of search on the Internet,” Journal of Business, Vol. 77, No. 2, pp. 311-330 (2004)
    Blau, P, Exchange and power in social life, New York: Wiley. (1964)
    Bostrom, R. P. and Heinen, J. S., “MIS problems and failures: A socio-technical perspective. Part I: The causes,” MIS Quarterly, Vol. 1, No. 3, pp. 17-32 (1977a)
    Bostrom, R. P. and Heinen, J. S., “MIS problems and failures: A socio-technical perspective. Part II: The application of socio-technical theory,” MIS Quarterly, Vol. 1, No. 4, pp. 11-28 (1977b)
    Browne, M. W. and Cudeck, R., “Alternative ways of assessing model fit,” In Bollen, K. A. and Long, J. S. (Eds.), Testing structural equation models, Newbury Park, CA: Sage, pp. 136-162 (1993)
    Butcher, K. J., “Differential impact of social influence in the hospitality encounter,” International Journal of Contemporary Hospitality Management, Vol. 17, No. 2, pp. 125-135 (2004)
    Cacioppo, J. T. and Petty, R. E., “The need for cognition,” Journal of Personality and Social Psychology, Vol. 42, No. 1, pp. 116-131 (1982)
    Cacioppo, J. T., Petty, R. E., and Kao, C. F., “The efficient assessment of need for cognition,” Journal of Personality Assessment, Vol. 48, No. 3, pp. 306-307 (1984)
    Cameron, A. F. and Webster, J., “Unintended consequences of emerging communication technologies: instant messaging in the workplace,” Computers in Human Behavior, Vol. 21, No. 1, pp. 85-103 (2005)
    Casaló, L., Flavián, C., and Guinalíu, M., “The role of perceived usability, reputation, satisfaction and consumer familiarity on the website loyalty formation process,” Computers in Human Behavior, Vol. 24, No. 2, pp. 325-345 (2008)
    Castelluccio, M., “E-mail in real time,” Strategic Finance, Vol. 81, No. 3, pp. 34–37 (1999).
    Chatterjee, S., Kang, Y. S., and Mishra, D. P., “Market signals and relative preference: the moderating effects of conflicting information, decision focus, and need for cognition,” Journal of Business Research, Vol. 58, No. 10, pp. 1362-1370 (2005)
    Chau, M. and Xu, J., “Mining communities and their relationships in blogs: A study of online hate groups,” International Journal of Human-Computer Studies, Vol. 65, No. 1, pp. 57-70 (2007)
    Chau, P. Y., “An empirical assessment of a modified technology acceptance model,” Journal of Management Information Systems, Vol. 13, No. 2, pp. 185-204 (1996)
    Chiu, C. M., Hsu, M. H., and Wang, E. T. G., “Understanding knowledge sharing in virtual communities: An integration of social capital and social cognitive theories,” Decision Support Systems, Vol. 42, No. 3, pp. 1872-1888 (2006)
    Clark, I., “Information literacy and the writing center,” Computers and Composition, Vol. 12, No. 2, pp. 203-209 (1995)
    Corrall, S., “Information literacy strategy development in higher education: An exploratory study,” International Journal of Information Management, Vol. 28, No. 1, pp. 26-37 (2008)
    Cyr, D., Hassanein, K., Head, M., and Ivanov, A., “The role of social presence in establishing loyalty in e-Service environments,” Interaction with Computers, Vol. 19, No. 1, pp. 43-56 (2007)
    Cyr, D., Head, M., and Ivanov, A., “Design aesthetics leading to m-loyalty in mobile commerce,” Information & Management, Vol. 43, No. 8, pp. 950-963 (2006)
    Dai, D. Y. and Wang, X., “The role of need for cognition and reader beliefs in text comprehension and interest development,” Contemporary Educational Psychology, Vol. 32, No. 3, pp. 332-347 (2007)
    Danaher, P. J., Mullarkey, G. W., and Essegaier, S., “Factors affecting Web site visit duration: A cross-domain analysis,” Journal of Marketing Research, Vol. 43, No. 2, pp. 182-194 (2006)
    Davis, F. D., “Perceived usefulness, perceived ease of use, and user acceptance of information technology,” MIS Quarterly, Vol. 13, No. 3, pp. 319-337 (1989)
    Davis, F. D., Bagozzi, R. P., and Warshaw, P. R., “Extrinsic and intrinsic motivation to use computers in the workplace,” Journal of Applied Social Psychology, Vol. 22, No. 14, pp. 1111-1132 (1992)
    Dawes, J., “Do data characteristics change according to the number of scale points used? An experiment using 5-point, 7-point and 10-point scales,” International Journal of Market Research, Vol. 50, No. 1, pp. 61-77 (2008)
    DeLone, W. H. and McLean, E. R., “Information Systems Success Revisited,” Proceedings of the 35th Hawaii International Conference on System Sciences (HICSS 02), Big Island, Hawaii, pp. 238-249 (2002)
    DeLone, W. H. and McLean, E. R., “Information Systems Success: The Quest for the Dependent Variable,” Information Systems Research, Vol. 3, No. 1, pp. 60-95 (1992)
