簡易檢索 / 詳目顯示

研究生: 廖佳葳
Jia-Wei Liao
論文名稱: 影響企業信任數據銀行交易之因素探討
Exploring Trust Factors Affecting Enterprises to Using Personal Data Bank in Personal Data Markets
指導教授: 欒斌
Luarn Pin
口試委員: 陳正綱
Cheng-Kang Chen
欒斌
Luarn Pin
林鴻文
Hong-Wen Lin
學位類別: 碩士
Master
系所名稱: 管理學院 - 企業管理系
Department of Business Administration
論文出版年: 2023
畢業學年度: 111
語文別: 中文
論文頁數: 94
中文關鍵詞: 個人數據交易信任因素數據銀行
外文關鍵詞: personal data market, trust factors, data bank
相關次數: 點閱:178下載:0
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • 「數據是二十一世界的石油」,但數據與石油不同,數據可以被重複再利用,且數據不具有敵對性,對數據的使用者來說,多一個人使用並不會減損原使用者的滿足程度,換言之,個人數據具有巨大的商業價值。目前大量的個人數據掌握在科技平台手上,世界各國在個人隱私與資料自主權上紛紛抬頭,並從法律到政策推出相關計畫,在個人資料的使用與保障之間找到平衡。日本為擴大資料流通與價值,發展出以數據銀行為媒介的開放性的個人數據交易模式。本研究探討日本數據銀行的成因與運作模式,並且挖掘影響在台灣運作的企業使用數據銀行的信任因素。
    本研究以探索性研究,並對三位不同產業的企業主管進行深度訪談,以交易信任的四大面向:信任對方面向、基於控制機制的信任面向、感知收益面向、感知風險面向進行探討。
    研究發現,影響企業使用數據銀行的信任因素,在信任對方面向包含誠信、數據種類與信用紀錄;基於控制機制的信任包含第三方認證、合約、數據品質、數據來源可驗證、系統透明度、系統的可查核性、系統可運作、系統穩定性、系統易用性、系統安全性與法律;感知風險面向包含金錢損失、法律不完備、業務停擺、決策失誤、聲譽下降與交易糾紛;感知收益面向包含業績成果、法律風險下降、成本降低、聲譽、行銷成果、效益成果、優化服務與商品。此外,研究也顯示,相較於數據提供者,數據銀行本身的可信度對企業而言更具影響力。最後,本研究依據研究結果提出實務建議,以期能對台灣的數位發展有所助益。


    "Data is the oil of the 21st century". But data is different from oil, data is reusable and not hostile. From data users’ sentiment, increasing data users would not decrease the original users’ satisfaction, which referred to enormous commercial of data value. At present, abundant personal data is hold by technology platforms. However privacy and data autonomy are raised among development countries with relevant policy and laws launched in order to counterpoise usage and security of personal data. In Japan, personal data bank is developed to expand circulation and value of data for personal data market. This research aims to explore formation and operation pattern of Japanese personal data bank so as to find the trust factors which influence enterprises collaborate with data bank in Taiwan.
    This research is exploratory research of in-depth interviewing 3 different industries seniors according 4 dimension of transaction trust which is trust in the other party, trust in control mechanisms, potential gain and potential risk.
    The research find that trust factors which effect enterprise to use trust bank including honest, data type and credit record referred to trust in the other party; third party certification, contract, data quality, data resource verifiable, system transparent, system audit, system operation, system stability, ease use of system, system security and laws referred to trust in control mechanisms; monetary lost, incomplete law, affair halt, tactics mistaken, reputation decline and transaction dispute referred to potential risk; sales performance, declined risk of law, cost decline, reputation, marketing performance, benefits performance, and optimized services and products referred to potential gain. Further, the trustworthiness of data bank impact enterprises more than individuals who provide data. Finally, hopefully this research is worth improving digital development of Taiwan.

