參考文獻 |
一、中文部分
1. 王存國,「資訊密度在組織特性與資訊科技角色間的中介性」,第八屆國際資訊管理學術研討會論文集,1997年5月。
2. 江怡慧、陳怡樺,「網路銀行使用者之行為分析」,產業金融,第107期,2000年6月,頁88-102。
3. 林名正,「網路銀行能為你做什麼?」,數位周刊,第33期,2001年4月,頁68-73。
4. 吳肇銘,「影響網站使用意向之因素研究─以入門網站為例」,國立中央大學資訊管理研究所未出版之博士論文,1999年。
5. 李怡菁,「等待型態與等待發生的時點對消費者行為影響之研究--以網路銀行為例」,國立中央大學資訊管理研究所未出版之碩士論文,1999年。
6. 周景弘,「網路銀行安全性對使用者知覺風險與使用意願之影響」,國立台灣大學會計學研究所未出版之碩士論文,1997年。
7. 徐蕙萍,「網路銀行之風險分析與安全控管」,財金資訊,2001年4月。
8. 黃智強,「影響採用網路購物因素之研究─以網路書店為例」,國立中央大學資訊管理研究所未出版之碩士論文,2000年。
9. 馮炫竣,「消費者使用電子銀行之行為研究--以ATM、電話銀行及網路銀行為例」,私立元智大學管理研究所未出版之碩士論文,2000年。
10. 楊國樞、文崇一、吳聰賢、李亦園,「社會及行為科學研究法」,東華,1997年。
11. 蔡佩鈴,「台灣高科技廠商使用網路銀行之相關因素研究」,國立交通大學經營管理研究所未出版之碩士論文,2000年。
12. 網際網路資訊情報中心,「蕃薯藤2000年台灣網路使用大調查結果出爐」,2001年,,Accessed June 1, 2001。
二、英文部分
1. Ajzen, Icek and Martin Fishbein (1980), Understanding Attitude and Predicting Social Behavior, Englewood Cliffs, N.J.: Prentice-Hall.
2. Ajzen, Icek (1985), “From Intention to Action: A Theory of Planned Behavior,” in Julius Kuhl and Jurgen Beckmann, ed., Action Control: From Cognition to Behavior, Heidelberg: Springer-Verlag.
3. Ajzen, Icek and Thomas J. Madden (1986), “Prediction of Goal-Directed Behavior: Attitude, Intention, and Perceived Behavioral Control,” Journal of Experimental Social Psychology, 22, p. 453-474.
4. Ajzen, Icek (1988), Attitudes, Personality, and Behavior, Chicago, IL: The Dorsey Press.
5. Ajzen, Icek (1991), “The Theory of Planned Behavior,” Organization Behavior and Human Decision Processes, 50, p. 179-211.
6. Bagozzi, Richard P. (1981), “Attitude, Intention, and Behavior: A Test of Some Key Hypotheses,” Journal of Personality and Social Psychology, 41, p. 607-627.
7. Bagozzi, Richard P. and Paul R. Warshaw (1990), “Trying to Consume,” Journal of Consumer Research, 17(2), p. 127-140.
8. Bagozzi, Richard P., Hans Baumgartner and Youjae Yi (1992), “State Versus Action Orientation and the Theory of Reasoned Action,” Journal of Consumer Research, 18(4), p. 505-528.
9. Bandura, Albert (1977), “Self-Efficacy: Toward a Unifying Theory of Behavioral Change,” Psychological Review, 84, p. 191-215.
10. Bandura, Albert (1982), “Self-Efficacy Mechanism in Human Agency,” American Psychologist, 37, p. 122-147.
11. Bauer, Raymond A. (1960), “Consumer Behavior as Risk Taking,” in R. S. Hancock, ed., Dynamic Marketing for a Changing World, Chicago: American Marketing Association, p. 389-393.
12. Busselle, Rick, Joey Reagan, Bruce Pinkleton and Kim Jackson (1999), “Factors Affecting Internet Use in a Saturated-Access Population,” Telematics and Informatics, 16(1-2), p. 45-58.
13. Compeau, Deborah R. and Christopher A. Higgins (1991), “A Social Cognitive Theory Perspective on Individual Reactions to Computing Technology,” in J. I. DeGross et al., eds., Proceeding of the 12th International Conference on Information Systems, New York, p. 187-198.
14. Compeau, Deborah R. and Christopher A. Higgins (1995), “Computer Self-Efficacy: Development of a Measure and Initial Test,” MIS Quarterly, 19(2), p. 189-211
15. Cooper, R. G. (1997), “Examining Some Myths About New Product Winners,” in Katz, R., ed., The Human Side of Managing Technological Innovation, Oxford, p. 550-560.