    DeLone, W. H. and McLean, E. R., “The DeLone and McLean Model of Information Systems Success: A Ten-Year Update,” Journal of Management Information Systems, Vol. 19, No. 4, pp. 9-30 (2003)
    Dickey, M. D., “The impact of web-logs (blogs) on student perceptions of isolation and alienation in a web-based distance-learning environment,” Open Learning, Vol. 19, No. 3, pp. 279-291 (2004)
    Dickinger, A., Arami, M., and Meyer, D., “The role of perceived enjoyment and social norm in the adoption of technology with network externalities,” European Journal of Information Systems, Vol. 17, No. 1, pp. 4-11 (2008)
    Du, H. S. and Wagner, C., “Weblog success: Exploring the role of technology,” International Journal of Human-Computer Studies, Vol. 64, No. 9, pp. 789-798 (2006)
    Faulhabor, G., “Network effects and merger analysis: instant messaging and the AOL–Time Warner case,” Telecommunications Policy, Vol. 26, No.5-6, pp. 311-333 (2002)
    Ferguson, K. M., “Social capital and children’s wellbeing: a critical synthesis of the international social capital literature,” International Journal of Social Welfare, Vol. 15, No. 1, pp. 2-18 (2006)
    Fishbein, M. and Ajzen, I., Belief, attitude, intention, and behavior: An introduction to theory and research, Reading, MA: Addison-Wesley. (1975)
    Fishbein, M. and Ajzen, I., Understanding Attitude and Predicting Social Behavior, Prentice-Hall, Englewod Cliffs, NJ. (1980)
    Flavián, C., Guinalíu, M., and Gurrea, R., “The role played by perceived usability, satisfaction and consumer trust on website loyalty,” Information & Management, Vol. 43, No. 1, pp. 1-14 (2006)
    Fong, A. C. M., Lau, C. T., and Hui, S. C., “Towards an open protocol for secure online presence notification,” Computer Standards and Interfaces, Vol. 23, No. 4, pp. 311-324 (2001)
    Fornell, C. and Larcker, D. F., “Evaluating structural equation models with unobservable variables and measurement error,” Journal of Marketing Research, Vol. 18, No. 1, pp. 39-50 (1981)
    Fornell, C., “A second generation of multivariate analysis: classification of methods and implications for marketing research,” In Houston, M. J. (Ed.), American Marketing Association, Chicago, Illinois, pp.407-450 (1987)
    Freeman, L. C., “Centrality in Social Networks: Conceptual clarification,” Social Networks, Vol. 1, No. 3, pp. 215-239 (1979)
    Fulk, J., “Social construction of communication technology,” Academy of Management Journal, Vol. 36, No. 5, pp. 921-950 (1993)
    Fulk, J., Schmitz, J., and Steinfield, C. W., “A social influence model of technology use,” In Fulk, J. and Steinfield, C. W. (Eds.), Organizations and communication technology, Newbury Park, CA: Sage, pp.117-140 (1990)
    Fulk, J., Steinfield, C. W., Schmitz, J. A., and Power, J. G., “Social information processing model of media use in organizations,” Communication Research, Vol. 14, No. 5, pp. 529-552 (1987)
    Gefen, D. and Straub, D., “Gender differences in the perception and use of e-mail: An extension to the technology acceptance model,” MIS Quarterly, Vol. 21, No.4, pp. 389–400 (1997)
    Goldman, R. H., Cohen, A., and Sheahan, F., “Using seminar blogs to enhance student participation and leaning in public health school classes,” American Journal of Public Health, Vol. 98, No. 9, pp. 1658-1663 (2008)
    Granovetter, M., “The strength of weak ties,” The American Journal of Sociology, Vol. 78, No. 6, pp.1360-1380 (1973)
    Granovetter, M., “The strength of weak ties: a network theory revisited,” In Marsden, P. V. and Lin, N. (Eds.), Social Structure and Network Analysis, Beverly Hills: Sage, pp. 105-130 (1982)
    Granovetter, M., “The Strength of Weak Ties: A Network Theory Revisited,” Sociological Theory, Vol. 1, pp. 201-233 (1983)
    Green, C. W., “Normative influence on the acceptance of information technology,” Small Group Research, Vol. 29, No. 1, pp. 85-124 (1998)
    Gurzick, D. and Lutters, W. G., “From the personal to the profound: understanding the blog life cycle,” Proceedings of the CHI 2006, Montreal, Canada, ACM Press. (2006)
    Ha, I., Yoon, Y., and Choi, M., “Determinants of adoption of mobile games under mobile broadband wireless access environment,” Information & Management, Vol. 44, No. 3, pp. 276-286 (2007)
    Hair, J., Anderson, R., Tatham, R., and Black, W., Multivariate Data Analysis with Readings, MacMillan, New York. (1992)
    Hall, H. and Davison, B., “Social software as support in hybrid learning environments: The value of the blog as a tool for reflective learning and peer support,” Library & Information Science Research, Vol. 29, No. 2, pp. 163-187 (2007)
