簡易檢索 / 詳目顯示

研究生: 楊浩政
Hao-Cheng Yang
論文名稱: 以計劃行為理論(TPB)探討人臉辨識系統應用於身分識別之使用行為
A Discourse on Identity Recognition through Application of Face Detection System -An application of the Theory of Planned Behavior
指導教授: 曾盛恕
Seng-Su Tsang
口試委員: 張譯尹
Yi-Ying Chang
陳家祥
Ja-Shen Chen
學位類別: 碩士
Master
系所名稱: 管理學院 - 管理研究所
Graduate Institute of Management
論文出版年: 2016
畢業學年度: 104
語文別: 中文
論文頁數: 60
中文關鍵詞: 計劃行為理論生物辨識技術人臉辨識便利價值信任與安全
外文關鍵詞: theory of planned behavior, biometric technology, face detection, convenience value, trust and security
相關次數: 點閱:288下載:0
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • 隨著科技發展日新月異,生物辨識技術的發展亦是一日千里,美國911恐怖攻擊後,生物辨識技術大量應用於反恐以及國境安全,人臉辨識技術亦應用於快速通關。本研究主要想探討一般大眾對於人臉辨識技術應用於一般企業管理之使用意願,透過計劃行為理論(TPB)作為研究架構,並加入便利價值、信任與安全性兩構面來發展研究量表。
    本研究以發放問卷方式進行,針對不同年齡層、性別、職業、年收入等對象,並使用偏最小平方分析法Smart PLS 來進行結構方程模型分析,評估使用者對使用人臉辨識技術的接受程度。
    結果顯示,影響人臉辨識技術之使用意願的五項因素裡(態度、主觀規範、知覺行為控制、便利價值及信任與安全性),其中態度與信任與安全性兩個構面,深深影響使用者之使用意願,因此,一般企業在應用人臉辨識技術於企業管理時,可著重於實質優惠回饋與資訊安全部分考量,強化使用者態度,並針對安全性及信任著手,來有效提升一般人民使用意願。


    With the progressive development of biometric technology, more and more application burst out due to its convenience and advantage. Since 911 terrorist attacks, many nations applied face detection technology in their boarding systems. During this study I would like to explore the general interest for face detection in identity of the daily access control, through theory of planned behavior (TPB) as a research framework, and convenience value as well as trust and security as facets in this research scale.
    This study is carrying on in questionnaire, for different ages, genders, occupations, the amount of income and other objects. Both partial least squares analysis and Smart PLS (Partial Least Squares, PLS) structures equation modeling analysis to evaluate users’ acceptance of face detection.
    I found that 5 factors which affect willingness to use face detection in daily access control are attitude, subjective norm, perceived behavioral control, convenience value, and trust and security. In addtion, attitude and confidence and security deeply affect the willingness of users, therefore, in the implementation of face detection in daily access control or further applications, administrative level of enterprises need to focus on offering substantive feedback and thinking of the information security, in order to enhance the user’s confidence. For promoting biometric technology, security and confidence are 2 key issues that would determine the public's willingness.

    目 錄 第一章 緒論 1 1.1 研究背景與動機 1 1.2 研究目的 4 1.3研究流程 7 第二章 文獻探討 9 2.1 生物辨識技術發展概況 9 2.2臉部辨識技術 19 2.3計劃行為理論 24 2.4 便利價值 28 2.5 信任與安全 30 第三章 研究設計與方法 35 3.1研究架構與變數定義 35 3.2資料分析方法 36 第四章 研究分析與結果 39 4.1描述性統計 39 4.2結構方程模式分析 42 第五章 結論與建議 48 5.1 結論 48 5.2 管理意涵 50 5.3未來研究方向與建議 52 第六章 參考資料 54 附錄 59 表目錄 v 圖目錄 vi 表目錄 表1、問卷構面定義 36 表2、描述性統計 39 表3、信效度分析表 44 表4、因素負荷量表 45 表5、相關分析表 46  圖目錄 圖1、入出境通關應用生物辨識科技示意圖 3 圖2、我國晶片護照 4 圖3、研究流程圖 8 圖4、2009各項生物辨識技術市占率 11 圖5、生物辨識技術營收預估額 12 圖6、臉部辨識操作示意圖 21 圖7、研究架構圖 35 圖8、路徑係數(t值)結果 47

