用户名: 密码: 验证码:
移动支付消费者感知风险评价研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
在移动商务环境中,移动运营商和服务提供商开发出种类繁多的服务,移动支付作为一种新兴支付工具,推动了一种全新的支付理念和潮流的发展,其所具有的高效、快捷、无处不在的运行特征提升了移动商务业务服务质量和水平。然而,Gartner公司2011年的统计数据显示:虽然移动支付市场规模和用户绝对数量有很快的增长,但目前使用移动支付的用户比例还比较低。众多研究者认为,消费者感知风险是影响消费者接受和使用移动支付的关键因素,因而消费者感知风险的研究引起企业界和学术界的广泛关注。虽然从上个世纪60年代就有学者展开了对消费者感知风险的相关研究,但由于感知风险概念体系所具有的复杂性,该领域许多问题亟待解决,如感知风险的度量理论需要进一步扩展,有必要基于消费者购买决策过程对消费者感知风险作用机理和动态变化特征以及评价方法进行以系统全面地研究,并提供实证检验等等。
     本文以移动支付为研究对象,构建了基于风险偏好的移动支付消费者行为意向研究模型,移动商务消费者感知风险管理模型、描述消费者购买决策过程、支付模式以及消费者感知风险因素相互影响作用的研究模型,移动支付消费者感知风险评价模型,展开对移动支付消费者感知风险作用机理、度量理论以及评价方法的研究,主要内容如下:
     首先,以典型的电子钱包移动支付模式为原型,对移动支付系统的体系架构、业务流程和关键技术进行了分析和阐述,明确了研究对象的概念特征,为后续研究奠定技术基础。接着,基于感知风险理论和技术接受模型,从个体消费者视角构建了基于消费者风险偏好的移动支付消费者使用行为意向模型,利用结构方程模型方法对模型进行检验,实证分析结果表明:消费者感知风险对移动支付行为意向有着显著影响,而消费者风险偏好并不显著影响移动支付的消费者行为意向;基于实证研究结果,引进主观概率和效用函数分析工具,以基本假设为前提条件,本文提出了基于风险偏好的消费者感知风险度量模型,对感知风险的基本度量理论进行了扩展。
     其次,基于权变理论和消费者购买决策理论,并结合风险管理的基本观点,构建了移动商务消费者感知风险管理模型,为移动支付消费者感知风险作用机理的实证研究奠定基础。并在此基础上,构建了描述消费者购买决策过程、支付模式以及消费者感知风险因素相互影响作用的研究模型,开展对消费者感知风险的动态变化和作用机理的实证分析,提出研究假设并设计感知风险测量量表;并运用方差分析、逐步回归分析等统计方法证实了消费者感知风险在支付决策不同阶段中的动态变化和影响作用关系。
     最后,根据上一阶段的研究成果和现有文献对移动支付消费者感知风险因素的研究成果为基础,构建了移动支付消费者感知风险评价指标体系,并基于模糊数学理论和实证研究方法,展开对移动支付消费者感知风险的评价模型研究;并采用模糊关系方程确定感知风险各级评价指标的权重,运用模糊综合评价法对感知风险进行综合评价,并通过应用实例对评价模型进行了检验。
On the environment of the mobile business, operators and service providers havedeveloped a wide range of mobile services, as an emerging payment instruments, themode of mobile payment has promoted a new payment concept and the trend ofdevelopment, the efficient, fast and ubiquitous runtime features which enhance the qualityand level of the mobile commerce business services are important advantages of mobilepayment. However, the data of Gartner's2011statistics show that although the market sizeand the absolute number of users of mobile payment have a fast growth, but the proportionof the quantity of users which use mobile payment service is still low relatively. Manyresearchers believe that the consumer’s perceived risk is a key factor which affectsconsumer’s acceptance and use of mobile payment, thus the study on consumer’sperceived risk become a widespread concern of the business community and academia.From the60’s of the last century, scholars had carried out a series of researches onconsumers' perceived risk. Because of the complexity of the concept system on theperceived risk field, there are many problems to be solved, such as the perception measuretheory on the consumer’s perceived risk needs to be extended, it is necessary to carry outthe evaluation research on consumer’s perceived risk and so on.