    摘要 I abstract II 謝誌 III 目錄 IV 圖目錄 VI 表目錄 VII 第一章 緒論 1 第一節 研究背景與動機 1 第二節 研究目的 2 第二章 文獻探討 3 第一節 數據銀行 3 第二節 信任 4 第三節 數位信任 10 第四節 線上交易信任 11 第三章 研究方法 19 第一節 研究流程 21 第二節 研究架構 22 第三節 研究對象 23 第四節 資料蒐集與分析 23 第四章 研究結果分析與討論 30 第一節 信任對方面向 30 第二節 基於控制機制的信任面向 34 第三節 感知風險面向 43 第四節 感知收益面向 48 第五節 其他因素-數據銀行 55 第六節 影響因素探討 57 第七節 企業角度探討 61 第五章 結論與建議 65 第一節 研究總結 65 第二節 研究建議 67 第三節 研究貢獻 69 第四節 研究限制與未來方向 70 文獻 72 中文資料 72 日文資料 72 英文資料 73 附錄一 77 附錄二 80

    中文資料
    [1] 王明禮(2019)。雙邊市場平台經濟之競爭法課題-以相關市場界定與自然獨占問題為核心。第24屆競爭政策與公平交易法學術研討會論文集。p.33-50。
    [2] 王文科、王智弘(2010)。質的研究的信度和效度。彰化師大教育學報。第17輯。P.29-50。https://libap.nhu.edu.tw:8081/Ejournal/AB08001703.pdf
    [3] 林淑馨(2010)。《質性研究理論與實務》。高雄:巨流。
    [4] 財團法人資訊工業策進會(2019)。My Data案例研析 https://www.trade.gov.tw/App_Ashx/File.ashx?FilePath=../Files/PageFile/686821/1080603_Mydata%E6%A1%88%E4%BE%8B%E7%A0%94%E6%9E%90.pdf
    [5] 張維安(2001)。社會鑲嵌與本土化研究-以關係網絡與經濟活動研究為例。教育與社會研究。第二期。P.67-90 。http://nhuir.nhu.edu.tw/retrieve/5795/5012000203.pdf
    [6] 鈕文英(2014)。質性研究方法與論文寫作。雙業書廊有限公司
    日文資料
    [1] 三菱UFJ信託銀行株式会(2018), 【DPRIME(ディープライム)】概要ご紹介資料, 社経営企画部, FinTech推進室
    [2] 川邊健太郎(2019), “Trusted Personal Data Management Service: TPDMS” Certification Program, https://www.tpdms.jp/file/20190927-1presentation.pdf
    [3] 大屋雄裕 (2018), 個人信用スコアの社会的意義, 情報通信政策研究 (Journal of information and communications policy) 2(2) , p. 15-26
    [4] 田中辰雄.(2021), 個人情報保護利活用仲介機構の構想─保護と利活用をともに実現するための提案─, 情報通信学会誌. 39巻2号, p. 27-44
    [5] 吉澤和弘(2018), 金融機関向けレンディングプラットフォーム提供に関する発表会, https://www.docomo.ne.jp/corporate/ir/binary/pdf/library/presentation/181017/new_product_presentation_181017_02.pdf
    [6] 佐藤友紀 & 砂田有史(2020), 情報銀行制度とその利用について, 情報の科学と技術(The journal of Information Science and Technology Association), 70(11), p. 546-551.
    [7] 日本IT団體聯盟(情報銀行推進委員会) (2021) , 「情報銀行」認定申請ガイドブックver. 2.1, 一般社団法人 日本IT団體聯盟, https://www.tpdms.jp/file/Guidebook_ver2.1.pdf
    [8] 三菱UFJ信託銀行株式会社•経営企画部・FinTech推進室(2018), 【DPRIME(ディープライム)】概要ご紹介資料, 三菱UFJ信託銀行, https://www.soumu.go.jp/main_content/000580624.pdf
    [9] 信朝裕行(2017), AI、IoT時代におけるデータ活用WG中間とりまとめに向けた論点(案) , 内閣官房IT総合戦略室, https://www.glocom.ac.jp/wp-content/uploads/2016/12/20170125mydata1_nobutomo.pdf
    [10] 城田真琴(2019), 情報銀行と信用スコアリングビジネスの展望, 株式会社野村総合研究所,デジタル基盤イノベーション本部, https://www.nri.com/-/media/Corporate/jp/Files/PDF/knowledge/report/cc/mediaforum/2019/forum274_1.pdf?la=ja-JP&hash=F1086FB861245DECA48C6394AC49F544070E6AF8
    [11] 総務省地域通信振興課(2022), 情報銀行の取組, デジタル企業行動室, https://www.soumu.go.jp/main_content/000791752.pdf
    [12] 情報信託機能の認定スキームの在り方に関する検討会(2019), 情報信託機能の認定スキームの在り方に関する検討会とりまとめ(案), 総務省, 第14回 , https://www.soumu.go.jp/main_content/000649193.pdf
    [13] 内閣官房情報通信技術(IT)総合戦略室, 官民データ活用推進基本法について, p. 1, https://www.kantei.go.jp/jp/singi/it2/senmon/dai9/siryou1.pdf
    英文資料
    [1] Abbadi, I. M., Alawneh, M. (2012). A Framework for establishing trust in the Cloud, Computers & Electrical Engineering, 38(5), 1073-1087.