    Harris, L. C. and Goode, M. M. H., “The four levels of loyalty and the pivotal role of trust: A study of online service dynamics,” Journal of Retailing, Vol. 80, No. 2, pp. 139-158 (2004)
    Hassanein, K. and Head, M., “Manipulating perceived social presence through the web interface and its impact on attitude towards online shopping,” International Journal of Human-Computer Studies, Vol. 65, No. 8, pp. 689-708 (2007)
    Haughtvedt, C. P., Petty, R. E., and Cacioppo, J. T., “Need for cognition and advertising: Understanding the role of personality variables in consumer behavior,” Journal of Consumer Psychology, Vol. 1, No. 3, pp. 239-260 (1992)
    Hayduck, L., Structural equation modeling with LISREL, Johns Hopkings University Press, Baltimore, MD. (1987)
    Haythornthwaite, C., “Strong, weak, and latent ties and the impact of new media,” The Information Society, Vol. 18, No. 5, pp. 385-401 (2002)
    He, W., Qiao, Q., and Wei, K. K., “Social relationship and its role in knowledge management systems usage,” Information & Management, Vol. 46, No. 3, pp. 175-180 (2009)
    Herring, S. C., Scheidt, L. A., Wright, E., and Bonus, S., “Weblogs as bridging genre,” Information Technology & People, Vol. 18, No. 2, pp. 142–171 (2005)
    Homans, G. C., “Social behavior as exchange,” American Journal of Sociology, Vol. 63, No. 6, pp. 597-606 (1958)
    Homans, G. C., Social behavior, Harcourt Brace and World, New York. (1961)
    Horton, F. W., “Information literacy and information management: A 21st century paradigm partnership,” International Journal of Information Management, Vol. 26, No. 4, pp. 263-266 (2006)
    Hsu, C. L. and Lu, H. P., “Consumer behavior in online game communities: A motivational factor perspective,” Computers in Human Behavior, Vol. 23, No. 3, pp. 1642-1659 (2007)
    Hsu, M., Ju, T. L., Yen, C. H., and Chang, C. M., “Knowledge sharing behavior in virtual communities: the relationship between trust, self-efficacy, and outcome expectations,” International Journal of Human-computer Studies, Vol. 65, No. 2, pp. 153-169 (2007)
    Huang, M. H., “Pausal behavior of end-users in online searching,” Information Processing & Management, Vol. 39, No. 3, pp. 425-444 (2003)
    Huffaker, D. A. and Calvert, S. L., “Gender, identity, and language use in teenage blogs,” Journal of Computer-Mediated Communication, Vol. 10, No. 2, Article 1, retrieved from http://jcmc.indiana.edu/vol10/issue2/huffaker.html (2005)
    Huizingh, E. K., “The content and design of web sites: an empirical study,” Information & Management, Vol. 37, No. 3, pp. 123–134 (2000)
    Igbaria, M. and Iivari, J., “The effects of self-efficacy on computer usage,” Omega: International Journal of Management Science, Vol. 23, No. 6, pp. 587-605 (1995)
    Insightxplorer, “2010 Online behavior in Taiwan (In Chinese),” retrieved from http://www.insightxplorer.com/specialtopic/2010_03_19.htm (2010)
    Ip, R. K. F. and Wagner, C., “Weblogging: A study of social computing and its impact on organizations,” Decision Support Systems, Vol. 45, No. 2, pp. 242-250 (2008)
    Itin, C. M., “Reasserting the philosophy of experiential education as a vehicle for change in the 21st century,” The Journal of Experiential Education, Vol. 22, No. 2, pp. 91-98 (1999)
    Jackson, L. A., Ervin, K. S., Gardner, D., and Schmitt, N., “Gender and the Internet: Women communicating and men searching,” Sex Roles, Vol. 44, No. 5-6, pp. 363-379. (2001)
    Jacobs, R. S., Hyman, M. R., and McQuitty, S., “Exchange-specific self-disclosure, social self-disclosure, and personal selling,” Journal of Marketing Theory and Practice, Vol. 9, No. 1, pp. 48-62 (2001)
    Johnson, E. J., Bellman, S., and Lohse, J., “Cognitive lock-in and the power law of practice,” Journal of Marketing, Vol. 67, No. 2, pp. 62–75 (2003)
    Jones, S. and Fox, S., “Generations online in 2009,” The Pew Internet & American Life Project, retrieved http://www.pewinternet.org/Reports/2009/Generations-Online-in-2009.aspx (2009)
    Jung, T., Youn, M. A., and McClung, S., “Motivations and self-presentation strategies on Korean-based ‘Cyworld’ weblog format personal homepages,” CyberPsychology & Behavior, Vol. 10, No. 1, pp. 24-31 (2007)
    Karahanna, E., Straub, D. W., and Chervany, N. L., “Information technology adoption across time: across-sectional comparison of pre-adoption and post-adoption beliefs,” MIS Quarterly, Vol. 23, No. 2, pp.183-213 (1999)
