參考文獻 |
中文資料:
[1]. 資策會FIND:http://www.find.org.tw/find/home.aspx
[2]. 資策會MIC:http://mic.iii.org.tw/aisp/
[3]. 國際數據資訊IDC:http://www.idc.com.tw/
[4]. 洪新原, 梁定澎, et al. (2005). "科技接受模型之彙總研究." 資訊管理學報 12(4): 211-234.
[5]. 陳冠廷 (2008). "智慧型手機作業系統之競合策略分析." 臺灣大學商學研究所學位論文(2008 年): 1-100.
[6]. 陳順宇,多變量分析,四版,華泰書局,2005
英文資料:
[1]. Agarwal, R., & Prasad, J. (1998). A conceptual and operational definition of personal innovativeness in the domain of information technology. Information Systems Research, 9(2), 204-215.
[2]. Ahuja, M. K., & Thatcher, J. B. (2005). Moving beyond intentions and toward the theory of trying: effects of work environment and gender on post-adoption information technology use. MIS quarterly, 29(3), 427-459.
[3]. Ajzen, I. (1985). From intentions to actions: A theory of planned behavior: Springer.
[4]. Al-Natour, S., Benbasat, I., & Cenfetelli, R. (2011). The adoption of online shopping assistants: perceived similarity as an antecedent to evaluative beliefs. Journal of the Association for Information Systems, 12(5), 2.
[5]. Al-Somali, S. A., Gholami, R., & Clegg, B. (2009). An investigation into the acceptance of online banking in Saudi Arabia. Technovation, 29(2), 130-141.
[6]. Anderson, J. C., & Gerbing, D. W. (1988). Structural equation modeling in practice: A review and recommended two-step approach. Psychological bulletin, 103(3), 411-423.
[7]. Anderson, J. E., Schwager, P. H., & Kerns, R. L. (2006). The drivers for acceptance of tablet PCs by faculty in a college of business. Journal of Information Systems Education, 17(4), 429.
[8]. Bandura, A. (1978). Self-efficacy: Toward a unifying theory of behavioral change. Advances in Behaviour Research and Therapy, 1(4), 139-161.
[9]. Barich, H., & Kotler, P. (1991). A framework for marketing image management. Sloan management review, 32(2), 94.
[10]. Beatty, S. E., Homer, P., & Kahle, L. R. (1988). The involvement—commitment model: Theory and implications. Journal of Business Research, 16(2), 149-167.
[11]. Benlian, A., Koufaris, M., & Hess, T. (2011). Service quality in software-as-a-service: developing the SaaS-Qual measure and examining its role in usage continuance. Journal of management information systems, 28(3), 85-126.
[12]. Bentler, P. M. (1983). Some contributions to efficient statistics in structural models: Specification and estimation of moment structures. Psychometrika, 48(4), 493-517.
[13]. Bentler, P. M., & Bonett, D. G. (1980). Significance tests and goodness of fit in the analysis of covariance structures. Psychological bulletin, 88(3), 588-606.
[14]. Best, J. (2006). Analysis: What is a smart phone. Good question. CBS Interactive.(accessed 23.11. 09).
[15]. Bhattacherjee, A. (2001). Understanding information systems continuance: an expectation-confirmation model. MIS quarterly, 25(3), 351-370.
[16]. Bhattacherjee, A., & Hikmet, N. (2007). Physicians’ Resistance toward Healthcare Information Technologies: A Dual-Factor Model. Paper presented at the System Sciences, 2007. HICSS 2007. 40th Annual Hawaii International Conference on.
[17]. Booz, A. (1982). Hamilton, New product management for the 1980s. Booz, Allen and Hamilton, New York.
[18]. Brockner, J., Rubin, J. Z., Fine, J., Hamilton, T. P., Thomas, B., & Turetsky, B. (1982). Factors affecting entrapment in escalating conflicts: The importance of timing. Journal of Research in Personality, 16(2), 247-266.