     Based on the research object of mobile payment, this paper constructs a series ofresearch models which include the model of the consumer’s behavior intention on mobilepayment based on the risk appetite, the model of the consumer’s perceived riskmanagement on mobile commerce, the model which describe the Logical relationship ofthe consumer’s purchase decision-making process, the mode of payment and consumer’sperceived risk factors to the action mechanism, metric theory and evaluating method ofconsumers' perceived risk of the mobile payment. The main contents of this paper are asfollows:
     Firstly, this paper takes a typical e-wallet mobile payment as the prototype mode andelaborates the architecture, business process and key technologies of the mobile paymentsystem. On this basis, aimed to the individual consumer, this paper constructs a researchmodel of behavioral intention of the mobile payment and put forward the correspondingresearch hypotheses based on consumers' personal risk appetite and perceived risktheoretical framework. The empirical results indicate that perceived risk has positiverelationship to the behavioral intention of the mobile payment, but consumers’ personal risk appetite has no significant impact on the attitude and behavioral intention. On thebasis of empirical research, this paper put forward a series of basic assumptions and has aresearch on the metric methods and model of consumer’s perceived risk of mobilepayment based on expected utility theory.
     Secondly, based on the contingency theory and consumer’s purchase decision theory,the study build a management model of mobile commerce consumer’s perceive risk.Through the guidance of the management model, this paper aims to investigate thevariation of perceived risk through the purchase decision-making process and impactdifference on each factor of perceived risk between mobile and online payment. Anresearch model is constructed based on the theory of purchase process and perceived riskand a series of hypotheses are proposed, the empirical results reveal that the level ofperceived risk is higher for mobile payment than for online payment to ticket orderingservices and a major finding is that there is a significant difference on impact of factor riskin various stages of consumer’s purchase process, the results laid the foundation for theevaluation of the perceived risk.
     Finally, according to Preliminary research results the research results existing onconsumer’s perceived risk of the mobile payment, this paper builds an evaluation indexsystem of the perceived risk. Based on the fuzzy mathematical theory and empiricalresearch method, the research constructs an evaluation model of consumer’s perceived riskof mobile payment which uses the fuzzy relation equations to determine Index weightsand uses the fuzzy comprehensive evaluation method to conduct a comprehensiveevaluation of the perceived risk.
引文
[1] Mitchell, V.W. Consumer perceived risk: conceptualizations and models [J].European Journal of Marketing,1999,33(2):163-95.
    [2] Mathias K. Who do you trust? Beyond encryption, secure e-business [J]. DecisionSupport Systems,2001,31(3):293-301.
    [3] World wide Mobile Market Forecasts.Portio Research, www.portioresearch.com.
    [4] Yung-Fu Chang and C.S. Chen.Smart phone-the choice of client platform formobile commerce [J]. Computer Standards&Interfaces,2005,27(2):329-336.
    [5] Bunduchi, R. Business relationships in internet-based electronic markets: the roleof goodwill trust and transaction costs [J]. Information Systems Journal,2005,15(5):321-341.
    [6] Gan Z.B, Li Y.J, Xiao G.Q, Wei D.W. A novel reputation computing model formobile agent-based e-commerce systems [C], Proceedings of the secondinternational conference on information security and assurance,2008,236-250.
    [7] Filipe J, Marca D,A, Shishkov B, VanSinderen M.Barriers to mobile bankingadoption-A cross-national study [C]. Proceedings of the international conferenceon e-business,2008,300-306.
    [8] Vance A, Elie-Dit-Cosaque C, Straub D.W. Examining trust in informationtechnology artifacts: The effects of system quality and culture [J], Journal ofmanagement information systems,2008,24(4):73-100.
    [9]2009-2012年中国3G产业投资分析及前景预测报告[R/OL],(2012-04-18)http://www.ocn.com.cn.
    [10] Coursaris, C., Hassanein, K. Understanding m-commerce [J]. Quarterly Journal ofElectronic Commerce,2002,3(3):247-271.
    [11] Clarke, V. Emerging value propositions for m-commerce [J]. Journal of BusinessStrategies,2001(2):133-148.
    [12] Stuart J. Barnes, The mobile commerce value chain: analysis and futuredevelopments [J]. International journal of information management,2002,22(2):91-108.
    [13] CNNIC.第29次中国互联网发展状况统计报告[R/OL],(2012-01-16),www.cnnic.net.cn.
    [14] Ghosh, A. K., Swaminatha, T. M. Software security and privacy risks in mobilee-commerce [J].Communications of the ACM,2001,44(2):51-57.
    [15] B nes, E., Hasvold, P., Henriksen, E., et al. Risk analysis of information security ina mobile instant messaging and presence system for healthcare [J]. InternationalJournal of Medical Informatics,2006,6(2):1-11.
    [16] Lin, H.H., Wang, Y.S. An examination of the determinants of customer loyalty inmobile commerce contexts [J]. Information&Management,2006,43:271–282.
    [17] Chu, Y. and L. Huang. Mobile Business Applications Adoption Model Based on theConcepts of Task/Technology Fit [C]. International Conference on ServicesSystems and Services Management (ICSSSM05),2005, Chongqing, China.