    Kelleher, T. and Miller, B. M., “Organizational blogs and the human voice: Relational strategies and relational outcome,” Journal of Computer-Mediated communication, Vol. 11, No. 2, Article 1, retrieved from http://jcmc.indiana.edu/vol11/issue2/kelleher.html (2006)
    Kelman, H. C., “Compliance, identification, and internalization: Three processes of attitude change,” Journal of Conflict Resolution, Vol. 2, No. 1, pp. 51-60 (1958)
    Kelman, H. C., “Processes of opinion change,” Public Opinion Quarterly, Vol. 25, No. 1, pp. 57-78 (1961)
    Kim, D. Y., Lehto, X. Y., and Morrison, A. M., “Gender differences in online travel information search: Implications for marketing communications on the Internet,” Tourism Management, Vol. 28, No. 2, pp. 423-433 (2007)
    Kim, H. N., “The phenomenon of blogs and theoretical model of blog use in educational contexts,” Computers & Education, Vol. 51, No. 3, pp. 1342-1352 (2008)
    Kim, H. W., Chan, K.C., and Gupta, S., “Value-based adoption of mobile Internet: An empirical investigation,” Decision Support Systems, Vol.43, No. 1, pp. 111-126 (2007)
    Kling, R. and Courtright, C., “Group behavior and learning in electronic forums: a sociotechnical approach,” The Information Society, Vol. 19, No. 3, pp. 221-235 (2003)
    Koenig, M. E. D., “Knowledge management, user education, and librarianship,” Library Review, Vol. 52, No. 1, pp. 10-17 (2003)
    Koh, J. and Kim, Y. G., “Knowledge sharing in virtual communities: an e-business perspective,” Expert Systems with Applications, Vol. 26, No. 2, pp. 155-166 (2004)
    Kwekkeboom, K. L., “Outcome expectancy and success with cognitive-behavioral interventions: the case of guided imagery,” Oncology Nursing Forum, Vol. 28, No. 7, pp. 1125-1132 (2001)
    Kwon, S. D, Yang, H. D., Fang, H., and Ko, M. H., “An Empirical Study on Moderating Effects of Espoused National Cultural Values on Internet Community Stickiness,” Journal of Information Technology Applications & Management, Vol. 15, No. 3, pp. 169-194 (2008)
    Leary, M. R., Kelly, K. M., Cottrell, C. A., and Schreindorfer, L., “Individual differences in the need to belong: Mapping the nomological network,” Unpublished manuscript, Duke University, Department of Psychology. (2007)
    Lee, Y., Kozar, K, A., and Larsen, K. R. T., “The Technology Acceptance Model: Past, Present, and Future,” Communications of the Association for Information Systems, Vol. 12, No. 50, pp. 752-780 (2003).
    Lenhart, A. and Fox, S., “Bloggers,” The Pew Internet & American Life Project, retrieved from http://www.pewinternet.org/Reports/2006/Bloggers.aspx (2006)
    Lenhart, A., Arafeh, S., Smith, A., and Macgill, A. R., “Writing, technology and teens,” The Pew Internet & American Life Project, retrieved from http://www.pewinternet.org/Reports/2008/Writing-Technology-and-Teens.aspx (2008)
    Lenhart, A., Madden, M., Macgill, A. R., and Smith, A., “The use of social media gains a greater foothold in teen life as they embrace the conversational nature of interactive online media,” The Pew Internet & American Life Project, retrieved from http://www.pewinternet.org/Reports/2007/Teens-and-Social-Media.aspx (2007)
    Lenhart, A., Purcell, K., Smith, A., and Zickuhr, K., “Social media and mobile Internet use among teens and young adults,” The Pew Internet & American Life Project, retrieved from http://www.pewinternet.org/Reports/2010/ Social-Media-and-Young-Adults.aspx (2010)
    Levack, K., “Kinja: blogging blogs,” EContent, Vol. 27, No. 10, pp. 44-45 (2004)
    Lewis, W., Agarwal, R., and Sambamurthy, V., “Sources of influence on beliefs about information technology use: an empirical study of knowledge workers,” MIS Quarterly, Vol. 27, No. 4, pp. 657-678 (2003)
    Li, D., Browne, G. J., and Wetherbe, J. C., “Why do Internet users stick with a specific web site? A relationship perspective,” International Journal of Electronic Commerce, Vol. 10, No. 4, pp. 105-141 (2006)
    Liang, T. and Lai, H., “Effect of store design on consumer purchases: van empirical study of online bookstores,” Information & Management, Vol. 39, No. 6, pp. 431-444 (2002)
    Liebowitz, S. J. and Margolis, S. E., “Network externality: an uncommon tragedy,” Journal of Economic Perspectives, American Economic Association, Vol. 8, No. 2, pp. 133-50 (1994)
    Liker, J. K. and Sindi, A. A., “User acceptance of expert systems: a test of the theory of reasoned action,” Journal of Engineering and Technology Management, Vol. 14, No. 2, pp. 147-173 (1997)
    Lin, J. C. C., “Online stickiness: its antecedents and effect on purchasing intention,” Behaviour & Information Technology, Vol. 26, No. 6, pp.507-516 (2007)