[19]. Brown, S. A., Dennis, A. R., & Venkatesh, V. (2010). Predicting collaboration technology use: Integrating technology adoption and collaboration research. Journal of management information systems, 27(2), 9-54.
[20]. Brown, S. A., & Venkatesh, V. (2005). Model of adoption of technology in households: A baseline model test and extension incorporating household life cycle. MIS quarterly, 399-426.
[21]. Browne, M. W., Cudeck, R., Bollen, K. A., & Long, J. S. (1993). Alternative ways of assessing model fit. Sage Focus Editions, 154, 136-136.
[22]. Burnham, T. A., Frels, J. K., & Mahajan, V. (2003). Consumer switching costs: a typology, antecedents, and consequences. Journal of the Academy of Marketing Science, 31(2), 109-126.
[23]. Cenfetelli, R. T. (2004). Inhibitors and enablers as dual factor concepts in technology usage. Journal of the Association for Information Systems, 5(11), 3.
[24]. Chen, K., Chen, J. V., & Yen, D. C. (2011). Dimensions of self-efficacy in the study of smart phone acceptance. Computer Standards & Interfaces, 33(4), 422-431.
[25]. Chen, Z., & Dubinsky, A. J. (2003). A conceptual model of perceived customer value in e‐commerce: A preliminary investigation. Psychology & Marketing, 20(4), 323-347.
[26]. Cheng, Y. M. (2011). Antecedents and consequences of e‐learning acceptance. Information Systems Journal, 21(3), 269-299.
[27]. Compeau, D. R., & Higgins, C. A. (1995a). Application of social cognitive theory to training for computer skills. Information Systems Research, 6(2), 118-143.
[28]. Compeau, D. R., & Higgins, C. A. (1995b). Computer self-efficacy: Development of a measure and initial test. MIS quarterly, 189-211.
[29]. Cothran, T. (2011). Google Scholar acceptance and use among graduate students: A quantitative study. Library & Information Science Research, 33(4), 293-301.
[30]. Datta, P. (2011). A preliminary study of ecommerce adoption in developing countries. Information Systems Journal, 21(1), 3-32.
[31]. Davis, F. D. (1989). Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS quarterly, 319-340.
[32]. Delone, W. H. (2003). The DeLone and McLean model of information systems success: a ten-year update. Journal of management information systems, 19(4), 9-30.
[33]. Doney, P. M., & Cannon, J. P. (1997). An examination of the nature of trust in buyer-seller relationships. the Journal of Marketing, 35-51.
[34]. Douglass, D. W. M. (1997). Cyberself: The emergence of self in on-line chat. The Information Society, 13(4), 375-397.
[35]. Dowling, G. R., & Staelin, R. (1994). A model of perceived risk and intended risk-handling activity. Journal of consumer research, 119-134.
[36]. Economides, N. (1996). The economics of networks. International journal of industrial organization, 14(6), 673-699.
[37]. El-Gayar, O., Moran, M., & Hawkes, M. (2011). Students’ acceptance of tablet PCs and implications for educational institutions. Journal of Educational Technology & Society, 14(2), 58-70.
[38]. Elie-Dit-Cosaque, C., Pallud, J., & Kalika, M. (2011). The Influence of Individual, Contextual, and Social Factors on Perceived Behavioral Control of Information Technology: A Field Theory Approach. Journal of management information systems, 28(3), 201-234.
[39]. Fishbein, M., & Ajzen, I. (1975). Belief, attitude, intention and behavior: An introduction to theory and research.
[40]. Fornell, C., & Larcker, D. F. (1981). Structural equation models with unobservable variables and measurement error: Algebra and statistics. Journal of Marketing Research, 382-388.
[41]. Goodhue, D. L., & Thompson, R. L. (1995). Task-technology fit and individual performance. MIS quarterly, 213-236.
[42]. Grönroos, C., Heinonen, F., Isoniemi, K., & Lindholm, M. (2000). The NetOffer model: a case example from the virtual marketspace. Management Decision, 38(4), 243-252.