    Ajzen, I. (1991). "The theory of planned behavior." Organizational behavior and human decision processes50(2): 179-211.
    Ajzen, I. and M. Fishbein (2000). "Attitudes and the attitude-behavior relation: Reasoned and automatic processes." European review of social psychology11(1): 1-33.
    Bolton, R. N. & J. H. Drew (1991). “A Multistage Model of Customer’s Assessments of Service Quality and Value,” Journal of Consumer Research, 17(4), 375-384.
    BOWMAN and ERIK, EVERYTHING YOU NEED TO KNOW ABOUT BIOMETRICS, http://www.ibia.org/ EverythingAboutBiometrics.PDF
    Butz, H. E. & L. D. Goodstein (1996). “Measuring Customer Value: Gaining the Strategic Advantage,” Organizational Dynamics, 24(3), 63-77.
    Cermak, D. S. P., K. M. File & R. A. Prince (1994). “Customer Participation in Service Specification and Delivery,” Journal of Applied Business, 10(2), 90-97.
    Clarke, Roger, Biometrics’ Inadequacies and Threats, and the Need for Regulation,http:// www.anu.edu.au/people/Roger.Clarke/DV/BiomThreats.html
    Cunningham, G. B. and H. Kwon (2003). "The theory of planned behaviour and intentions to attend a sport event." Sport Management Review6(2): 127-145.
    Deutsch, M. (1958). "TRUST AND SUSPICION." Journal of Conflict Resolution2(4): 265-279.
    Ennew, C. T. & M. R. Binks (1999). “Impact of Participative Service Relationships on Quality, Satisfaction and Retention: An Exploratory Study,” Journal of Business research, 46(2), 121-132.
    Fornell, C. and D. F. Larcker (1981). "Evaluating structural equation models with unobservable variables and measurement error." Journal of marketing research18(1): 39-50.
    Gefen, D., et al. (2003). "Trust and TAM in online shopping: an integrated model." MIS Quarterly27(1): 51-90.
    George Tomko, Biometrics as a Privacy—Enhancing Technology: Friend or Foe of Privacy, http://www.dss.state.ct.us/digital/tomko.htm
    Groth, M. (2005). “Customers as Good Soldiers: Examining Citizenship Behaviors in Internet Service Deliveries,” Journal of Management, 31(1), 7-27.
    Hinkin, T. R. (1998). "A brief tutorial on the development of measures for use in survey questionnaires." Organizational research methods1(1): 104-121.
    Holbrook, M. B. (1999). Introduce to Consumer Value. In M. B. Holbrook (ed.), Consumer Value: A Framework for Analysis and Research (pp.1-28). London: Routledge.
    Khalifa, A. S. (2004). “Customer Value: A Review of Recent Literature and An Integrative Configuration,” Management Decision, 42(5), 645-666.
    Lee, C. and R. T. Green (1991). "Cross-Cultural Examination of the Fishbein Behavioral Intentions Model." Journal of international business studies22(2): 289-305
    Luarn, P. and H.-H. Lin (2005). "Toward an understanding of the behavioral intention to use mobile banking." Computers in human behavior21(6): 873-891.