    Lin, L., Hu, P. J. H., Sheng, O. R. L., and Lee J., “Is stickiness profitable for electronic retailers?” Communications of the ACM, Vol. 53, No. 3, pp. 132-136 (2010)
    Lou, H., Luo, W., and Strong, D., “Perceived critical mass effect on groupware acceptance,” European Journal of Information System, Vol. 9, No. 2, pp. 91-103 (2000)
    Lu, H. P. and Lin, J. C. C., “Predicting customer behavior in the market-space: a study of Rayport and Sviokla’s framework,” Information & Management, Vol. 40, No. 1, pp. 1-10 (2002)
    Ma, M. L. Y. and Leung, L., “Unwillingness-to-communicate, perceptions of the Internet and self-disclosure in ICQ,” Telematics and Informatics, Vol. 23, No. 1, pp. 22-37 (2006)
    Madden, M. and Jones, S., “Online activities at work and home,” The Pew Internet & American Life Project, retrieved from http://www.pewinternet.org/Reports/2008/Networked-Workers/5-Online-Activities-at-Work-and-Home/02-Nearly-one-in-five-employed-internet-users-use-instant-messaging-at-work.aspx (2008)
    Markus, M. J., “Toward a critical mass theory of interactive media,” In Fulk, J. and Steinfield, C. (Eds.), Organizations and Communication Technology, Sage, Newbury Park, pp. 194-218 (1990)
    Maslow, A., Motivation and personality, Harper and Row, New York. (1970).
    Mattila, A. S., “Emotional bonding and restaurant loyalty,” Cornell Hotel and Restaurant Administration Quarterly, Vol. 42, No. 6, pp. 73-9 (2001)
    McClea, M., Yen, D. C., and Huang, A., “An analytical study towards the development of a standardized IM application,” Computer Standards and Interfaces, Vol. 26, No. 4, pp. 343-355 (2004)
    McKenna, K. Y. A., Green, A. S., and Gleason, M. E. J., “Relationship formation on the Internet: What’s the big attraction?” Journal of Social Issues, Vol. 58, No. 1, pp. 9-31 (2002)
    Moon, J. W. and Kim Y. G., “Extending the TAM for a world-wide-web context,” Information & Management, Vol. 38, No. 4, pp. 217-230 (2001)
    Moore, G. C. and Benbasat, I., “Development of an instrument to measure the perceptions of adopting an information technology innovation,” Information Systems Research, Vol. 2, No. 3, pp. 173-191 (1991)
    Morahan-Martin, J. and Schumacher, P., “Loneliness and social uses of the Internet,” Computers in Human Behavior, Vol. 19, No. 6, pp. 659-671 (2003)
    Morahan-Martin, J., “The relationship between loneliness and Internet use and abuse,” Cyber Psychology and Behavior, Vol. 2, No. 5, pp. 431-440 (1999)
    Nahapiet, J. and Ghoshal, S., “Social capital, intellectual capital, and the organizational advantage,” The Academy of Management Review, Vol. 23, No. 2, pp. 242-266 (1998)
    Ngai, E. W. T., Poon, J. K. L., and Chan, Y. H. C., “Empirical examination of the adoption of WebCT using TAM,” Computers & Education, Vol. 48, No. 2, pp. 250-267 (2007)
    Nithya, H. M. and Julius, S., “Extroversion, neuroticism and self-concept: their impact on Internet users in India,” Computers in Human Behavior, Vol. 23, No. 3, pp. 1322-1328 (2007)
    Nunnally, J. C., Psychometric Theory, McGraw-Hill, New York. (1978)
    Oliver R. L., “A Cognitive Model of the Antecedents and Consequences of Satisfaction Decisions,” Journal of Marketing Research, Vol. 17, No.3, pp. 460-469 (1980)
    Oliver R. L., “Effect of expectation and disconfirmation on postexposure product evaluations - an alternative Interpretation,” Journal of Applied Psychology, Vol.62, No.4, pp. 480 (1977)
    Oliver, P. E. and Marwell, G., “Whatever happened to critical mass theory? a retrospective and assessment,” Sociological Theory, Vol. 19, No. 3, pp. 292-311 (2001)
    Oliver, P. E., Marwell, G., and Teixeira, R., “A theory of the critical mass: interdependence, group heterogeneity, and the production of collective action,” American Journal of Sociology, Vol. 91, No. 3, pp. 522-556 (1985)
    Olsen, S. O., “Repurchase loyalty: the role of involvement and satisfaction,” Psychology & Marketing, Vol. 24, No. 4, pp. 315-341 (2007)
    Orlikowski, W. J. and Robey, D., “Information technology and the structuring of organizations,” Information Systems Research, Vol. 2, No. 2, pp. 143-169 (1991)
    Palfai, T. P., “Positive outcome expectancies and smoking behavior: the role of expectancy accessibility,” Cognitive Therapy and Research, Vol. 26, No. 3, pp. 317-333 (2002)
    Park, C. W., and Lessing, V. P., “Students and housewives: differences in susceptibility to reference group influence,” Journal of Consumer Research, Vol. 4, No. 2, pp. 102-110 (1977)