    [18] Nysveen, H., Pedersen, P. E.,&Thorbj rnsen, H. Explaining intention to usemobile chat services: moderating effects of gender [J]. Journal of ConsumerMarketing.2005,22(5):247-256.
    [19] Luarn, P., Lin H. H. Toward an understanding of the behavioral intention to usemobile banking [J]. Computers in Human Behavior.2005,21(6):873-891.
    [20] Lai, T. L. Service Quality and Perceived Value's Impact on Satisfaction, Intentionand Usage of Short Message Service (SMS)[J]. Information Systems Frontiers,2004,6(4):353-368.
    [21] Wu, J. H., Wang, S. C. What drives mobile commerce? An empirical evaluation ofthe revised technology acceptance model [J]. Information&Management,2005,42(5):719-729.
    [22] Wang, Y., Liao, Y. The conceptualization and measurement of m-commerce usersatisfaction [J]. Computers in Human Behavior,2007,23(1):381-398.
    [23] Shevchenko, A. An Overview of Mobile Device Security.http://www.viruslist.com/en/analysis? pubid=170773606,2005.
    [24] Barber, R. Security in a mobile world is bluetooth the answer?[J].Computers&Security,2000,19(4):321-325.
    [25] Schwiderski-Grosche, S. and Knospe, H. Secure Mobile Commerce [J]. Electronics&Communication Engineering Journal,2002.14(5):228–238.
    [26]724Solutions.(2001). Commerce goes mobile. San Francisco:724Solutions Inc.
    [27] Datamonitor.(2000). US mobile market worth USD1.2billion by2005.http://www.datamonitor.com/press/, accessed28August2000.
    [28] S. Webster, R. Watson, Analyzing the past to prepare for the future: writing aliterature review [J], MIS Quarterly,2002,26(2): xiii-xxiii.
    [29] Stuart J.Barnes.The mobile commerce value chain: analysis and futuredevelopments [J], Internation journal of information management,2002,22(2):91-108.
    [30] Johan Lembke. Mobile commerce and the creation of a marketplace.2002.
    [31] Franz Buellingen, Martin Woerter. Development perspectives, firm strategies andapplications in mobile commerce [J], Journal of business research,2004,57(12):1402-1408.
    [32] Julian L.Hunter. M-commerce: Reality behind the Hype [M].2002.
    [33] Ying-Feng Kuo.3G telecommunication operator’s challenges and roles: Aperspective of mobile commerce value chain [M].2005.
    [34] Ofir Turel. User acceptance of wireless short messaging services: Deconstructingperceived value [J], Information&Management,2007,44(1):63-73.
    [35] Bauer, R.A.Consumer Behavior as Risk Taking, Dynamic Marketing for AChanging World [C], R. S. Handcock, Chicago, AMA Proceedings,1960,389-98.
    [36] Kogan, N. and Wallach, M.A. Risk Taking, A Study in Cognition and Personality[M], Holt, Rinehart and Winston, New York, NY,1964.
    [37] Kogan, N. and Wallach, M.A. Group risk taking as a function of members’ anxietyand defensiveness levels [J]. Journal of Personality,1969,35(1):50-63.
    [38] Pollatsck, A. and Tversky, A. A Theory of risk [J]. Journal of MathematicalPsychology,1970,7(3):40-53.
    [39] Rapoport, A. and Wallsten, T.S. Individual decision behavior [J]. Annual Review ofPsychology,1972,23(12):131-76.
    [40] MacCrimmon, K.R. and Wehrung, D.A.Taking Risks: The Management ofUncertainty [M]. The Free Press, New York, NY,1986.
    [41] Cox, D.F., and Rich, S. Perceived Risk and Consumer Decision Making-The Caseof Telephone Shopping [J], Journal of Marketing Research,1964,32-9.
    [42] Cox, D.F.Risk Handling in Consumer Behavior-An Intensive Study of Two Cases[M],1967,34-81.
    [43] Bettman, J.R., Methods for Analyzing Consumer Information Processing Models[C].Proceedings of the2nd Annual Conference, Association for ConsumerResearch,1971,197-207.
    [44] Bonama, J.R. and Johnston, W.J. Decision making under uncertainty: a directmeasurement approach [J]. Journal of Consumer Research,1979,6(3):77-91.
    [45] Currim, I.S. and Sarin, R.K. A Procedure for measuring and estimating consumerpreference under uncertainty [J].Journal of Marketing Research,1983,20(11):49-56.
