簡易檢索 / 詳目顯示

研究生: 莊詒安
Yi-An Zhuang
論文名稱: 以路徑分析探討信任對消費者交付個資意圖之影響
Exploring the Impact of Trust on Customer Intention to Deliver Personal Data with Path Analysis
指導教授: 朱曉萍
Sheau-Pyng Ju
口試委員: 葉峻賓
Chun-Ping Yeh
盧智強
Chih-Chaing Lu
學位類別: 碩士
Master
系所名稱: 管理學院 - 科技管理研究所
Graduate Institute of Technology Management
論文出版年: 2022
畢業學年度: 110
語文別: 中文
論文頁數: 94
中文關鍵詞: 一般資料保護規則適足性認定消費者信任數位廣告平台
外文關鍵詞: GDPR, Adequacy Decision, Online Customer Trust, Digital Advertising Platform
相關次數: 點閱:184下載:0
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報

2018 年 5 月 25 日,歐盟正式實施一般資料保護規則(GDPR),嚴格規範企業蒐集
消費者個人資料之行為。倘若違反 GDPR,最高會以 2000 萬歐元,或該企業前一會
計年度全球營業額的 4%,2 項當中取高者做為罰金。只要與任何一個歐洲經濟區境
內居民或機構單位有個人資料的傳輸往來,皆有遵守 GDPR 之必要性。我國政府評
估與歐洲經濟區資料傳輸往來的頻率與需求量後,已於 2018 年著手進行個資法修
法,欲加入申請 GDPR 適足性認定之行列。數位廣告平台產業中如 Google、Meta、
Apple 等代表性企業,無不致力於開發能合法遵循 GDPR 條款的個資蒐集技術,然
而該等技術的蒐集效率仍無法媲美因運作模式不符 GDPR 規範,將逐漸被各國市場
淘汰的傳統 Cookie 技術。
本研究認為除了開發個資蒐集技術,升級資安維護系統之外,另一值得研究的應對
方法,是「建立消費者對企業的信任感,使其願意主動交付個資」。因此以因素分
析與路徑分析,探究感知安全性、感知開放性、感知隱私性、能力、正直、仁善,
6 個變數,是否對線上消費者信任產生正向影響,從而也對其交付個資予企業的意
願產生正向影響。並依據「感知安全性、正直、仁善對線上消費者信任產生正向影
響」,以及「線上消費者信任對消費者交付個資的意圖產生正向影響」之研究結果,
建議數位廣告平台經營者,可誠實公告平台資安檢驗結果,並定期彙整消費者產品
服務使用心得,向用戶說明將做出哪些調整,藉此實現「以消費者利益為優先」之
理念,建立消費者信任,使其願意主動交付個資予平台處理。


Since May 25, 2018, the European Union implemented the General Data Protection
Regulation (GDPR), which strictly regulates the collection of customers' personal data by enterprises. In the event of a violation of the GDPR, the maximum penalty will be 20 million euros, or 4% of the company's global turnover in the previous fiscal year, whichever is higher. As long as there is a transfer of personal data with any resident or institutional unit in the European Economic Area, there is a need to comply with the GDPR. After assessing the frequency and demand of data transmission with the European Economic Area, our government has begun to amend the personal information protection law in 2018, and intends to apply for GDPR adequacy certification. Representative companies in the digital advertising platform industry, such as Google, Meta, and Apple, are all committed to developing personal information collection technologies that can legally comply with GDPR terms. However,the collection efficiency of these technologies is still not comparable to the traditional “Cookie” technology, which has been gradually eliminated by the market of various countries.

This study believes that in addition to developing personal information collection
technologies and upgrading the information security maintenance system, another method worthy of study is to "build customer trust in enterprises and make them willing to proactively deliver personal information". Therefore, using the factor analysis and path analysis to explore whether the perceived security, perceived openness, perceived privacy, capability, integrity, benevolence, 6 variables have a positive impact on online customer trust, and thus also It has a positive impact on their willingness to deliver personal information to enterprises. Based on the research results of "perceived security, integrity, and benevolence have a positive impact on online customer trust" and "online customer trust has a positive impact on customers' intention to deliver personal information", it is recommended that digital advertising platforms can honestly announce the results of the platform’s information security inspections, and regularly summarize the customers' experience of using products and services, explaining to users what adjustments will be made, so as to realize the concept of “customer interests first”, build customer trust, and
make it is willing to actively deliver personal information to the platform for processing.