    Park, S. Y., “An analysis of the technology acceptance model in understanding university students’ behavioral intention to use e-Learning,” Journal of Educational Technology & Society, Vol. 12, No, 3, pp. 150-162 (2009)
    Pearson, J. C., “The effects of setting and gender on self-disclosure,” Group & Organization Studies, Vol. 6, No. 3, pp. 334-340 (1981)
    Peplau, L. A., Russell, D., and Heim, M., “The experience of loneliness,” In Frieze, I., Bar-Tel, D., and Carroll J. (Eds.), New approaches to social problems, Jossey-Bass, San Francisco. (1979)
    Peterson, R. A., “On the use of college students in social science research: Insights from a second-order meta-analysis,” Journal of Consumer Research, Vol. 28, No. 3, pp. 450−461 (2001)
    Petrič, G., “Conceptualizing and measuring the social uses of the Internet: The case of personal web sites,” The Information Society, Vol. 22, No. 5, pp. 291-301 (2006)
    Philleo, T. J., “Visualizing the Internet: examining images constructed by beginning users,” Proceedings of the 27th Annual conference of the international visual literacy association, Chicago, IL. (1995)
    Pontiggia, A. and Virili, F., “Network effects in technology acceptance: Laboratory experimental evidence,” International Journal of Information Management, Vol. 30, No.1, pp. 68-77 (2010)
    Porter, L. V., Trammell, K. D. S., Chung, D., and Kim, E., “Blog power: Examining the effects of practitioner blog use on power in public relations,” Public Relations Review, Vol. 33, No. 1, pp. 92-95 (2007)
    Preece, J., “Sociability and usability in online communities: determining and measuring success,” Behaviour & Information Technology, Vol. 20, No. 5, pp. 347-356 (2001)
    Preece, J., Nonnecke, B., and Andrew, D., “The Top 5 Reasons For Lurking: Improving Community Experiences For Everyone,” Computers in Human Behavior, Vol. 20, No. 2, pp. 201-223 (2004)
    Premkumar, G. and Bhattacherjee, A., “Explaining information technology usage: a test of competing models,” Omega: International Journal of Management Science, Vol. 36, No. 1, pp. 64-75 (2008)
    Putnam, R., “Tuning in, tuning out: the strange disappearance of social capital in America,” Political Science and Politics, Vol. 28, No. 4, pp. 664-683 (1995)
    Rayport, J. F. and Sviokla, J. J., “Managing in the marketspace,” Harvard Business Review, Vol. 72, No. 6, pp. 142-150 (1994)
    Roca, J. C., Chiu, C. M. and Martínez, F. J., “Understanding e-learning continuance intention: An extension of the Technology Acceptance Model,” International Journal of Human-Computer Studies, Vol. 64, No. 9, pp. 683-696 (2006)
    Rogers, E. M., Diffusion of Innovations (4th ed), Free Press, New York. (1995)
    Salancik, G. R. and Pfeffer, J., “A social information processing approach to job attitudes and task design,” Administrative Science Quarterly, Vol. 23, No. 2, pp. 224-253 (1978)
    Sandars, J., “The potential of blogs and wikis in healthcare education,” Education for Primary Care, Vol. 18, No. 1, pp. 16-21 (2007)
    Sandra, A. V. and Prashant P., “The Social Influence Model of Technology Adoption,” Communications of the ACM, Vol. 53, No. 6, pp. 149-153 (2010)
    Sawyer, S., Allen, J. P., and Lee, H., “Broadband and mobile opportunities: a socio-technical perspective,” Journal of Information Technology, Vol. 18, No. 2, pp. 121-136 (2003)
    Schlachet, P., “The once and future group: Vicissitudes of belonging,” Group, Vol. 24, No. 2-3, pp. 123-440 (2000)
    Scott, J., “The measurement of information systems effectiveness: evaluation a measuring instrument,” Proceedings of the Fifteenth International Conference on Information Systems, Vancouver, BC, pp.111-128 (1994)
    Segrest, S. L., Domke-Damonte, D. J., Miles, A. K., and Anthony, W. P., “Following the crowd: social influences and technology usage,” Journal of Organizational Change Management, Vol. 11, No. 5, pp. 425-445 (1998)
    Seltzer, T. and Mitrook, M. A., “The dialogic potential of weblogs in relationship building,” Public Relations Review, Vol. 33, No. 2, pp. 227-229 (2007)
    Serenko, A., “A model of user adoption of interface agents for email notification,” Interacting with Computers, Vol. 20, No. 4-5, pp. 461-472 (2008)
    Shin, H. P., “Extended technology acceptance model of Internet utilization behavior,” Information & Management, Vol. 41, No. 6, pp. 719-729 (2004)
    Shiu, E., and Lenhart, A., “How Americans use instant messaging,” The Pew Internet & American Life Project, retrieved from http://www.pewinternet.org/Reports/2004/How-Americans-Use-Instant-Messaging.aspx (2004)
    Smith, S., “In search of the blog economy,” EContent, Vol. 28, No. 1, pp. 24-29 (2005).