    [46] Hauser, J.R. and Urban, G.L. Assessment of attribute importances and consumerutility functions: Von Neumann-Morgenstern theory applied to consumer behavior[J]. Journal of Consumer Research,1979,5(4):251-62.
    [47] Stone, R.N, Winter, F.W. Risk: is it still uncertainty times consequences?[C].Proceedings of the American Marketing Association, Winter Educators conference,1987, Chicago, IL.
    [48] Cox, D.F.(ed.). Risk Taking and Information Handling in Consumer Behavior [M].Boston, Harvard, University Press,1967.
    [49] Roselius, T.R.Consumer Rankings of Risk Reduction Methods [J].Journal ofMarketing,1971,56-61.
    [50] Jacoby, J. and Kaplan, L.B.The Components ofPerceived Risk [C]. Proceedings ofthe3rd Annual conference, Association for Consumer Research,1972,382-93.
    [51] Stone, R.N and Gronhaug, K. Perceived risk: further considerations for themarketing discipline [J].European Journal of Marketing,1993,27(3):39-50.
    [52] Jarvenpaa, S.L. and Todd, P.A. Consumer reactions to electronic shopping on theworld wide web [J].International Journal of Electronic Commerce,1997,1(2):59-88.
    [53] Mowen A.J, Williams D.R.Differences between rail-trail users and general trailusers of a national recreation area [D].1995Northeastern Recreation ResearchSymposium, Apr09-11,1995New York state pks management&Res inst,Saratoga springs, NY.
    [54] Hofacker, C, Murphy, J, Mizerski, R.Primacy and recency effects on clickingbehavior [J].Journal of computer-mediated communication,2006,11(2):87-103.
    [55] Sandra. Comment on: F. Sandra et al. The role of MDM2in the proliferativeactivity of ameloblastoma [J].Oral Oncology,2002,38(2):153-157.
    [56] Pavlou, P.A. Consumer acceptance of electronic commerce: Integrating trust andrisk with the technology acceptance model [J].International journal of electroniccommerce,2008,7(3):101-134.
    [57] Zeithaml, V.A. and Bitner, M.J. Services Marketing: Integrating Customer Focusacross the Firm [M]. McGraw-Hill, New York, NY,2003.
    [58] Ellen Garbarino, Michal,Strahilevitz.Gender differences in the perceived risk ofbuying online and the effects of receiving a site recommendation [J].Journal ofBusiness Research,2004,57(7):768-775.
    [59] Cunningham, S. The Major Dimensions of Perceived Risk, Risk Taking andInformation Handling in Consumer Behavior [M].Boston, Harvard UniversityPress,1967.
    [60] Barach, J. Advertising Effectiveness and Risk in the Consumer Decision Process[J].Journal of Marketing Research,1969,6(8):314-320.
    [61] Perry, M. and Hamm, B.C. Canonical Analysis of Relations BetweenSocioeconomic Risk and Personal Influence in Purchase Decisions [J].Journal ofMarketing Research,1968,351-354.
    [62] Deering, J., and Jacoby, J. Risk Enhancement and Risk Reduction as Strategies forHandling Perceived Risk [C].Proceedings of the3rd Annual Conference,Association for Consumer Research,1972,401-416.
    [63] Greatorex, M, Mitchell, V.M. Developing the perceived risk concept: emergingissues in marketing [J].Proceedings of the Marketing Education Group Conference,Loughborough,1993,405-415.
    [64] Barach, J.A.Advertising Effectiveness and Risk in the Consumer Decision Process[J].Journal of Marketing Research, August1969,314-20.
    [65] Arndt, J. Word of Mouth Advertising and Informal Communication [J].op. cit.,1967,188-239.
    [66] Cunningham, S.Perceived Risk as a Factor in Product Oriented Word of MouthBehavior: A First Step [C].Reflections on Progress in Marketing Proceedings,1964Educational Conference AMA, ed. L.G. Smith,1965,229-238.
    [67] Tan, S.J, Leong, W.Y, Warranty strategy: a solution to hybrid product woes?[J].International marketing review,1999,16(1):40-64.
    [68] Vanden Heuvel, J.P,Davis, J.W. Molecular approaches to identify exposure and riskto specific environmental pollutants [J].Biomarkers,1999,4(2):93-105.
    [69] Anne, P.R. Phase II trial of subcutaneous amifostine in patients undergoingradiation therapy for head and neck cancer [J]. Seminars in oncology,2002,29(6):80-83.
    [70] Blackwell, R.D., Miniard, P.W. and Engel, J.F. Consumer Behavior [M].Harcourt,Orlando, FL,2003.