[43]. Hardgrave, B. C., Davis, F. D., & Riemenschneider, C. K. (2003). Investigating determinants of software developers’ intentions to follow methodologies. Journal of management information systems, 20(1), 123-152.
[44]. Heerink, M., Ben, K., Evers, V., & Wielinga, B. (2008). The influence of social presence on acceptance of a companion robot by older people. Journal of Physical Agents, 2(2), 33-40.
[45]. Hoffman, L. R., & Kleinman, G. B. (1994). Individual and Group in Group Problem Solving The Valence Model Redressed. Human Communication Research, 21(1), 36-59.
[46]. Hsu, C.-L., & Lin, J. C.-C. (2008). Acceptance of blog usage: The roles of technology acceptance, social influence and knowledge sharing motivation. Information & Management, 45(1), 65-74.
[47]. Huang, T. C.-K., Liu, C.-C., & Chang, D.-C. (2012). An empirical investigation of factors influencing the adoption of data mining tools. International Journal of Information Management, 32(3), 257-270.
[48]. Im, I., Hong, S., & Kang, M. S. (2011). An international comparison of technology adoption: Testing the UTAUT model. Information & Management, 48(1), 1-8.
[49]. Jahng, J., Jain, H., & Ramamurthy, K. (2007). Effects of interaction richness on consumer attitudes and behavioral intentions in e-commerce: some experimental results. European Journal of Information Systems, 16(3), 254-269.
[50]. Jain, H., Ramamurthy, K., Ryu, H.-S., & Yasai-Ardekani, M. (1998). Success of data resource management in distributed environments: an empirical investigation. MIS quarterly, 1-29.
[51]. Jarvenpaa, S. L., Tractinsky, N., & Saarinen, L. (1999). Consumer Trust in an Internet Store: A Cross‐Cultural Validation. Journal of Computer‐Mediated Communication, 5(2), 0-0.
[52]. Jones, M. A., Mothersbaugh, D. L., & Beatty, S. E. (2002). Why customers stay: measuring the underlying dimensions of services switching costs and managing their differential strategic outcomes. Journal of Business Research, 55(6), 441-450.
[53]. Joshi, K. (1991). A model of users’ perspective on change: the case of information systems technology implementation. MIS quarterly, 229-242.
[54]. Joshi, K., & Lauer, T. W. (1999). Transition and change during the implementation of a computer-based manufacturing process planning system: An analysis using the equity implementation model. Engineering Management, IEEE Transactions on, 46(4), 407-416.
[55]. Judd, B. R., & Weissenberger, S. (1982). A systematic approach to nuclear safeguards decision-making. Management Science, 28(3), 289-302.
[56]. Karahanna, E., & Straub, D. W. (1999). The psychological origins of perceived usefulness and ease-of-use. Information & Management, 35(4), 237-250.
[57]. Kauffman, R. J., McAndrews, J., & Wang, Y.-M. (2000). Opening the “black box” of network externalities in network adoption. Information Systems Research, 11(1), 61-82.
[58]. Kim, B., & Han, I. (2009). What drives the adoption of mobile data services? An approach from a value perspective. Journal of Information Technology, 24(1), 35-45.
[59]. Kim, H.-W. (2011). The effects of switching costs on user resistance to enterprise systems implementation. Engineering Management, IEEE Transactions on, 58(3), 471-482.
[60]. Kim, H.-W., & Kankanhalli, A. (2009). Investigating user resistance to information systems implementation: A status quo bias perspective. MIS quarterly, 33(3), 567-582.
[61]. Kim, H. W., & Gupta, S. (2012). Investigating Customer Resistance to Change in Transaction Relationship with an Internet Vendor. Psychology & Marketing, 29(4), 257-269.
[62]. Kim, J. (2006). Toward an understanding of Web‐based subscription database acceptance. Journal of the American Society for Information Science and Technology, 57(13), 1715-1728.
[63]. Kim, S., & Garrison, G. (2010). Understanding users’ behaviors regarding supply chain technology: Determinants impacting the adoption and implementation of RFID technology in South Korea. International Journal of Information Management, 30(5), 388-398.