摘要 III 圖目錄 VIII 表目錄 IX 第壹章、 緒論 1 1.1 研究背景 1 1.2 研究動機 3 1.3 研究問題 4 1.4 研究目的 5 1.5 研究架構與流程 6 第貳章、 文獻回顧 8 2.1 信任 8 2.2 GDPR一般資料保護規則 13 2.3 GDPR重點詞彙定義 14 2.4 GDPR重點條款 15 2.5 GDPR具備的信任相關特性 17 2.6 我國申請GDPR適足性認定 20 2.7 數位廣告平台 25 2.8 數位廣告平台具備的信任相關特性 27 第參章、 研究設計 29 3.1 研究模型 29 3.2 研究方法 33 3.3 分析方法之相關指標介紹 34 3.4 研究假說 37 第肆章、 研究結果 39 4.1 資料蒐集方式與回收結果 39 4.2 資料分析結果 40 4.3 假說驗證結果 53 第伍章、 結論與建議 54 5.1 結論 54 5.2 對數位廣告平台的行動建議 56 5.3 研究限制 57 5.4 未來研究建議 58 參考文獻 59 附錄 69 附錄一、完整問卷發放過程 69 附錄二、第1版與第2版前測問卷內容 70 附錄三、正式版問卷內容 71 附錄四、正式版問卷完整分析圖表 78

Addis, M. C., & Kutar, M. (2018). The General Data Protection Regulation (GDPR),
emerging technologies and UK organizations: Awareness, implementation and
readiness. Proceedings of UK Academy for Information Systems Conference 2018, 29.
 Anderson JC, Narus JA. A model of the distributor Erm and manufacturer Erm working
partnership. JMK 1990;54:42–58.
 Atuahene-Gima Kwaku and Haiyang Li. 2002. "'When Does Trust Matter? Antecedents
and Contingent Effects of Supervisee Trust on Performance In Selling New Products in
China and the United States." Journal of Marketing 66 (July): 61-81.
 Bart, Y., Shankar, V., Sultan, F., & Urban, G. L. (2005). Are the drivers and role of
online trust the same for all web sites and consumers? A large-scale exploratory
empirical study. Journal of Marketing, 69(4), 133-152.
 Beldad, A., De Jong, M., & Steehouder, M. (2010). How shall I trust the faceless and
the intangible? A literature review on the antecedents of online trust. Computers in
Human Behavior, 26(5), 857-869.
 Bianchi, C., & Andrews, L. (2012). Risk, trust, and consumer online purchasing
behavior: A Chilean perspective. International Marketing Review, 29(3), 253-275.
 Bjerkens, G., Dahlbohm, B., & Mathiassen, P. (1990). Organizational competence in
system development: A Scandinavian contribution. Lund: Student Literature.
 Blau PM. Exchange and power in social life. New York: Wiley; 1964.
 Boban, M. (2018a). Cyber security foundations for compliance within GDPR for
business information systems. Proceedings of the 35th International Scientific
Conference on Economic and Social Development – Sustainability from an Economic
and Social Perspective, 541-553. Varazdin, Croatia.
60
 Boerman, S.C., Kruikemeier, S. and Zuiderveen Borgesius, F.J. (2017), “Online
behavioral advertising: a literature review and research agenda”, Journal of Advertising,
Vol. 46 No. 3, pp. 363-376.
 Bojang, I. (2017). Determinants of trust in B2C e-commerce and their relationship with
consumer online trust: A case of Ekaterinburg, Russian Federation. Journal of Internet
Banking and Commerce 22(8), 1-59.