    Mayer, J. D. and G. Geher (1996). "Emotional intelligence and the identification of emotion." Intelligence22(2): 89-113.
    Mills, P. K., R. B. Chase, & N. Margulies (1983). “Motivating the Client/Employee System as a Service Production Strategy,” Academy of Management Review, 8(2), 301-310.
    Monroe, K. B. (1990). Pricing: Making profitable decisions (2nd ed.). New York: McGraw-Hill Pub.
    Oksana Hlodan, For Sale: Iceland’s Genetic History, http://www.actionbioscience.org/ genomic/hlodan.html
    Parasuraman, A., V. A. Zeithaml & L. L. Berry (1988). “SERVQUAL: A Multiple-Item Scale for Measuring Consumer Perceptions of Service Quality,” Journal of Retailing, 64(1), 12-40.
    Pura, M. (2005). “Linking Perceived Value and Loyalty in Location-Based Mobile Services,” Managing Service Quality, 15(6), 509-538.
    Schneider, B. & D. E. Bowen, (1995). Winning the Service Game. Boston, Harvard Business School Press.
    Singleton, Solveig(2004). "Privacy and Twenty-First Century Law Enforcement: Accountability for New Techniques." 30 OHIO N.U. L. REV.: 417, 435.
    Sweet, P. (2001). “Strategic Value Configuration Logics and the “New” Economy: A Service Economy Revolution?” International Journal of Service Industry Management, 12(1), 70-83.
    Zeithaml, V. A. (1988). “Consumer Perceptions of Price, Quality, and Value: A Means-End Model and Synthesis of Evidence,” Journal of Marketing, 52(3), 2-2
    王郁琦(2006),「生物辨識技術之運用對隱私權的影響」,《科技法學評論》3卷,頁49
    中華民國內政部(2000),「實施個人生物特徵蒐集對入出境通關查驗流程之影響」,http://www.immigration.gov.tw/public/Data/15411472171.pdf
    李永祥(2010),「臺灣科技大學學生參與超級籃球聯賽現場觀賞意圖之研究:計劃行為理論驗證」,《海峽兩岸體育研究學報》
    倚辰科技(2010),「2010 人臉辨識使用時間」
    張涵威(2016),「以計劃行為理論(TPB)探討電子身分識別使用行為意圖之研究」,國立台灣科技大學管理研究所碩士論文
    吳淑鶯、陳瑞和(2006),「計劃行為理論應用於網路書店購買行為之研究」,《中華管理評論國際學報》
    許鶴玲(2004),「虹膜辨識技術」,https://www.ctimes.com.tw/DispArt/tw/%E8%99%B9%E8%86%9C%E8%BE%A8%E8%AD%98/0403251710CI.shtml
    桓基科技股份有限公司,「影像辨識整合企業機密外洩防範新應用」,《中華民國資訊軟體協會》http://www.cisanet.org.tw/Services/eArticle_more?id=649
    黃淑琴、 蔡昭夆、陳姵君(2007),「從顧客面因素探討顧客參與健身服務對顧客價值影響之研究」,《兩岸企業經營管理論文集》
    黃雅詩,「明年全面換身分證捺指紋」,請參閱下列網站:http://intermargins.net/Forum/2001%20July-Dec/privacy/nation/na04.htm
    黃志璿(2003),「顧客價值、服務品質與顧客滿意之關係的實證研究-以便利商店連鎖加盟體系供應鏈為例」,樹德科技大學經營管理研究所碩士論文。
    維基百科,「生物辨識技術」,https://zh.wikipedia.org/wiki/%E8%BE%A8%E8%AD%98%E7%B3%BB%E7%B5%B1
    中時電子報,「指紋辨識落伍了  7大搶眼生物辨識技術」,http://www.chinatimes.com/realtimenews/20150321001416-260412
    台灣醒報,「NSA大量情蒐 臉部辨識以反恐」,https://tw.news.yahoo.com/nsa%E5%A4%A7%E9%87%8F%E6%83%85%E8%92%90-%E8%87%89%E9%83%A8%E8%BE%A8%E8%AD%98%E4%BB%A5%E5%8F%8D%E6%81%90-080513101.html
    Digitimes,「生物辨識技術各分類研究與發展分析」,
    http://www.digitimes.com.tw/tw/dt/n/shwnws.asp?CnlID=13&id=0000173793_P278NER583OOLF4QEUQ10&ct=1&PACKAGEID=3324&OneNewsPage=2&Page=1&query=#ixzz43WFAf0Nt.

    無法下載圖示 全文公開日期 2021/06/27 (校內網路)
    全文公開日期 本全文未授權公開 (校外網路)
    全文公開日期 本全文未授權公開 (國家圖書館:臺灣博碩士論文系統)
    QR CODE