[64]. Kline, R. (1998). Principles and practice of structural equation modeling: A very readable introduction to the subject, with good coverage of assumptions and SEM’s relation to underlying regression, factor, and other techniques: NY: Guilford Press.
[65]. Koufaris, M., & Hampton-Sosa, W. (2002). Customer trust online: examining the role of the experience with the Web-site. Department of Statistics and Computer Information Systems Working Paper Series, Zicklin School of Business, Baruch College, New York.
[66]. Lapointe, L., & Rivard, S. (2005). A multilevel model of resistance to information technology implementation. MIS quarterly, 461-491.
[67]. Lauer, T. W., Joshi, K., & Browdy, T. (2000). Use of the Equity Implementation Model to Review Clinical System Implementation Efforts A Case Report. Journal of the American Medical Informatics Association, 7(1), 91-102.
[68]. Levitt, T. (1966). Innovative imitation. Harvard Business Review, 44(5), 63-70.
[69]. Lewin, K. (1947). Frontiers in group dynamics: concept, method and reality in social science; social equilibria and social change. Human relations.
[70]. Lin, C.-P., & Ding, C. G. (2005). Opening the black box: assessing the mediating mechanism of relationship quality and the moderating effects of prior experience in ISP service. International Journal of Service Industry Management, 16(1), 55-80.
[71]. Loiacono, E. T., Watson, R. T., & Goodhue, D. L. (2007). WebQual: an instrument for consumer evaluation of web sites. International Journal of Electronic Commerce, 11(3), 51-87.
[72]. Lou, H., Luo, W., & Strong, D. (2000). Perceived critical mass effect on groupware acceptance. European Journal of Information Systems, 9(2), 91-103.
[73]. Lu, Y., Deng, Z., & Wang, B. (2010). Exploring factors affecting Chinese consumers’ usage of short message service for personal communication. Information Systems Journal, 20(2), 183-208.
[74]. Lynne, G. D., Franklin Casey, C., Hodges, A., & Rahmani, M. (1995). Conservation technology adoption decisions and the theory of planned behavior. Journal of economic psychology, 16(4), 581-598.
[75]. Madsen, M., & Gregor, S. (2000). Measuring human-computer trust. Paper presented at the Proceedings of Eleventh Australasian Conference on Information Systems.
[76]. Marakas, G. M., & Hornik, S. (1996). Passive resistance misuse: overt support and covert recalcitrance in IS implementation. European Journal of Information Systems, 5(3), 208-219.
[77]. Markus, M. L. (1983). Power, politics, and MIS implementation. Communications of the ACM, 26(6), 430-444.
[78]. Martinko, M. J., Zmud, R. W., & Henry, J. W. (1996). An attributional explanation of individual resistance to the introduction of information technologies in the workplace. Behaviour & Information Technology, 15(5), 313-330.
[79]. Mason, P. (1986). Brood parasitism in a host generalist, the shiny cowbird: II. Host selection. The Auk, 61-69.
[80]. Mathieson, K. (1991). Predicting user intentions: comparing the technology acceptance model with the theory of planned behavior. Information Systems Research, 2(3), 173-191.
[81]. Mayer, R. C., Davis, J. H., & Schoorman, F. D. (1995). An integrative model of organizational trust. Academy of management review, 709-734.
[82]. McGrath, J. E., Kelly, J. R., & Machatka, D. E. (1984). The social psychology of time: Entrainment of behavior in social and organizational settings. Applied social psychology annual.
[83]. Moore, G. C., & Benbasat, I. (1991). Development of an instrument to measure the perceptions of adopting an information technology innovation. Information Systems Research, 2(3), 192-222.
[84]. Mullin, B.-A., & Hogg, M. A. (1999). Motivations for group membership: The role of subjective importance and uncertainty reduction. Basic and Applied Social Psychology, 21(2), 91-102.
[85]. Nysveen, H., Pedersen, P. E., & Thorbjørnsen, H. (2005). Explaining intention to use mobile chat services: moderating effects of gender. Journal of Consumer Marketing, 22(5), 247-256.
