參考文獻 |
一、中文部份
1.高速公路局-技術發展現況與國外案例。
2.陳佳宜,高速公路電子收費系統ETC在日本的發展現況,拓墣產業研究所焦點報告,民國93年6月。
3. 高速公路電子收費卡發售與使用須知,遠通電收,民國93年1月。
4. 遠通電收網站,http://www.fetc.net.tw/。
二、英文部份
1.Adams, J.S. (1965), “Inequity in social exchange,” in Advances in Experimental Social Psychology, Berkowitz L. (ed.), New York: Academic Press., pp.267-300.
2.Ajzen, I. and Martin F. (1980), Understanding Attitude and Predicting Social Behavior, Englewood Cliffs, N.J.: Prentice-Hall.
3.Ajzen, I. (1985), “From Intention to Action: A Theory of Planned Behavior,” in Action Control: From Cognition to Behavior, Julius, K. and Jurgen, B. (eds.), Heidelberg: Springer-Verlag.
4.Ajzen, I. and Thomas, J.M. (1986), “Prediction of Goal-Directed Behavior: Attitude, Intention, and Perceived Behavioral Control,” Journal of Experimental Social Psychology, 22, pp. 453-474.
5.Ajzen, I. (1988), Attitudes, Personality, and Behavior, Chicago, IL: The Dorsey Press.
6.Ajzen, I. (1991), “The Theory of Planned Behavior,” Organization Behavior and Human Decision Processes, 50, pp. 179-211.
7.Bagozzi, R.P. (1981), “Attitude, Intention, and Behavior: A Test of Some Key Hypotheses,” Journal of Personality and Social Psychology, 41, pp. 607-627.
8.Bagozzi, R.P. and Paul R.W. (1990) , “Trying to Consume,” Journal of Consumer Research, 17 (2), pp. 127-140.
9.Bagozzi, R.P., Hans, B. and Youjae, Y. (1992), “State Versus Action Orientation and the Theory of Reasoned Action,” Journal of Consumer Research, 18(4), pp. 505-528.
10.Bandura, A. (1977), “Self-Efficacy: Toward a Unifying Theory of Behavioral Change,” Psychological Review, 84, pp. 191-215.
11.Bandura, A. (1982), “Self-Efficacy Mechanism in Human Agency,” American Psychologist, 37, pp. 122-147.
12.Bauer, R.A. (1960), “Consumer Behavior as Risk Taking,” in Dynamic Marketing for a Changing World, Hancock, R.S. (ed.), Chicago: American Marketing Association, pp. 389-393.
13.Bhattancherjee, A. (2000), “Acceptance of E-Commerce Services: The Case of Electronic Brokerages,” IEEE Transactions on Systems, Man, and Cybernetics- Part A: Systems and Humans, 30 (4), pp.411- 420.
14.Bentler, P.M. (1986), “Structural Modeling and Psychometrika: on Growth and Achievements,” Psychometrika, 51 (1), pp. 35-51.
15.Bies, R.J. and Moag, J.S. (1986), “Interactional Justice: Communication criteria of fairness,” Research on Negotiation in Organizations, 1, pp. 43-55.
16.Browne, M.W., and Cudeck, R. (1993), “Alternative Ways of Assessing Model Fit,” in Testing Structural Equation Models, Kenneth B., and Long, J.S. (eds.), Sage Publications, Newbury Park, CA, pp.136-162.
17.Chin, W.W., and Todd, P. (1995), “On the Use, Usefulness and Ease of Use of Structural Equation Modeling in MIS Research:A Note of Caution,” MIS Quarterly, 19 (2), pp.237-246.
18.Clemmer, E.C., and Schneider, B. (1996), “Fair Service,” in Advances in Services Marketing andManagement, Swartz, T.A.,Bowen, D.E., and Brown S.W. (eds.), Greenwich, CT: JAI Press., pp. 109-126.