    [2] Abbadi, I. M., & Martin, A. (2011). Trust in the Cloud. Information Security Technical Report, 16(3-4), 108–114.
    [3] Angeles, R., Corritore, C. L., Basu, S. C., & Nath, R. (2001). Success factors for domestic and international electronic data interchange (EDI) implementation for US firms. International Journal of Information Management, 21(5), 329–347.
    [4] Anderson, E., & Weitz, B. (19890). Determinants of continuity in conventional industrial channel dyads. Marketing Science, 8 (4), 310–323.
    [5] Artz, D., & Gil, Y. (2007). A survey of trust in computer science and the Semantic Web. Web Semantics: Science, Services and Agents on the World Wide Web, 5(2), 58–71.
    [6] Ben Saied, Y., Olivereau, A., Zeghlache, D., & Laurent, M. (2013). Trust management system design for the Internet of Things: A context-aware and multi-service approach. Computers & Security, 39, 351–365.
    [7] BCG (Boston Consulting Group) (2012). The Value of Our Digital Identity. USA: Liberty Global, Inc. http://www.libertyglobal.com/PDF/public-policy/The-Value-of-Our-Digital-Identity.pdf
    [8] Cho, J.H., Chan, K., & Adali, S. (2015). A Survey on Trust Modeling, ACM Computing Surveys, 48(2), 1–40.
    [9] Deutsch, M., 1958. Trust and suspicion. J. Conflict Resol. 2, 265–279. https://doi.org/10. 1177/002200275800200401.
    [10] Fortino, Giancarlo, Fotia, Lidia, Messina, Fabrizio, Rosaci, Domenico, Sarne, Giuseppe M.L., 2020. Trust and Reputation in the Internet of Things: State-of-the-Art and Research Challenges. IEEE Access 8, 60117–60125.
    [11] Fukuyama, F. (1995). Trust: The social virtues and the creation of prosperity. New York: Free Press.
    [12] Guo, J., Chen, I.-R., & Tsai, J. J. P. (2017). A survey of trust computation models for service management in internet of things systems. Computer Communications, 97, 1–14.
    [13] Gronroos, C. (1994). From marketing mix to relationship marketing: Towards a paradigm shift in marketing. Management Decision,32(2),4–20.
    [14] Grossklags, J., Acquisti, A. (2007). When 25 cents is too much: an experiment on willingness-to-sell and willingness-to-protect personal information. In: Proceedings of the Workshop on the Economics of Information Security Proceddings.
    [15] Hammi, M. T., Hammi, B., Bellot, P., & Serhrouchni, A. (2018). Bubbles of Trust: A decentralized blockchain-based authentication system for IoT. Computers & Security, 78, 126–142.
    [16] Kim, D., Song, Y., Braynov, S., & Rao, R. (2001). A B-to-C Trust Model for On-line Exchange.
    [17] Kim, D., Song, Y., Braynov, S., & Rao, H. (2001). A B-to-C trust model for on-line exchange. In Proceedings of Americas Conference on Information Systems (pp. 1–3), Boston, MA, USA.
    [18] KIM, Dan J.; FERRIN, Donald L.; and RAO, H. Raghav. A trust-based consumer decision-making model in electronic commerce: The role of trust, perceived risk, and their antecedents. (2008). Decision Support Systems. 44, (2), 544-564. Research Collection Lee Kong Chian School Of Business.
    [19] Kim, D. J., Song, Y. I., Braynov, S. B., & Rao, H. R. (2005). A multidimensional trust formation model in B-to-C e-commerce: a conceptual framework and content analyses of academia/practitioner perspectives. Decision Support Systems, 40(2), 143–165.
    [20] Kim, D. J., Ferrin, D. L. and Rao, H. R. (2008). A trust-based consumer decision-making model in electronic commerce: The role of trust, perceived risk, and their antecedents. Decision Support Systems, 44, p. 544–564.
    [21] Li, F., Pieńkowski, D., van Moorsel, A. & Smith, C. (2012). A Holistic Framework for Trust in Online Transactions. International Journal Of Management Reviews, 14(1), pp. 85-103.
    [22] Luhmann, N. (1979). Trust and Power, Chichester: John Wiley and Sons.