[86]. Parasuraman, A. (2000). Technology Readiness Index (TRI) a multiple-item scale to measure readiness to embrace new technologies. Journal of Service Research, 2(4), 307-320.
[87]. Park, N., Roman, R., Lee, S., & Chung, J. E. (2009). User acceptance of a digital library system in developing countries: An application of the Technology Acceptance Model. International Journal of Information Management, 29(3), 196-209.
[88]. Pavlou, P. A., Liang, H., & Xue, Y. (2007). Understanding and mitigating uncertainty in online exchange relationships: A principal-agent perspective. MIS quarterly, 31(1), 105-136.
[89]. Ping, R. A. (1993). The effects of satisfaction and structural constraints on retailer exiting, voice, loyalty, opportunism, and neglect. Journal of retailing, 69(3), 320-352.
[90]. Polites, G. L., & Karahanna, E. (2012). Shackled to the status quo: the inhibiting effects of incumbent system habit, switching costs, and inertia on new system acceptance. MIS quarterly, 36(1), 21-42.
[91]. Polites, G. L., & Watson, R. T. (2009). Using social network analysis to analyze relationships among IS journals. Journal of the Association for Information Systems, 10(8), 595-636.
[92]. Pura, M. (2005). Linking perceived value and loyalty in location-based mobile services. Managing Service Quality, 15(6), 509-538.
[93]. Ram, S., & Sheth, J. N. (1989). Consumer resistance to innovations: the marketing problem and its solutions. Journal of Consumer Marketing, 6(2), 5-14.
[94]. Rice, R. E. (1987). Computer‐mediated communication and organizational innovation. Journal of Communication, 37(4), 65-94.
[95]. Ring, P. S., & Van de Ven, A. H. (1994). Developmental processes of cooperative interorganizational relationships. Academy of management review, 90-118.
[96]. Rogers, E. M. (1995). Diffusion of Innovation. 4th: New York: Free Press.
[97]. Ronald, T., & Howell, H. (1991). Personal Computing: Toward a Conceptual Model of Utilization. Management Information System Quarterly, 21(3).
[98]. Rosenstock, I. M. (1974). The health belief model and preventive health behavior. Health Education & Behavior, 2(4), 354-386.
[99]. Samuelson, W., & Zeckhauser, R. (1988). Status quo bias in decision making. Journal of risk and uncertainty, 1(1), 7-59.
[100]. Sarker, S., Valacich, J. S., & Sarker, S. (2005). Technology adoption by groups: A valence perspective. Journal of the Association for Information Systems, 6(2), 3.
[101]. Shin, D.-H. (2007). User acceptance of mobile Internet: Implication for convergence technologies. Interacting with Computers, 19(4), 472-483.
[102]. Shin, D.-H. (2012). What makes consumers use VoIP over mobile phones? Free riding or consumerization of new service. Telecommunications Policy, 36(4), 311-323.
[103]. Shin, D. H. (2009). Determinants of customer acceptance of multi-service network: An implication for IP-based technologies. Information & Management, 46(1), 16-22.
[104]. Short, J., Williams, E., & Christie, B. (1976). The social psychology of telecommunications.
[105]. Speier, C., & Venkatesh, V. (2002). The hidden minefields in the adoption of sales force automation technologies. the Journal of Marketing, 98-111.
[106]. Spreng, R. A., MacKenzie, S. B., & Olshavsky, R. W. (1996). A reexamination of the determinants of consumer satisfaction. the Journal of Marketing, 15-32.
[107]. Sweeney, J. C., & Soutar, G. N. (2001). Consumer perceived value: the development of a multiple item scale. Journal of retailing, 77(2), 203-220.
[108]. Taylor, S., & Todd, P. (1995). Assessing IT usage: The role of prior experience. MIS quarterly, 561-570.
[109]. Taylor, S., & Todd, P. A. (1995). Understanding information technology usage: A test of competing models. Information Systems Research, 6(2), 144-176.
