期刊文献+

中国物联网技术扩散的影响因素与对策 被引量:5

Study on Influencing Factor of Technology Diffusion in China′s Internet of Thing and Countermeasure
下载PDF
导出
摘要 针对中国物联网技术扩散的实际,采用文献研究、问卷调查以及因子分析等方法,对影响中国物联网技术扩散的各层面、各维度因素进行了综合分析,将之归类为用户技术接受度、企业采纳度、社会支持度和产业链就绪度四类因素,并对四类因素如何影响物联网技术扩散进行了深入、细致的剖析,最后给出相应的对策。 According to the practical situation of technology diffusion in China′s Internet of Things,this paper uses the methods of literature research,questionnaire survey and factor analysis to study the influencing factors of technology diffusion in Internet of Things from multiple dimensions which could be divided into four categories,namely user technology acceptance,company adoption,society support and industry chain.Then it analyzes the mechanism of these four factors affecting the technology diffusion in Internet of Things in detail.Finally,it puts forward some corresponding countermeasures.
作者 张青
出处 《技术经济》 CSSCI 2013年第10期17-26,105,共11页 Journal of Technology Economics
基金 复旦大学"985工程"三期整体推进社会科学研究项目"信息化与工业化融合背景下我国新一代信息技术产业的竞争力及发展路径研究"资助
关键词 物联网 技术扩散 影响因素 因子分析 internet of thing technology diffusion influencing factor factor analysis
  • 相关文献

参考文献43

  • 1Commission of the European Communities.Results of the public online consultation of future radio frequency identification technology policy[EB/OL].[2012-10-12].http://ec.europa.eu/information-society/policy/rfid/documents/rfidswp_en.pdf.
  • 2OHKUBO M,SUZUKI K,KINOSHITA S.RFID privacy issues and technical challenges[J].Communications of the ACM,2005,48(9):66-71.
  • 3HUBER N,MICHAEL K,MCCATHIE L.Barriers to RFID Adoption in the supply chain[Z].RFID Eurasia,2007 1st Annual on 5-6 Sept.2007.
  • 4SHARMA A,CITURS A,KONSYNSKI B.Strategic and institutional perspectives in the adoption and early integration of radio frequency identification(RFID)[Z].System Sciences,2007.HICSS 2007.40th Annual Hawaii International Conference on Jan.2007.
  • 5HOSSAIN M M,PRYBUTOK V R.Consumer acceptance of RFID technology:an exploratory study[J].Engineering Management,IEEE Transactions on,2008,55 (2):316-328.
  • 6MADLBERGER M.A Model of antecedents of RFID adoption Intention in the supply chain[Z].System Sciences,2009.HICSS 2009.42nd Hawaii International Conference on 5-8 Jan.2009.
  • 7HOSSAIN M,QUADDUS M Z.An adoption diffusion model of RFID-based livestock management system in Australia[M]//PRIES-HEJE J,VENABLE J,BUNKER D,et al.Human benefit through the diffusion of information systems design science research.Springer Berlin Heidelberg,2010:179-191.
  • 8SHIH D-H,CHIU Y-W,CHANG S I,et al.An empirical study of factors affecting RFID's adoption in Taiwan[J].Journal of Global Information Management,2008,16 (2):58-80.
  • 9TSAI M-C,LEE W,WU H-C.Determinants of RFID adoption intention:evidence from Taiwan Residents retail chains[J].Information & Management,2010,47 (5/6):255-261.
  • 10吴君义.智能交通领域RFID技术创新扩散研究[D].杭州:浙江大学,2011.

二级参考文献50

  • 1柳琦,丁云龙.产业集群的技术成因分析[J].中国科技论坛,2005(4):122-125. 被引量:16
  • 2Ohkubo M,K.Suzuki,and S.Kinoshita.RFID privacy issues and technical challenges[J].Communications of the ACM.2005, 48(9):66 - 71.
  • 3Flossain MMVR Prybutok. Consumer Acceptance of RFID Technology:An Exploratory Study [J].IEEE Transactions On Engineering Management, 2008,55 (2):316-326.
  • 4I.Goldberg.A Pseudonymous Communications Infrastructure for the Internet [D].Ph.D thesis,University of California at Berkeley, 2000.
  • 5D.Delen,B.C.Hardgrave,R.Sharda.RFID for Better Supply- Chain Management through Enhanced Information Visibility[J]. Production and Operations Management,2007,16(5):613-624.
  • 6彭皓 李泉林.RFID隐私与安全中的关键技术研究.In-temationalRFIDTechnologySummitForum,2006,:29-42.
  • 7Christian Met al.Making radio frequency identification visiblea watchdog tag.Fifth annum IEEE intemafionaleonferenee on pervasive computing and communications,New York, USA, 2007.
  • 8Hong,J.I.,Landay,J.A.An Architecture for PrivacySensitive Ubiquitous Computing[C].thc 2nd international conference on Mobile systems, applications, and services, Boston, MA, USA.201M:177-189.
  • 9Garfinkel,S.L.,A.Juels,et al.RFID Privacy:An Overview of Problems and Proposed Solutions [J].IEEE Security and Priva- cy, 2005:34-43.
  • 10张楠,郭迅华,陈国青.信息技术初期接受扩展模型及其实证研究[J].系统工程理论与实践,2007,27(9):123-130. 被引量:52

共引文献116

同被引文献83

引证文献5

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部