 Brettel, M., Reich, J.C., Gavilanes, J.M. and Flatten, T.C. (2015), “What drives
advertising success on Facebook? An advertising-effectiveness model: measuring the
effects on sales of ‘likes’ and other social-network stimuli”, Journal of Advertising
Research, Vol. 55 No. 2, pp. 162-175.
 Butler, Jr, J. K. (1991). Toward understanding and measuring conditions of trust:
Evolution of a conditions of trust inventory. Journal of Management, 17(3), 643-663.
 C. Flavian, M. Guinaliu, Consumer trust, perceived security and privacy policy: three
basic elements of loyalty to a web site, Industrial Management & Data Systems 106
(2006) 601–620.
 Caillaud, B., & Jullien, B. (2003). Chicken & egg: Competition among intermediation
service providers. RAND Journal of Economics, 34(2), 309–328.
 Chang, Y., & Fang, S. (2013). Antecedents and distinctions between online trust and
distrust: Predicting high- and low-risk Internet behaviors. Journal of Electronic
Commerce Research, 14(2), 149-166.
 Chen, Y. H., & Barnes, S. (2007). Initial trust and online buyer behavior. Industrial
Management & Data Systems, 107(1), 21-36.
 Ciriani, S. (2015). The economic impact of the European reform of data protection.
Communications & Strategies, (97), 41-58.
61
 Colquitt, J.A., Scott, B.A. and LePine, J.A. (2007), “Trust, trustworthiness, and trust
propensity: a meta-analytic test of their unique relationships with risk taking and job
performance”, Journal of Applied Psychology, Vol. 92 No. 4, pp. 909-927.
 Comrey, A. L. (1973). A first course in factor analysis. New York, NY: Academic Press.
 Corritore, C. L., Kracher, B., & Wiedenbeck, S. (2003). On-line trust: Concepts,
evolving themes, a model. International Journal of Human-Computer Studies, 58(6),
737-758.
 Crawford, L. (2005). Senior management perceptions of project management
competence. International Journal of Project Management, 23(1), 7–16.
 Das, T. K., & Teng, B. (2004). The risk-based view of trust: A conceptual framework.
Journal of Business and Psychology, 19(1), 85-116.
 David Gefena, Detmar W. Straub.(2004). Consumer trust in B2C e-Commerce and the
importance of social presence: experiments in e-Products and e-Services, The
International Journal of Management Science, 32(1), 407-424.
 Davis, F. D., Bagozzi, R. P., & Warshaw, P. R. (1989). User acceptance of computer
technology: a comparison of two theoretical models. Management Science, 35(8), 982-
1003.
 Davis, R., Sajtos, L., & Chaudhri, A. A. (2011). Do consumers trust mobile service
advertising? Contemporary Management Research, 7(4), 245-269.
 Dinev, T., Xu, H., Smith, J. H., & Hart, P. (2013). Information privacy and correlates:
An empirical attempt to bridge and distinguish privacy-related concepts. European
Journal of Information Systems, 22(3), 295–316.jang
 Doney, Patricia M. and Joseph P. Cannon. 1997. "An Examination of the Nature of
Trust in Buyer-Seller Relationships?' Journal of Marketing 61 (2): 35-51.
62
 Eisenmann, T.R., Parker, G., and Van Alstyne, M.W. 2009. "Opening Platforms: How
When and Why?," in Platforms, Markets and Innovation, A. Gawer (ed.). Cheltenham:
Edward Elgar, pp. 131-162
 EUR-Lex. (2019). Regulation (EU) 2016/679 of the European Parliament and of the
Council of 27 April 2016. Retrieved from https://eur-lex.europa.eu/legalcontent/EN/TXT/HTML/?uri=CELEX:32016R0679&from=EN#d1e1384-1-1
 European Commission. (2019a). A new era for data protection in the EU: What changes
after May 2018. Retrieved from https://ec.europa.eu/commission/sites/betapolitical/files/dataprotection-factsheet-changes_en.pdf
 European Commission. (2019c) The GDPR: New opportunities, new obligations.