[110]. Teng, W., Lu, H.-P., & Yu, H. (2009). Exploring the mass adoption of third-generation (3G) mobile phones in Taiwan. Telecommunications Policy, 33(10), 628-641.
[111]. Tornatzky, L. G., & Klein, K. J. (1982). Innovation characteristics and innovation adoption-implementation: A meta-analysis of findings. Engineering Management, IEEE Transactions on(1), 28-45.
[112]. Toto, R., Lim, K. Y., Nguyen, H., Zappe, S., & Litzinger, T. (2008). Acceptance of Tablet PC technology by engineering faculty. Paper presented at the Frontiers in Education Conference, 2008. FIE 2008. 38th Annual.
[113]. Tseng, F.-M., & Lo, H.-Y. (2011). Antecedents of consumers’ intentions to upgrade their mobile phones. Telecommunications Policy, 35(1), 74-86.
[114]. Turel, O., Serenko, A., & Bontis, N. (2010). User acceptance of hedonic digital artifacts: A theory of consumption values perspective. Information & Management, 47(1), 53-59.
[115]. Vallerand, R. J. (1997). Toward a hierarchical model of intrinsic and extrinsic motivation. Advances in experimental social psychology, 29, 271-360.
[116]. Van der Heijden, H., Verhagen, T., & Creemers, M. (2003). Understanding online purchase intentions: contributions from technology and trust perspectives. European Journal of Information Systems, 12(1), 41-48.
[117]. Venkatesh, V. (2000). Determinants of perceived ease of use: Integrating control, intrinsic motivation, and emotion into the technology acceptance model. Information Systems Research, 11(4), 342-365.
[118]. Venkatesh, V., Morris, M. G., Davis, G. B., & Davis, F. D. (2003). User acceptance of information technology: Toward a unified view. MIS quarterly, 425-478.
[119]. Venkatesh, V., & Speier, C. (1999). Computer technology training in the workplace: A longitudinal investigation of the effect of mood. Organizational behavior and human decision processes, 79(1), 1-28.
[120]. Venkatesh, V., Speier, C., & Morris, M. G. (2002). User acceptance enablers in individual decision making about technology: Toward an integrated model. Decision Sciences, 33(2), 297-316.
[121]. Venkatesh, V., Thong, J., & Xu, X. (2012). Consumer acceptance and use of information technology: extending the unified theory of acceptance and use of technology. MIS quarterly, 36(1), 157-178.
[122]. Verkasalo, H. T. (2008). Empirical Modelling of the Mobile VoIP Demand. Paper presented at the Proceedings of the International MultiConference of Engineers and Computer Scientists.
[123]. Voss, G. B., Parasuraman, A., & Grewal, D. (1998). The roles of price, performance, and expectations in determining satisfaction in service exchanges. the Journal of Marketing, 46-61.
[124]. Walster, E., & Traupmann, J. (1978). Equity and extramarital sexuality. Archives of Sexual Behavior, 7(2), 127-142.
[125]. Warshaw, P. R. (1980). A new model for predicting behavioral intentions: An alternative to Fishbein. Journal of Marketing Research, 153-172.
[126]. Xue, Y. (2009). AVOIDANCE OF INFORMATION TECHNOLOGY THREATS: ATheoretical PERSPECTIVE. MIS quarterly, 33(1), 71-90.
[127]. Yoon, H. S., & Barker Steege, L. M. (2012). Development of a quantitative model of the impact of customers’ personality and perceptions on Internet banking use. Computers in Human Behavior.
[128]. Yousafzai, S. Y., Foxall, G. R., & Pallister, J. G. (2010). Explaining internet banking behavior: theory of reasoned action, theory of planned behavior, or technology acceptance model? Journal of Applied Social Psychology, 40(5), 1172-1202.
[129]. Zaltman, G., Duncan, R., & Holbek, J. (1973). Innovations and organizations (Vol. 1973): Wiley New York.
[130]. Zucker, L. G. (1986). Production of trust: Institutional sources of economic structure, 1840–1920. Research in organizational behavior. |