19.Cox, D.F. (1967), “Risk Handling in Consumer Behavior - An Intensive Study of Two Cases,” in Risk Taking and Information Handling in Consumer Behavior, Donald F.C. (ed.), Boston: Harvard University Press, pp. 34-81.
20.Cropanazano, R.S., and Folger, R. (1991), “Procedural justice and worker motivation,” in Motivation and work behavior, Steers R.M., and Porter L.W. (eds.), New York: McGraw-Hill., pp. 131-143.
21.Cunningham, S.M. (1967), “The Major Dimension of Perceived Risk,” in Risk Taking and Information Handling in Consumer Behavior, Donald F.C. (ed.), Boston: Harvard University Press, pp. 82-108.
22.Davis, F.D. (1986), “ A Technology Acceptance Model for Empirically Testing New End-User Information Systems: Theory and Results,” Unpublished Ph. D. Dissertation, Sloan School of Management, MIT.
23.Davis, F.D., Bagozzi R.P., and Warshaw P.R. (1989), “User Acceptance of Computer Technology: A Comparison of Two Theoretical Model,” Management Science, 35 (8), pp. 982-1003.
24.Dowling, G.R., and Richard S. (1994), “A Model of Perceived Risk and Intended Risk-Handling Activity,” Journal of Consumer Research, 21 (1), pp. 119-134.
25.Fornell, C., and Larcker, D.F. (1981), “Evaluating structural equation models with unobservable variables and measurement error,” Journal of Marketing Research, 18 (3), pp. 39-50.
26.Gefen, D., Straub, D.W., and Boudreau, M-C. (2000), “Structural Equation Modeling and Regression: Guidelines For Research Practice,” Communications of the Association for Information Systems, 4(7), pp. 1-70.
27.Gefen, D., Pavlou, P.A., Warkentin, M., and Rose G.M. (2002), “E-government Adoption,” Eighth Americas Conference on Information Systems, pp. 569-576.
28.Hair, J.F., Anderson, R.E., Tatham, R.L., and Black, W.C. (1998), Multivariate Data Analysis, Englewood Cliffs, NJ:Prentice-Hall.
29.Harrison, David, A., Peter, P., Mykytyn, Jr., and Riemenschneider, C.K. (1997), “Executive Decisions About Adoption of Information Technology in Small Business: Theory and Empirical Tests,” Information Systems Research, 8(2), pp. 171-195.
30.Henderson, R., Rickwood, D., and Roberts, P. (1998), “The Beta Test of Electronic Supermarket,” Interacting with Computers, 10, pp.385-399.
31.Homans, G.G. (1961), Social Behavior: Its Elementary Forms, NY: Harcourt, Brace
32.Jacoby, J., and Kaplan L.B. (1972), “The Components of Perceived Risk,” in Proceedings of Third Annual Conference, Venkatesan M., ed., Association for Consumer Research, pp. 382-393.
33.Karahanna, E., and Straub, D.W. (1999), “The Psychological Origins of Perceived Usefulness and Ease-of-Use,” Information and Management, 35 (4), p. 237-250.
34.Klobas, J.E. (1995), “Beyond Information Quality: Fitness for Purpose and Electronic Information Resource Use,” Journal of Information Science, 21 (2), pp. 95-114.
35.Leventhal, G.S. (1980), “What should be done with equity theory?,” in Social exchange: Advances in theory and research, Gergen, K.J., Greenberg M.S., and Willis R.H. (eds.), New York: Plenum Press., pp.27-55.
36.Leventhal, G.S., Karuza, J., and Fry, W.R. (1980), “Beyond fairness: A theory allocation preferences.” in Justice And Interaction, Mikula, G. (ed.), New York: Springer-Verlag., pp.167-182.
37.Liao, Shaoyi, Shao, Y.P., Wang H., and Chen A. (1999), “The Adoption of Virtual Banking: An Empirical Study,” International journal of Information Management, 19 (1), pp. 63-74.