16. Cox, Donald F. ( 1967), “Risk Handling in Consumer Behavior — An Intensive Study of Two Cases,” in Donald F. Cox, ed., Risk Taking and Information Handling in Consumer Behavior, Boston: Harvard University Press, p. 34-81.
17. Coyne, Kevin P. and Renee Dye (1998), “The Competitive Dynamics of Network-Based Business,” Harvard Business Review, 76(1), p. 99-109.
18. Cunningham, S. M. (1967), “The Major Dimension of Perceived Risk,” in Donald F. Cox, ed., Risk Taking and Information Handling in Consumer Behavior, Boston: Harvard University Press, p. 82-108.
19. Davis, Fred D. (1986), A Technology Acceptance Model for Empirically Testing New End-User Information Systems: Theory and Results, Unpublished Ph. D. Dissertation, Sloan School of Management, MIT.
20. Davis, Fred D., Richard P. Bagozzi and Paul R. Warshaw (1989), “User Acceptance of Computer Technology: A Comparison of Two Theoretical Model,” Management Science, 35(8), p. 982-1003.
21. Davis, Fred D. (1989), “Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology,” MIS Quarterly, 13(3), p. 319-340.
22. DeLone, William H. and Ephraim R. McLean (1992), “Information Systems Success: The Quest for the Dependent Variable,” Information Systems Research, 3(1), p. 60-95.
23. Dowling, Grahame R. and Richard Staelin (1994), “A Model of Perceived Risk and Intended Risk-Handling Activity,” Journal of Consumer Research, 21(1), p. 119-134.
24. Eagly, Alice H. and Shelly Chaiken (1993), The Psychology of Attitude, NY: Harcourt, Brace, Jovonovich.
25. Evans, Philp B. and Thomas S. Wurster (1997), “Strategy and the New Economics of Information,” Harvard Business Review, 75(5), p. 71-82.
26. Fishbein, Martin and Icek Ajzen (1975), Belief, Attitude, Intention, and Behavior: An Introduction to Theory and Research, Reading, MA: Addison-Wesley.
27. Guseman, D. S. (1981), “Risk Perception and Risk Reduction in Consumer Services,” in J. M. Donnely and W. R. George, eds., in Proc., Chicago: American Marketing Association, p. 200-204.
28. Hair, Joseph F., Rolph E. A., Ronald L. T. and William C. B. (1995), Multivariate Data Analysis: Fourth Edition, Prentice-Hall.
29. Hamill, Jim (1997), “The Internet and International Marketing,” International Marketing Review, 14(5), p. 300-323.
30. Harrison, David A., Peter P. Mykytyn, Jr. and Cynthia K. Riemenschneider (1997), “Executive Decisions About Adoption of Information Technology in Small Business: Theory and Empirical Tests,” Information Systems Research, 8(2), p. 171-195.
31. Hawke, John D. Jr. (2001), “The Internet Impact,” Independent Banker, 51(3), p. 32-38.
32. Henderson, R., D. Rickwood and P. Roberts (1998), “The Beta Test of an Electronic Supermarket,” Interacting with Computers, 10(4), p. 385-399.
33. Hickman, Meredith (1999), “Internet Banking: Transaction to Active Selling,” Banks Systems and Technology, 36(10), p. s3, s14.
34. Jackson, Cynthia M., Simeon Chow and Robert A. Leitch (1997), “Toward an Understanding of the Behavioral Intention to Use an Information System,” Decision Science, 28(2), p. 357-389.
35. Jacoby, J. and Leon B. Kaplan (1972), “The Components of Perceived Risk,” in M. Venkatesan, ed., Proceedings of Third Annual Conference, Association for Consumer Research, p. 382-393.
36. Karahanna, Elena and Detmar W. Straub (1999), “The Psychological Origins of Perceived Usefulness and Ease-of-Use,” Information and Management, 35(4), p. 237-250.
37. Klobas, Jane E. (1995), “Beyond Information Quality: Fitness for Purpose and Electronic Information Resource Use,” Journal of Information Science, 21(2), p. 95-114.
38. Klobas, Jane E. and Laurel A. Clyde (2000), “Adults Learning to Use the Internet: A Longitudinal Study of Attitudes and Other Factors Associated with Intended Internet Use,” Library and Information Science Research, 22(1), p. 5-34.
39. Liao, Shaoyi, Yuan Pu Shao, Huaiqing Wang and Ada Chen (1999), “The Adoption of Virtual Banking: An Empirical Study,” International journal of Information Management, 19(1), p. 63-74.
40. Liker, Jeffrey K. and Ahmed A. Sindi (1997), “User Acceptance of Expert Systems: A Test of the Theory of Reasoned Action,” Journal of Engineering and Technology Management, 14(2), p. 147-173.
41. Lin, Judy Chuan-Chuan and Hsipeng Lu (2000), “Towards an Understanding of the Behavioral Intention to Use a Web Site,” International Journal of Information Management, 20(3), p. 197-208.