    [71] Hawkins, D.I., Coney, K.A. and Best, R.J. Consumer Behavior: BuildingMarketing Strategy [M].Irwin, Chicago, IL,2003.
    [72] Charles Comegys, Mika Hannula, Jaani Váisánen.Longitudinal comparison ofFinnish and US online shopping behavior among university students: Thefive-stage buying decision process [J]. Journal of Targeting, Measurement andAnalysis for Marketing,2006,14(4):336-340.
    [73] K Douglas Hoffman, L W Turley.Atmospherics, service encounters and consumerdecision making: An integrative perspective [J]. Journal of Marketing Theory andPractice,2002,10(3):33-38.
    [74] Belch, G.E., Belch, M.A. and Ceresino, G. Parental and teenage child influences infamily decision making [J]. Journal of Business Research,1985,13(2):163-176.
    [75] Foxman, E.R., Tansuhaj, P.S. and Ekstro¨m, K.M. Family members’ perceptions ofadolescents’ influence in family decision making [J].Journal of Consumer Research,1989,3:482-491.
    [76] Caruana, A. and Vassallo, R. Children’s perception of their influence overpurchases: the role of parental communication patterns [J].Journal of ConsumerMarketing,2003,20(1):55-66.
    [77] Lee, C.K.C. and Beatty, S.E. Family structure and influence in familydecision-making [J].Journal of Consumer Marketing,2002,19(1):24-41.
    [78] Jensen, J.M. Family decision making–a buying centre approach [D].doctoraldissertation, University of Southern Denmark, Odense (143pages in Danish,seven-page English summary),1990.
    [79] Gredal, K. Purchasing behaviour in households, in Kjer-Hansen, M.(Ed.),Readings in Danish Theory of Marketing, Einar Harcks Forlag, Copenhagen,1966,84-100.
    [80] Wind, Y. Preference of relevant others and individual choice models [J].Journal ofConsumer Research,1976,3(6):50-57.
    [81] Maria Ku¨mpel N rgaard, Karen Bruns, Pia Haudrup Christensen and MiguelRomero Mikkelsen. Children’s influence on and participation in the family decisionprocess during food buying [M].Q Emerald Group Publishing Limited,2007,197-216.
    [82] Patton, W., Puto, C. and King, R. Which buying decision are made by individualsand not by groups?[J]. Industrial Marketing Management,1986,15(2):129-138.
    [83] Lynn, S. Identifying buying influences for a professional service: implications formarketing efforts [J].Industrial Marketing Management,1987,16(5):119-30.
    [84] McQuiston, D. Novelty, complexity and importance as causal determinants ofindustrial buyer behavior [J]. Journal of Marketing,1989,53(11):66-79.
    [85] Robinson, P., Faris, C. and Wind, Y. Industrial Buying and creative marketing,Allyn and Bacon [M].Boston, MA,1967.
    [86] McQuiston, D. and Dickson, P. The effect perceived personal consequences onparticipation and influence in organizational buying [J].Journal of BusinessResearch,1991,23(9):159-77.
    [87] McQuiston, D. and Anderson, R. Personal stake as a causal determinant ofinfluence tactics in industrial buying [C]. Proceedings of Academy of MarketingScience Annual Conference, Nashville TN, June1994,1-39.
    [88] Dawes, P., Dowling, G. and Patterson, P. Factors affecting the structure of buyingcenters for the purchase of professional business advisory services [J].InternationalJournal of Research in Marketing,1992,9(8):269-279.
    [89] M. Jose Garrido-Samaniego and Jesus Gutierrez-Cillan. Determinants of influenceand participation in the buying center [D]. An analysis of Spanish industrialcompanies,2004.
    [90] Naumann, E., Lincoln, D. and McWillians, R. the purchase of components:functional areas of influence [J]. Industrial Marketing Management,1984,13(9):186-90.
    [91] Dowling, G.R. and Staelin, R. A model of perceived risk and intended risk-handlingactivity [J]. Journal of Consumer Research,1994,21(7):119-134.
    [92] Murray, K.B. A test of service marketing theory: consumer information acquisitionactivities [J]. Journal of Marketing,1991,55(12):10-25.
    [93] Murray, K.B. and Schlater, J.L. The impact of services versus goods on consumers’assessment of perceived risk [J].Journal of the Academy of Marketing Science,1990,18(1):51-65.
    [94] Boustani, M; Gruber-Baldini, AL; Zimmerman, S, et al.Behavioral problems inresidential care/assisted living (RC/AL) facilities: Prevalence and potential riskfactors [J].American journal of geriatrif psychiatry,2002,10(2):109-119.
    [95] Forsythe, S. and Shi, B. Consumer patronage and risk perceptions in internetshopping [J].Journal of Business Research,2003,56(14):867-875.