Retrieved from https://ec.europa.eu/commission/sites/beta-political/files/dataprotection-factsheet-sme-obligations_en.pdf
 Fornell, C., & Larcker, D. F. (1981). Evaluating structural equation models with
unobservable variables and measurement error. Journal of Marketing Research, 18(1),
39-50.
 Ganesan, Shankar. 1994. "Determinants of Long-Term Orientation in Buyer-Seller
Relationships." Journal of Marketing 58 (April): 1-19.
 Gaski, J. F., & Nevin, J. R. (1985). The differential effects of exercised and unexercised
power sources in a marketing channel. Journal of Marketing Research, 22(2), 130-142.
 Gefen D, Silver M. Lessons learned from the successful adoption of an ERP system. In:
Proceedings of Fifth International Conference of the Decision Sciences Institute (DSI),
Athens, Greece, 1999, Published, pp. 1054–7.
 Gefen D. Tutorial assessing unidimensionality through LISREL: an explanation and
example. Communications of The Association for Information Systems 2003;12(2):1–
26.
63
 Gefen, D., Rao, V. S., & Tractinsky, N. (2003b). The conceptualization of trust, risk and
their relationship in electronic commerce: The need for clarifications. Proceedings of
the 36th Hawaii International Conference on System Sciences.
 Giffin K. The contribution of studies of source credibility to a theory of interpersonal
trust in the communication process. Psychological Bulletin 1967;68(2):104–20.
 Guillaume Mercier,Ghislain Deslandes.(2019). Formal and Informal Benevolence
in a Proft-Oriented Context. Journal of Business Ethics 165:125–143
 H.H. Chang, S.W. Chen, Consumer perception of interface quality, security, and loyalty
in electronic commerce, Information & Management 46 (7) (2009) 411–417.
 Harman, H. H. (1976). Modern factor analysis. Chicago: University Of Chicago Press.
 Hart P, Saunders C. Power and trust: critical factors in the adoption and use of electronic
data interchange. Organizational Science 1997;8(1):23–42.
 Hartono, E.; Holsapple, C.W.; Kim, K.Y.; Na, K.S.; Simpson, J.T. Measuring perceived
security in B2C electronic commerce website usage: A respecification and validation.
Decis. Support Syst. 2014, 62, 11–21.
 Hunter, L. M., Kasouf, C. J., Celuch, K. G., & Curry, K. A. (2004). A classification of
business to-business buying decisions: Risk importance and probability as a framework
for e business benefits. Industrial Marketing Management, 33(2), 145-154.
 Jarvenpaa SL, Knoll K, Leidner DE. Is anybody out there? Antecedents of trust in
global virtual teams. Journal of Management Information Systems 1998;14(4):29–64.
 Jarvenpaa, Sirkka L., Kathleen Knoll, and Dorothy E. Leidner. 1998. "Is Anybody Out
There? Antecedents of Trust in Global Virtual Teams." Journal of Management
Information Systems 14 (4): 29-64.
64
 Kim, C., Tao, W., Shin, N. and Kim, K.S. (2010), “An empirical study of customers’
perceptions of security and trust in e-payment systems”, Electronic Commerce
Research and Applications, Vol. 9 No. 1, pp. 84-95.
 Kloftsen, M. (1992). Tidiga utvecklingsprocesser i tekniskbaserade företag,
Dissertation, Department of Management and Economics.
 Knoll, D.L. and Gill, H. (2011), “Antecedents of trust in supervisors, subordinates, and
peers”, Journal of Managerial Psychology, Vol. 26 No. 4, pp. 313-330.
 Koehn, D. (2003). The nature of and conditions for online trust. Journal of Business
Ethics, 43(1/2), 3-19.
 Korsgaard MA, Schweiger DM, Sapienza HJ. Building commitment, attachment, and
trust in strategic decision-making teams: the role of procedural justice. AMA
1995;38(1):60–4.
 Koufaris, M., & Hampton-Sosa, W. (2004). The development of initial trust in an online
company by new customers. Information & Management, 41(3), 377-397.