    Soe, L. L. and Markus, M. L, “Technological or social utility? unraveling explanations of email, vmail, and fax use,” The Information Society, Vol. 9, No. 3, pp. 213–236 (1993)
    Strader, T. J., Ramaswami, S. N., and Houle, P. A., “Perceived network externalities and communication technology acceptance,” European Journal of Information Systems, Vol. 16, No. 1, pp.54-65 (2007)
    Straub, D., Limayem, M., and Karahanna-Evaristo, E., “Measuring System usage: Implications for IS theory testing,” Management Science, Vol. 41, No. 8, pp. 1328–1342 (1995)
    Sum, S., Mathews, R. M., Pourghasem, M., and Hughes, I., “Internet use as a predictor of sense of community in older people,” CyberPsychology & Behavior, Vol. 12, No. 2, pp. 235-239 (2009)
    Sweetser, K. D. and Metzgar, E., “Communicating during crisis: Use of blogs as a relationship management tool,” Public Relations Review, Vol. 33, No. 3, pp. 340-342 (2007)
    Szajna, B., “Empirical evaluation of the revised technology acceptance model,” Management Science, Vol. 42, No. 1, pp. 85–96 (1996)
    Taylor, S. and Todd, P., “Assessing IT usage: the role of prior experience,” MIS Quarterly, Vol. 19, No. 4, pp. 561-570 (1995)
    Teo, T, Lee, C. B., and Chai, C. S., “Understanding pre-service teachers' computer attitudes: applying and extending the technology acceptance model,” Journal of Computer Assisted Learning, Vol. 24, No. 2, pp. 128-143 (2008)
    Teo, T. S. H., Lim, V. K. G., and Lai, R. Y. C., “Intrinsic and extrinsic motivation in Internet usage,” Omega: International Journal of Management Science, Vol. 27, No. 1, pp. 127-145 (1999)
    Thompson, R. L., Higgins, C. A., and Howell, J. M., “Personal computing: Toward a conceptual model of utilization,” MIS Quarterly, Vol. 15, No. 1, pp. 124-143 (1991)
    Thorbjornsen, H. and Supphellen, M., “The impact of brand loyalty on website usage,” Journal of Brand Management, Vol. 11, No. 3, pp. 199-208 (2004)
    Toral, S. L., Barrero, F., and Martinez-Torres, M. R., “Analysis of utility and use of a web-based tool for digital signal processing teaching by means of a technological acceptance model,” Computers & Education, Vol. 49, No. 4, pp. 957-975 (2007)
    Tsai, H. T., Huang, H. C., Jaw, Y. L., and Chen, W. K., “Why on-line customers remain with a particular e-retailer: An integrative model and empirical evidence,” Psychology & Marketing, Vol. 23, No. 5, pp. 447-464 (2006)
    Tung, F. C., Lee, M. S., Chen, C. C., and Hsu, Y. S., “An extension of financial cost and TAM model with IDT for exploring users’ behavioral intentions to use the CRM information system,” Social Behavior & Personality: An International Journal, Vol. 37, No. 5, pp. 621-626 (2009)
    Tuten, T. L. and Bosnjak, M., “Understanding differences in web usage: The role of need for cognition and the five factor model of personality,” Social Behavior and Personality, Vol. 29, No. 4, pp. 391-398 (2001)
    Van der Heijden, H., “Factors influencing the usage of websites: The case of a generic portal in the Netherlands,” Information & Management, Vol. 40, No. 6, pp. 541-549 (2003)
    Van Slyke, C., Ilie, V., Lou, H., and Stafford, T., “Perceived critical mass and the adoption of a communication technology,” European Journal of Information Systems, Vol. 16, No. 4, pp. 270-283 (2007)
    Venkatesh, V. and Davis F. D., “A theoretical extension of the technology acceptance model: four longitudinal field studies,” Management Science, Vol. 46, No. 2, pp. 186-205 (2000)
    Venkatesh, V. and Morris M. G., “Why don’t men ever stop to ask for directions? Gender, social influence, and their role in technology acceptance and usage behavior,” MIS Quarterly, Vol. 24, No. 1, pp. 115-139 (2000)
    Venkatesh, V., Morris M., Davis G. B., and Davis F. D., “User acceptance of information technology: toward a unified view,” MIS Quarterly, Vol. 26, No. 4, pp. 425-478 (2003)
    Verplanken, B., Hazenberg, P. T., and Palenewen, G. R., “Need for cognition and external information search effort,” Journal of Research in Personality, Vol. 26, No. 2, pp. 128-136 (1992)
    Viégas, F. B., “Bloggers’ expectations of privacy and accountability: An initial survey,” Journal of Computer-Mediated Communication, Vol. 10, No. 3, article 12, retrieved from http://jcmc.indiana.edu/vol10/issue3/viegas.html (2005).