    [96] Bitner, M.J. Self-service technologies: what do customers expect?[J].MarketingManagement,2001,10(11):34-42.
    [97] Meuter, M.L., Ostorm, A.L., Roundtree, R.I and Bitner, M.J. Self-Servicetechnologies: understanding customer satisfaction with technology-based serviceencounters [J].Journal of Marketing,2000,64(7):50-64.
    [98] Cases, A. Perceived risk and risk-reduction strategies in internet shopping[J].International Review of Retail, Distribution and Consumer Research,2002,12(4):375-94.
    [99] Jarvenpaa, S.L. and Todd, P.A. Consumer reactions to electronic shopping on theworld wide web [J]. International Journal of Electronic Commerce,1997,1(2):59-88.
    [100] Liebermann, Y. and Stashevsky, S. Perceived risk as barriers to internet ande-commerce usage [J].Qualitative Market Research: An International Journal,2002,5(4):291-300.
    [101] Lim, N. Consumer perceived risk: sources versus consequences [J].ElectronicConsumer Research and Applications,2003,2(8):216-28.
    [102] Tan, S.J. Strategies for reducing consumers’ risk aversion in internet shopping[J].Journal of consumer Marketing,1999,16(2):163-80.
    [103] Vijayasarathy, L.R. and Jones, J.M. Print and internet catalog shopping: assessingattitudes and intentions [J].Internet Research: Electronic Networking Applicationsand Policy,2000,10(3):191-198.
    [104]朱阁,敖山,戴建华,李忱.手机移动支付的价值接受度模型及实证[J].北京信息科技大学学报(自然科学版),2011,(1):42-48.
    [105]段钢,蒋杉杉,唐芙蓉.移动支付使用意向影响因素的实证研究[J].价值工程,2010,(31):206-207.
    [106] Zhou, T. The effect of initial trust on user adoption of mobile payment[J].Information Development,2011,27(4):290-300.
    [107] Dan, L, Jing, Z. TAM-based Study on Factors Influencing the Adoption of MobilePayment [J].China Communications,2011).8(3):198-204.
    [108] Schierz, P.G, Schilke, O, Wirtz, B.W. Understanding consumer acceptance ofmobile payment services: An empirical analysis [J].Electronic Commerce Researchand Applications,2010,9(3):209-216.
    [109] Shin, D.H. Modeling the Interaction of Users and Mobile Payment System:Conceptual Framework [J].International journal of human-computer interaction,2010,26(10):917-940.
    [110] Mallat, N. Exploring consumer adoption of mobile payments-A qualitative study[J].Journal of strategic information systems,2007,16(4):413-432.
    [111] S. Karnouskos, A. Hondroudaki, V.A.B. Rsik, Security, trust and privacy in thesecure mobile payment service [C]. Proceedings of the third InternationalConference on Mobile Business (ICMB), New York, USA, July12–13,2004.
    [112] S. Misra, N. Wickamasinghe. Security of a mobile transaction: a trust model [J].Electronic Commerce Research,2004,4(4):359–372.
    [113] S. Nambiar, C, T. Lu, L. Liang. Analysis of payment transaction security in mobilecommerce [C]. Proceedings of the IEEE International Conference on InformationReuse and Integration, Las Vegas, NV, USA, November1–3,2004.
    [114] Bottoni, A. and G. Dini. Improving authentication of remote card transactions withmobile personal trusted devices [J]. Computer Communications,2007,30(8):1697-1712.
    [115] G. Me, M.A. Strangio. EC-PAY: an efficient and secure ECC-based wireless localpayment scheme [C]. Proceedings of the Third IEEE International Conference onInformation Technology and Applications, Sydney, Australia, July4–7,2005.
    [116] Critchlow, D. and N. Zhang. Security enhanced accountable anonymous PKIcertificates for mobile e-commerce [J]. Computer Networks,2004,45(4):483-503.
    [117] Rossnagel, H. and J. Muntermann. Introducing Sim-Based Security Tokens asEnabling Technology for Mobile Real-Time Services. Identity and Privacy in theInternet Age [C]. Proceedings. A. Josang, T. Maseng and S. J. Knapskog. Berlin,Springer-Verlag Berlin.5838:163-178,2009.
    [118] J.J. Chen, C. Adams, Short-range wireless technologies with mobile paymentssystems [C].Proceedings of the Sixth International Conference on ElectronicCommerce (ICEC), Delft, The Netherlands, October25–27,ACM InternationalConference Proceeding Series, vol.60, ACM Press, New York, NY, USA,2004.