 L. Liu, C. Li, S.J. Karau, A measurement model of trust in Internet stores, 2nd
International Conference on Electronic Business, 2002, Taipei, Taiwan.
 La Porte, T., M., Demchak, C. C., & De Jong, M. (2002). Democracy and bureaucracy
in the age of the web: Empirical findings and theoretical speculations. Administration
& Society, 34(4), 411-446.
 Lee, M. K., & Turban, E. (2001). A trust model for consumer Internet shopping.
International Journal of Electronic Commerce, 6(1), 75-91.
 Luhmann N. Trust and power. London: Wiley; 1979
 Luhmann, N. 1995. "Social Systems." Stanford: Stanford University Press.
65
 M.M. Yenisey, A.A. Ozok, G. Salvendy, Perceived security determinants in ecommerce
among Turkish university students, Behaviour & Information Technology 24 (2005)
259–274.
 Mayer RC, Davis JH, Schoorman FD. An integration model of organizational trust.
AMR 1995;20(3):709–34.
 Mayer, R. C., Davis, J. H., & Schoorman, F. D. (1995). An integrative model of
organizational trust. Academy of Management Review, 20(3), 709-734.
 Mayer, R.C., Davis, J.H. and Schoorman, F.D. (1995), “An integrative model of
organizational trust”, Academy of Management Review, Vol. 20 No. 3, pp. 709-734.
 McKnight, D. H., & Chervany, N. L. (2001). What trust means in e-commerce customer
relationships: An interdisciplinary conceptual typology. International Journal of
Electronic Commerce, 6(2), 35-59
 McKnight, D.H., Choudhury, V., Kacmar, C., 2002. Developing and validating trust
measures for e-commerce: an integrative typology. Information Systems Research 3 (3),
334–359.
 Medina, R., & Medina, A. (2015). The competence loop: Competence management in
knowledge-intensive, project-intensive organizations. International Journal of
Managing Projects in Business, 8(2), 279–299.
 Michele Sinico. (2021). Perceived security: An experimental study of security doors.
Safety Science 139 (2021) 105252.
 Moorman C, Deshpande R, Zaltman G. Factors aNecting trust in market research
relationships. JMK 1993;57:81–101.
 Mukherjee, A., & Nath, P. (2007). Role of electronic trust in online retailing. European
Journal of Marketing, 41(9), 1173-1202.
 Multivariate Data Analysis (6th ed.). New York: Macmillan.
66
 Ong, C., & Lin, Y. (2015). Security, risk, and trust in individuals' internet banking
adoption: An integrated model. International Journal of Electronic Commerce Studies,
6(2), 343-355.
 Palanski, M.E. and Yammarino, F.J. (2011), “Impact of behavioural integrity on
follower job performance: a three-study examination”, The Leadership Quarterly, Vol.
22 No. 1, pp. 765-786.
 Palanski, M.E. and Yammarino, F.J. (2011), “Impact of behavioural integrity on
follower job performance: a three-study examination”, The Leadership Quarterly, Vol.
22 No. 1, pp. 765-786.
 Panayiotis.(2017). GDPR Impact on Digital Marketing. Positive or Negative
transformation? , European University Cyprus, Thesis Project
 Pavlou, P. A. (2003). Consumer acceptance of electronic commerce: Integrating trust
and risk with the technology acceptance model. International Journal of Electronic
Commerce, 7(3), 101-134.
 Peikari, H.R. (2010), “A study on the interrelations between the security-related
antecedents of customers’ online trust”, Proceedings of the sixth International
Conference Global Security, Safety, and Sustainability, ICGS3 2010, Braga, Portugal,
September 1-3, pp. 139-148.
 Ramaswami SN, Srinivasan SS, Gorton SA. Information asymmetry between
salesperson and supervisor: postulates from agency and social exchange theories. JPN
1997;17(3):29 –50.
 Reichheld FF, Schefter P. E-loyalty: your secret weapon on the web. Harvard Business
Review 2000;78:105–13.
 Ridings C, Gefen D. The development of trust in online communities. In: Proceedings
of International Resource Management Association International Conference (IRMA),
Toronto, Ontario, Canada, 2001, Published. pp. 374–7.