    [23] Malgieri, G., and Custers, B. (2018) Pricing privacy - the right to know the value of your personal data, Computer Law & Security Review, 34, 289-303
    [24] Mayer, R.C., Schoorman, F.D., & Davis, J. (1995). An integrative model of organizational trust. Academy of Management Review, 20(3), 709–734.
    [25] Mazurek, G., & Małagocka, K. (2019). What if you ask and they say yes? Consumers’ willingness to disclose personal data is stronger than you think. Business Horizons.
    [26] Möllering, G., (2001) ‘‘The nature of trust: From Georg Simmel to a theory of expectation, interpretation and suspension,’’ Sociology, vol. 35, no. 2, 403–420
    [27] Muir, B.M. (1994). Trust in automation part I: Theoretical issues in the study of trust and human intervention in automated systems. Ergonomics, 37(11), 1905–1922.
    [28] Nooteboom, B. (2000). Trust as a Governance Device, Cultural Factors in Economic Growth, 44-68
    [29] Ortega Egea, J. M., & Román González, M. V. (2011). Explaining physicians’ acceptance of EHCR systems: An extension of TAM with trust and risk factors. Computers in Human Behavior, 27(1), 319–332.
    [30] Pavlou, A.P., 2003. Consumer acceptance of electronic commerce: integrating trust and risk with the technology acceptance model. Int. J. Electron. Commer. 7, 101–134.
    [31] PENNINGTON, R., WILCOX, H. D., & GROVER, V. (2003). The Role of System Trust in Business-to-Consumer Transactions. Journal of Management Information Systems, 20(3), 197–226.
    [32] Ramchurn, S.D., Huynh, D. and Jennings N.R. (2004). Trust In Multi-Agent Systems. The Knowledge Engineering Review, 19(1), pp.1-25
    [33] Rousseau, D.M., Sitkin, S.B., Burt, R.S., & Camerer, C. (1998). Not so different after all: A cross-discipline view of trust. Academy of Management Review, 23(3), 393–404.
    [34] Ruotsalainen, P. S. (2017). Privacy, Trust and Security in Two-Sided Markets. E-Health Two-Sided Markets, 65–89.
    [35] Sako, M. (1992) "Price, Quality and Trust', Cambridge university press, pp.37-40.
    [36] Saunders, C., Wu, Y., Li, Y. & Weisfeld, S. (2004). Interorganizational trust in B2B relationships. Proceedings of the 6th international conference on Electronic commerce (ICEC '04).
    [37] Shapiro, D., Sheppard, B.H. and Cheraskin, L. (1992), “Business on a handshake”, The Negotiation Journal, October, pp. 365-78
    [38] Spiekermann, S., Böhme, R., Acquisti, A., & Hui, K.-L. (2015). Personal data markets. Electronic Markets, 25(2), 91–93.
    [39] Srinivasan, S. Role of trust in e-business success. Information Management and Computer Security, 12, 1, 2004, 66–72.
    [40] Ting, H. L. J., Kang, X., Li, T., Wang, H., & Chu, C.-K. (2021). On the Trust and Trust Modeling for the Future Fully-Connected Digital World: A Comprehensive Study. IEEE Access, 9, 106743–106783.
    [41] Widjaja, A. E., Chen, J. V., Sukoco, B. M., & Ha, Q.-A. (2018). Understanding Users’ Willingness to Put Their Personal Information on the Personal Cloud-Based Storage Applications: An Empirical Study. Computers in Human Behavior.
    [42] World Economic Forum. (2011). Personal Data: The Emergence of a New Asset Class. p.10
    [43] Wang, T., Wang, P., Cai, S., Zheng, X., Ma, Y., Jia, W., & Wang, G. (2021). Mobile edge-enabled trust evaluation for the Internet of Things. Information Fusion, 75, 90–100.
    [44] Yan, Z. & Holtmanns, S. (2008). Trtust Modeling and Management: From Social Trust to Digital Trust. Computer Security, Privacy and Politics: Current Issues, Challenges and Solution, P34.
    [45] Yu, Y., Tang, J., Hao, L., Dai, S., Wu, Y., 2008. A grid trust model based on MADM theory. In: IEEE GLOBECOM 2008 – 2008 IEEE Global Telecommunications Conference. IEEE, pp. 1–5.
    [46] Tan, Y.-H., & Thoen, W. (2002). Formal aspects of a generic model of trust for electronic commerce. Decision Support Systems, 33(3), 233–246.

    無法下載圖示
    全文公開日期 本全文未授權公開 (校外網路)

    QR CODE