    [119] S. Pradhan, E. Lawrence, A. Zmijewska, Bluetooth as an enabling technology inmobile transactions [C].Proceedings of the IEEE International Conference onInformation Technology: Coding and Computing (ITCC), Las Vegas, NV, USA,April4–6,2005.
    [120] A. Zmijewska, Evaluating wireless technologies in mobile payments–a customercentric approach [C]. Proceedings of the Fourth International Conference onMobile Business (ICMB), Sydney, Australia, July11–13,2005.
    [121] Kahneman D, Tversky A. Prospect theory: Analysis of decision under risk [J].Econometric,1979,47(2):263-291.
    [122] Leslie E, Palich D, Ray Bagby. Using cognitive theory to explain entrepreneurialrisk–taking: challenging conventional wisdom [J]. Journal of Business Venturing,1995,10(6):425-430.
    [123] Lopes L L. Between hope and fear: The psychology of risk [J].Advances inExperimental Social Psychology,1987,(20):255-295.
    [124] Cunningham, S.,“The Major Dimensions of Perceived Risk”, Risk Taking andInformation Handling in Consumer Behavior [M], Boston, Harvard UniversityPress,1967,82-108.
    [125] Von Neumann J, Morgenstern O. The theory of games and economic behavior[M].Princeton: Princeton University Press,1947.
    [126] Arrow K J. Social Choice and Individual Values [M].2nd edition. New Haven: YaleUniversity Press,1963.
    [127] Pratt J W. Risk aversion in the small and the large [J]. Econometric,1964,(32):122-136.
    [128] Goldberg L R, Johnson J A, Eber H W, Hogan R, Ashton M C, Cloninger C R,Gough H C. The International Personality Item Pool and the Future ofPublic-Domain Personality Measures [J].Journal of Research in Personality,2006,40(1):84-96.
    [129] Golubin A Y. Pareto-optimal insurance policies in the models with a premiumbased on the actuarial value [J]. Journal of Risk and Insurance,2006,73(8):469-487.
    [130] Kahneman D, Tversky A. Prospect theory: Analysis of decision under risk [J].Econometric,1979,47(2):263-291.
    [131] Dahlberg T, Mallat N, rni A. Trust enhanced technology acceptance model-consumer acceptance of mobile payment solutions [C]. Proceedings of theStockholm Mobility Round table, Stockholm. May,2003.
    [132] Hsee C K, Weber E U.A fundamental predication error: Self-others discrepancies inrisk preference [J].Journal of Experimental Psychology: General,1997,126(1):45-53.
    [133] Sitkin, Sim B, Pablo, Amy L. Reconceptualizing the determinants of risk behavior[J]. Academy of Management Review,1992,17(1):9-38.
    [134] Leslie E, Palich D, Ray Bagby. Using cognitive theory to explain entrepreneurialrisk–taking: challenging conventional wisdom [J]. Journal of Business Venturing,1995,10(6):425-430.
    [135] Lopes L L. Between hope and fear: The psychology of risk [J].Advances inExperimental Social Psychology,1987(20):255-295.
    [136] Rabin M. Risk aversion and expected—utility theory: A Calibration Theorem[M].Cambridge: Cambridge University Press,1999.
    [137] Wallach M A, Wing C W. Is risk a value [J]. Journal of Personality and SocialPsychology,1968,9(1):101-106.
    [138] Daniel Kahneman, Dan Lovallo. Timid choices and bold forecasts: A cognitiveperspective on risk-taking [J]. Management Science,1993,39(1):17-31.
    [139] Davis F D, Bagozzi R P, Warshaw P R. User acceptance of computer technology [J].Management Science,1989,35(8):982-1003.
    [140] Yang H D, Yoo Y. It’s all about attitude: revisiting the technology acceptance model[J].Decision Support Systems,2004,38(1):19-31.
    [141] Venkatesh V. Determinants of perceived ease of use: integrating control, intrinsicmotivation, and emotion into the technology acceptance model [J]. InformationSystems Research,2000,11(4):342-365.
    [142] Venkatesh V, Morris M.G, Davis G.B, Davis F.D. User acceptance of informationtechnology: toward a unified view [J]. MIS Quarterly,2003,27(3):425-478.
    [143]李怀祖.管理研究方法论(第2版)[M].西安:西安交通大学出版社,2003,259-274.
    [144] Nunally J C. Psychometric Theory [M]. New York: McGraw-Hill,1978.
    [145] Kaiser, H.F. An index of factorial simplicity [J]. Psychometrika,1974,35(2):31-36.
    [146] Adler, T.R, Lennard, J.G., Nordgren R.K. Improving risk management:movingfrom risk elimination to risk avoidance [J]. Information and Software Technology,1999,41(7):29-34.