67
 Rotter JB. Generalized expectancies for interpersonal trust. American Psychologist
1971;26:443–50.
 Rousseau, D. M., Sitkin, S. B., Burt, R. S., & Camerer, C. (1998). Not so different after
all: A cross-discipline view of trust. The Academy of Management Review, 23(3), 393-
404.
 Shapiro, Debra, B. Blair Sheppard, and Lisa Cheraskin 1992 ‘Business on a handshake’.
Negotiation Journal 8: 365–377.
 Spagnoletti, P., Resca, A., and Lee, G. (2015). A Design Theory for Digital Platforms
Supporting Online Communities: A Multiple Case Study, Journal of Information
Technology 30: 364–380.
 Sudman, S. (1976). Applyied sampling. New York: Academic Press.
 Szulanski, Gabriel, Roseela Cappetta, and Robert J. Jensen 2004 ‘When and how
trustworthiness matters: Knowledge transfer and the moderating effect of causal
ambiguity’. Organization Science 15/5: 600–613.
 T.C.E. Cheng, D.Y.C. Lam, A.C.L. Yeung, Adoption of Internet banking: an empirical
study in Hong Kong, Decision Support Systems 42 (2006) 1558–1572.
 Van Aswegen, A.S. and Engelbrecht, A.S. (2009), “The relationship between
transformational leadership, integrity and an ethical climate in organisations”, SA
Journal of Human Resource Management, Vol. 7 No. 1, pp. 221-229.
 W.D. Salisbury, R.A. Pearson, A.W. Pearson, D.W. Miller, Perceived security and
World Wide Web purchase intention, Industrial Management & Data Systems 101
(2001) 165–176.
 Wachter, S. (2018). Normative challenges of identification in the Internet of Things:
Privacy, profiling, discrimination, and the GDPR. Computer Law & Security Review,
34(3), 436- 449.
68
 Wu, G., Hu, X., & Wu, Y. (2010). Effects of perceived interactivity, perceived web
assurance and disposition to trust on initial online trust. Journal of Computer-Mediated
Communication, 16(1), 1-26.
 X. Fang, S. Chan, J. Brzezinski, S. Xu, Moderating effects of task type on wireless
technology acceptance, Journal of Management Information Systems 22 (2005–2006)
123–157.
 Yoon, S. J. (2002). The antecedents and consequences of trust in online-purchase
decisions. Journal of Interactive Marketing, 16(2), 47-63.
 Zhang, J., Hassandoust, F., & Williams, J. E. (2020). Online Customer Trust in the
Context of the General Data Protection Regulation (GDPR), Pacific Asia Journal of the
Association for Information Systems, 12(1), 86-122.
 Zunko, I. M. (2017). EU personal data protection rules for digital age. Proceedings of
the 22nd International Scientific Conference on Economic and Social Development,
57-66.
 永 析 統 計 諮 詢 .(2020). 因 素 分 析 - 因 素 負 荷 量 之 標 準 . Retrieved from
https://www.yongxi-stat.com/factor-loading/
 永析統計諮詢.(2020). 線性回歸分析、結構方程模型和偏最小平方法之比較.
Retrieved from https://www.yongxi-stat.com/sem-pls/
 永析統計 諮 詢 .(2019). 收 斂 效 度 與 區 別 效 度 之 評 估 標 準 . Retrieved from
https://www.yongxi-stat.com/validity/
 全國法規資料庫.(2015).個人資料保護法
 全國法規資料庫.(2016).個人資料保護法規施行細則
 邱皓政.(2008).潛在類別模式:原理與技術
 廖淑君.(2020). 論我國因應 GDPR 施行之措施-以個人資料之跨境傳輸為核心
議題. 商業法律與財金期刊 第 3 卷第 1 期,115-140

無法下載圖示 全文公開日期 2025/08/30 (校內網路)
全文公開日期 本全文未授權公開 (校外網路)
全文公開日期 2025/08/30 (國家圖書館:臺灣博碩士論文系統)
QR CODE