    Wagner, C. and Bolloju, N., “Supporting knowledge management in organizations with conversational technologies: discussion forums, weblogs, and wikis,” Journal of Database Management, Vol. 16, No.2, pp. 1-8 (2005)
    Wang, H. Y. and Wang, Y. S., “Gender differences in the perception and acceptance of online games,” British Journal of Educational Technology, Vol. 39, No. 5, pp. 787-806 (2008)
    Wang, K., Wang, E. T. G., and Tai, C. F., “A study of online auction sites in Taiwan: product, auction rule, and trading type,” International Journal of Information Management, Vol. 22, No. 2, pp. 127-142 (2002)
    Wang, Y. and Qualls, W., “Towards a theoretical model of technology adoption in hospitality organizations,” International Journal of Hospitality Management, Vol. 26, No. 3, pp. 560-573 (2007)
    Wang, Y. S., Wu, M. C., and Wang, H. Y., “Investigating the determinants and age and gender differences in the acceptance of mobile learning,” British Journal of Educational Technology, Vol. 40, No. 1, pp. 92-118 (2009)
    Wasserman, T., “Blogs cause word of mouth business to spread quickly,” Brandweek, Vol. 46, No. 35, pp. 9 (2005)
    Williamson, K., Lichtenstein, S., Sullivan, J., and Schauder, D., “To choose or not to choose: exploring Australians’ views about Internet banking,” International Journal of Technology and Human Interaction, Vol. 2, No. 4, pp. 17-33 (2006)
    Woo, H. L. and Wang, Q., “Using weblog to promote critical thinking – An exploratory study,” Proceedings of World Academy of Science: Engineering & Technology, Vol. 37, pp. 431-439 (2009)
    Worthy, M., Gary, A. L., and Kahn, C. M., “Self-disclosure as an exchange process,” Journal of Personality and Social Psychology, Vol. 13, No. 1, pp. 59-63 (1969)
    Yan, Z., “Age differences in children’s understanding of the complexity of the Internet,” Journal of Applied Developmental Psychology, Vol. 26, No. 4, pp. 385-396 (2005)
    Yoon, C. and Kim, S., “Convenience and TAM in a ubiquitous computing environment: the case of wireless LAN,” Electronic Commerce Research and Applications, Vol. 6, No. 1, pp. 102-112 (2007)
    Young, H. N., Lipowski, E. E., and Cline, R. J. W., “Using social cognitive theory to explain consumers’ behavioral intentions in response to direct-to-consumer prescription drug advertising,” Research in Social and Administrative Pharmacy, Vol. 1, No. 2, pp. 270-288 (2005)
    Young, K. S., “Internet addiction: the emergence of a new clinical disorder,” Cyberpsychology and Behavior, Vol. 1, No. 3, pp. 237–244 (1998)
    Yu, J., Ha, I., Choi, M., and Rho, J., “Extending the TAM for a t-commerce,” Information & Management, Vol. 42, No. 7, pp. 965-976 (2005)
    Yuen, A. H. K. and Ma, W. W. K., “Exploring teacher acceptance of e-learning technology,” Asia-Pacific Journal of Teacher Education, Vol. 36, No. 3, pp. 229-243 (2008)
    Zhang, N., Guo, X., and Chen, G., “IDT-TAM integrated model for IT adoption,” Tsinguha Science and Technology, Vol. 13, No. 3, pp. 306-311 (2008)
    Zott, C., Amit, R., and Donlevy, J., “Strategies for value creation in E-commerce: Best practice in Europe,” European Management Journal, Vol. 18, No. 5, pp. 463-475 (2000)
    Zviran, M., Glezer, C, and Avni, I., “User satisfaction from commercial web sites: the effect of design and use,” Information & Management, Vol. 43, No. 2, pp. 157-178 (2006)

    無法下載圖示 全文公開日期 2016/01/04 (校內網路)
    全文公開日期 本全文未授權公開 (校外網路)
    全文公開日期 本全文未授權公開 (國家圖書館:臺灣博碩士論文系統)
    QR CODE