    [147] IEEE.IEEE standard1540-2001. IEEE Standard for Software Life CycleProcesses-Risk Management.Inc.New York, NY,2001.
    [148] Seify, M., S. Bijani, et al.. A Methodology for Mobile Network Security RiskManagement [C]. Proceedings of the2009Sixth International Conference onInformation Technology: New Generations, Vols1-3, New York, IEEE,2009.
    [149] Zhang, J. L., Y. Q. Liu, et al. A Review for the Risks and Challenges of MobileCommerce Development [C].2009International Conference on E-Business andInformation System Security, Vols1and2, New York, IEEE,2009.
    [150] Clarke, R. A Risk Assessment Framework for Mobile Payments.21st BledEconference Ecollaboration: Overcoming Boundaries through Multi-ChannelInteraction [C].Conference Proceedings,2008.
    [151] Hoffman K, Turley L W. Atmospherics, service encounters and consumer decisionmaking: an integrative perspective [J]. Journal of Marketing Theory and Practice,2002,10(3):33-42.
    [152] A. Ginsberg, N. Venkatraman. Contingency perspectives of organizational strategy:a critical review of the empirical research [J], Academy of Management Review,1985,10(3):421-434.
    [153] P. Lawrence, J. Lorsch, Organization and Environment [M]. Irwin, Homewood,Illinois,1967.
    [154] K Douglas Hoffman, L W Turley. Atmospherics, service encounters and consumerdecision making:An integrative perspective [J].Journal of Marketing Theory andPractice,2002,10(3):33-42.
    [155] Bottoni, A. and G. Dini. Improving authentication of remote card transactions withmobile personal trusted devices [J]. Computer Communications,2007,30(8):1697-1712.
    [156] Shevchenko, A. An Overview of Mobile Device Security.http://www.viruslist.com/en/analysis?pubid=170773606,2005.
    [157] Okazaki, S, H. R. Li. Consumer privacy concerns and preference for degree ofregulatory control:A Study of Mobile Advertising in Japan [J]. Journal ofAdvertising,2009,38(4):63-77.
    [158] Vance, A., C. Elie-Dit-Cosaque, et al. Examining trust in information technologyartifacts: The effects of system quality and culture [J]. Journal of managementinformation systems,2008,24(4):73-100.
    [159] Peter, J. P, Tarpey, L.X. A comparative analysis of three consumer decisionstrategies [J].Journal of Consumer Research,1975,1(1):29-38.
    [160]井淼,周颖,王方华.网上购物感知风险的实证研究[J].系统管理学报,2007,(16):164-169.
    [161]董大海,李广辉,杨毅.消费者网上购物感知风险构面研究[J].管理学报,2005,(2):55-60.
    [162]陈祥槐.管理文化研究:观点与方法[J],中国软科学,2002,(7):68-73.
    [163]吴丽,吴飞,陈礼仪.边坡工程施工项目风险指标体系的研究与应用[J].探矿工程,2011,(38):66-71.
    [164]孙滢悦,陈鹏.区域旅游资源灾害风险评价模型研究[J].长春师范学院学报(自然科学版),2010,(29):83-85.
    [165]朱天星,于立新,田慧勇.商业银行个人信用风险评价模型研究[J].金融理论与实践,2011,(3):64-67.
    [166]林维,周丽莎. ASP平台下的动态联盟风险评价模型研究[J].测控技术,2010,(29):43-49.
    [167]李忱,吴丽花.基于BP神经网络的供应链突发风险评价模型[J].北京信息科技大学学报,2011,(26):1-5.
    [168]王平,朱邦助.企业自主创新项目风险评价模型与实证研究[J].科技管理研究,2011,(6):15-18.
    [169]谢立本.对高校银行贷款额度控制与风险评价模型的探讨[J].肇庆学院学报,2011,(32):46-50.
    [170]贾业明,汪明武,陈光怡.基于集对分析与三角模糊数随机模拟耦合的燃气管道风险评价模型[J].湖南工程学院学报,2010,(20):74-77.
    [171]王敏.基于模糊评判的高校教务信息化管理风险评价模型[J].现代企业教育,2011,(5):151-152.
    [172]张继国,王慧敏.基于信息扩散原理的区域洪水灾害风险评价模型[J].水资源与水工程学报,2010,(21):37-39.
    [173]岳超源.决策理论与方法(第1版)[M].北京:科学出版社,2003,151-152.
    [174]谢季坚,刘承平.模糊数学方法(第2版)[M].武汉.华中科技大学出版社,2000,219-220.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700