42. Mahan, James S. III (1996), “Banking on the Internet at Security First Network Bank,” Journal of Retail Banking Services, 18(3), p. 23-27.
43. Maignan, Isabelle and Bryan A. Lukas (1997), “The Nature and Social Uses of the Internet: A Qualitative Investigation,” The Journal of Consumer Affairs, 31(2), p. 346-371.
44. Mathieson, Kieran (1991), “Predicting User Intentions: Comparing the Technology Acceptance Model with the Theory of Planned Behavior,” Information Systems Research, 2(3), p. 173-191.
45. Mitchell, V. W. and M. Greatorex (1993), “Risk Perception and Reduction in the Purchase of Consumer Services,” The Service Industries Journal, 13(4), p. 179-200.
46. Moon, Ji-Won and Young-Gul Kim (2001), “Extending the TAM for a World-Wide-Web Context,” Information and Management, 38(4), p. 217-230.
47. Moore, Gary C. and Izak Benbasat (1991), “Developmetn of an Instrument to Measure the Perceptions of Adoption an Information Technology Innovation,” Information Systems Research, 2(3), p. 192-222.
48. Mykytyn, Peter P. and David A. Harrison (1993), “The Application of the Theory of Reasoned Action to Senior Management and Strategic Information Systems,” Information Resources Management Journal, 6(2), p. 15-26.
49. Rogers, Everett M. (1983), Diffusion of Innovations: Third Edition, New York: Free Press.
50. Rogers, Wendy A., D. Kristen Gilbert and Elizabeth Fraser (1997), “An Analysis of Automatic Teller Machine Usage by Older Adults: A Structured Interview Approach,” Applied Ergonomics, 28(3), p. 173-180.
51. Roselius, Ted (1971), “Consumer Rankings of Risk Reduction Methods,” Journal of Marketing, 35, p. 56-61.
52. Sathye, Milind (1999), “Adoption of Internet Banking by Australian Consumers: An Empirical Investigation,” International Journal of Bank Marketing, 17(7), p. 324-334.
53. Schwab, Donald P. (1980), “Construct Validity in Organizational Behavior,” in Barry M. Staw and Larry L. Cummings, eds., Research in Organizational Behavior, 2, p. 3-34.
54. Shimp, Terence A. and Alican Kavas (1984), “The Theory of Reasoned Action Applied to Coupon Usage,” Journal of Consumer Research, 11(3), p. 795-809.
55. Sneddon, Mark (1997), “Cyberbanking: Remote Banking Using the Internet,” Australian Business Law Review, 25(1), p. 64-67.
56. Swaminathan, Vanitha, Elzbieta Lepkowska-White and Bharat P. Rao (1999), “Browsers or Buyers in Cyberspace? An Investigation of Factors Influencing Electronic Exchange,” Journal of Computer-Mediated Communication, 5(2), , Accessed April 6, 2001.
57. Takacs, Scott J. and Jon B. Freiden (1998), “Changes on the Electronic Frontier: Growth and Opportunity of the World-Wide Web,” Journal of Marketing Theory and Practice, 16(3), p. 24-37.
58. Tan, Soo Jiuan (1999), “Strategies for Reducing Consumers’ Risk Aversion in Internet Shopping,” Journal of Consumer Marketing, 16(2), p. 163-180.
59. Taylor, Shirley and Peter A. Todd (1995a), “Decomposition and Crossover Effect in the Theory of Planned Behavior: A Study of Consumer Adoption Intentions,” International Journal of Research in Marketing, 12(2), p. 137-155.
60. Taylor, Shirley and Peter A. Todd (1995b), “Understanding Information Technology Usage: A Test of Competing Models,” Information System Research, 6(2), p. 144-177.
61. Teo, Thompson S. H., Vivien K. G. Lim and Raye Y. C. Lai (1999), “Intrinsic and extrinsic motivation in Internet usage,” Omega, 27(1), p. 25-37.
62. Thong, James Y. L. (1999), “An Integrated Model of Information Systems Adoption in Small Business,” Journal of Management Information Systems, 15(4), p. 187-214.
63. Triandis, Harry C. (1979), “Values, Attitudes, and Interpersonal Behavior,” in Nebraska Symposium on Motivation: Beliefs, Attitudes, and Values, University of Nebraska Press, Lincoln, NE, p, 195-259.
64. Venkatesh, Viswanath and Fred D. Davis (1996), “A Model of the Antecedents of Perceived Ease of Use: Development and Test,” Decision Sciences, 27(3), p. 451-481.
65. Weisul, Kimberly (1997), “Consultant Study Sees Big Future for On-Line Corporate Banking,” Investment Dealers Digest, 63(18), p. 15 |