38.Liker, J.K., and Sindi A.A. (1997), “User Acceptance of Expert Systems: A Test of the Theory of Reasoned Action,” Journal of Engineering and Technology Management, 14 (2), pp. 147-173.
39.Lin, J.C-C., and Lu H. (2000), “Towards an Understanding of the Behavioral Intention to Use a Web Site,” International Journal of Information Management, 20 (3), pp. 197-208.
40.Lind, E.A., and Tyler, T.R. (1988), The Social Psychology Of Procedural justice, New York: Plenum Press.
41.Mathieson, K. (1991), “Predicting User Intentions: Comparing the Technology Acceptance Model with the Theory of Planned Behavior,” Information Systems Research, 2 (3), pp. 173-191.
42.Moon, J-W., and Kim, Y-G (2001), “Extending the TAM for a World-Wide-Web Context,” Information and Management, 38 (4), pp. 217-230.
43.Moore, G.C., and Benbasat, I. (1991), “Developmetn of an Instrument to Measure the Perceptions of Adoption an Information Technology Innovation,” Information Systems Research, 2(3), pp. 192-222.
44.Mykytyn, P. P., and David A. H. (1993), “The Application of the Theory of Reasoned Action to Senior Management and Strategic Information Systems,” Information Resources Management Journal, 6(2), pp. 15-26.
45.Peter, J.P., and Tarpey, L.X. (1975), “A Comparative Analysis of Three Consumer Decision Strategies,” Journal of Consumer Research.
46.Rogers, E.M. (1983), Diffusion of Innovations, New York: Free Press.
47.Rogers, W.A., Gilbert D.K., and Fraser E. (1997), “An Analysis of Automatic Teller Machine Usage by Older Adults: A Structured Interview Approach,” Applied Ergonomics, 28 (3), pp. 173-180.
48.Roselius, T. (1971), “Consumer Ranking of Risk Reduction Method,” Journal of Marketing, 35, pp. 56-61,.
49.Shimp, T.A., and Kavas A. (1984), “The Theory of Reasoned Action Applied to Coupon Usage,” Journal of Consumer Research, 11(3), pp. 795-809.
50.Swaminathan, Vanitha, Elzbieta, L-W., and Bharat, P.R. (1999), “Browsers or Buyers in Cyberspace? An Investigation of Factors Influencing Electronic Exchange,” Journal of Computer-Mediated Communication, 5 (2).
51.Shimp, T.A. and Kavas, A. (1984), “The Theory of Reasoned Action Applied to Coupon Usage,” Journal of Consumer Research, 11(3), pp. 795-809.
52.Shirley, T., and Todd, P.A. (1995a), “Decomposition and Crossover Effect in the Theory of Planned Behavior: A Study of Consumer Adoption Intentions,” International Journal of Research in Marketing, 12 (2), pp. 137-155.
53.Shirley, T., and Todd, P.A. (1995b), “Understanding Information Technology Usage: A Test of Competing Models,” Information System Research, 6(2), pp. 144-177.
54.Stone, R.N., and Gronhaug, K. (1993), “Perceived Risk: Further Considerations for the Marketing Discipline,” European Journal of Marketing, 27(3), pp.39.
55.Tan, Soo Jiuan (1999), “Strategies for Reducing Consumers’ Risk Aversion in Internet Shopping,” Journal of Consumer Marketing, 16 (2), pp. 163-180.
56.Thibaut, J., and Walker, L. (1975), Procedural Justice: A Psychological Analysis, Hillsdale, NJ:Lawrence Erlbaum Associates.
57.Tyler, T.R., Rasinski, K.A., and Spodick, N. (1985), “Influence of voice on satisfaction with leaders: Exploring the meaning of process control,” Journal of Personality and Social Psychology, pp. 72-81.
58.Zellars, K.I., Liu, Y., Bratton, V., Brymer, R., and Perrewe, PL. (2004), “An Examination of the Dysfunctional Consequences of Organizational Injustice and Escapist Coping,” Journal of Managerial Issues, 16 (4), pp. 528-544 |