透過您的圖書館登入
IP:3.137.41.53
  • 學位論文

運用整合性科技接受理論探討使用者對RFID食品追溯系統接受度

Investigating User's Acceptance Behavior on RFID Based Food Traceability System by UTAUT Model

指導教授 : 陳凱瀛

摘要


食品追溯系統,係指將食品相關生產履歷(包含生產、加工、流通、販售)資訊透明化,並應用RFID無線射頻辨識技術,允許消費者使用具RFID-tag讀取功能的相關行動設備,將食品生產流通資訊完整呈現,讓使用者對食品信賴度提升,並降低食品危害之風險,若發生無法預期之食品安全性事故時,透過追溯已記錄的產銷流通過程,可迅速回收,並容易探索其原因,避免有問題的產品繼續在市場上流通。本研究以整合性科技接受理論(UTAUT)模型為基礎,加入資訊品質變數,發展一組假說,採用問卷調查法收集資料,探討各個變數之間影響力是否顯著,研究結果發現,績效預期與付出預期皆會受資訊品質之影響,且行為意圖會受績效預期及配合設施所影響,而社會影響則不會對行為意圖造成顯著的影響效果。其次,沿用UTAUT模型中性別與年齡兩干擾變數,探討在行為意圖受績效預期影響之下,是否會受到性別與年齡之干擾,研究結果顯示,在行為意圖受績效預期影響下,性別與年齡皆產生顯著性影響。

並列摘要


Food traceability system, provides the ability to trace and follow the information about food, feed, food-producing animal or substance intended to be, or expected incorporated into a food or feed, through all stages of production, processing and distribution. The food traceability system can provide an efficient way to retrieve the questionable food; furthermore, it can also help the inspectors to identify the problems and rule out the questionable products. This study was developed to investigate the relationships among the six constructs: performance expectancy, effort expectancy, social influence, facilitating conditions, information quality, and behavioral intention, and how they influence the behavioral intention to adopt the RFID based food traceability system. The result shows that performance expectancy and effort expectancy were affected by information quality, and the influence of performance expectancy on behavioral intention is moderated by gender and age. Further, facilitating conditions have a significant influence on the behavioral intention.

並列關鍵字

RFID Food Traceability System UTAUT

參考文獻


[5] Allan B. Christensen, “Food Safety Manager White Paper UK,” Food Safety and Traceability, vol. 1, no. 1, 2007, pp. 1-25.
[7] Asif, Z. and Mandviwalla, M. (2005). Integrating the Supply Chain With RFID: A Technical and Business Analysis. Communications of the AIS, 15, pp. 393-427
[10] C.M. Roberts, “Radio frequency identification (RFID),” Computers & Security, vol.25, 2006, pp., 18-25.
[11] Davis, F. D., Bagozzi, R. P. and Warshaw, P. R. “User Acceptance of Computer Technology: A Comparison of Two Theoretical Models,” Management Science, vol. 35, no. 8, 1989, pp.982-1002.
[14] Etezadi-Amoli, J., and Farhoomand, A.F., “A structural model of end user computing satisfaction and user performance,” Information and Management, vol.30, no. 2, 1996, pp.65–73.

延伸閱讀