參考文獻 |
(一)中文部分
王品蘋(民105)。國小高年級學童自我概念、同儕關係與網路霸凌之相關研究-以大台南都會區為例 (未出版之碩士論文),國立台南大學,台南。
白青平(民89)。台北縣市國民小學初任教師工作困擾與解決途徑之研究(碩士論文)。國立台北師範學院,台北。
朱美瑰(民97)。看不見的拳頭-高雄市國中生網路霸凌經驗之研究(碩士論文)。國立高雄師範大學,高雄。
朱斌妤、黃仟文、翁少白 (民97)。以科技接受模式探討即時交通資訊系統之使用意願. 電子商務學報, 10(1), 173-200。
吳昕縈(民102)。迷宮多路徑融入品德素養之數位敘事方法研究(碩士論文)。國立新竹教育大學,新竹。
兒童福利聯盟文教基金會。2016台灣兒童少年網路霸凌經驗調查報告。http://www.cylaw.org.tw/about/guidance/8/235。
周君倚、陸洛 (民103)。以科技接受模式探討數位學習系統使用態度─ 以成長需求為調節變項. Information Management, 21(1), 83-106。
林妍汎 (民99)。台北市高中職學生網路霸凌行為之研究(未出版之碩士論文)。銘傳大學,台北。
林滄崧 (民101)。校園霸凌與防治.校園犯罪與安全維護 (頁 139-197).,台北市: 五南。
徐敏容 (民104)。中學職前教師之網路霸凌防治線上課程設計、發展與評鑑(碩士論文)。國立交通大學,新竹。
郭祐榕 (民98)。網路霸凌被害者之被害特質分析: 以嘉義市地區國中生為例(未出版之碩士論文)。國立中正大學,嘉義。
陳凌瑤 (民102)。教師網路霸凌認知態度之調查研究(碩士論文)。國立臺東大學,臺東。
傅士原 (民105)。以科技接受模式探討線上平台應用於大一微積分課程教學之學習滿意度與學習成效之研究(碩士論文)。國立中央大學,桃園。
黃建群 (民99)。網路霸凌素養課程對網路霸凌認知與行為意圖之影響(碩士論文)。國立臺東大學,臺東。
黃耀德 (民100)。情境式網路霸凌體驗網站之開發與評估研究(碩士論文)。國立臺東大學,臺東。
蔡雅惠 (民102)。高中職學生網路霸凌影響因素模式驗證之研究(未出版之碩士論文)。國立東華大學,花蓮。
鄭雅穗 (民98)。兒童及青少年網路霸凌行為探討及輔助策略。教育部九十七年度選送公。私立高級中等以下學校及幼稚園教師出國專題研究。
謝意苹 (民102)。 網路惡勢力:青少年網路霸凌之多面向探究。人文與社會科學簡訊,65-71。
謝麗紅 (民104)。國中教師網路霸凌認知、態度與自我效能之調查研究-以宜蘭縣為例(碩士論文)。國立東華大學,花蓮。
魏翊雄 (民101)。青少年網路霸凌行為及影響因子調查研究(碩士論文)。國立東華大學,花蓮。
(二)英文部分
Ajzen, I., & Fishbein, M. (1980). Understanding attitudes and predicting social behaviour.
Agarwal, R., & Prasad, J. (1998). A conceptual and operational definition of personal innovativeness in the domain of information technology. Information systems research, 9(2), 204-215.
Agarwal, R., & Prasad, J. (1999). Are individual differences germane to the acceptance of new information technologies?. Decision sciences, 30(2), 361-391.
Agarwal, R., Sambamurthy, V., & Stair, R. M. (2000). The evolving relationship between general and specific computer self-efficacy—An empirical assessment. Information systems research, 11(4), 418-430.
Andrew, Beringer (2011). Teacher′s Perceptions and Awareness of CyberbullyingAmong Middle School Students. State University of New York. Counselor Education Master′s Theses. Retrieved Nov. 4, 2014, from http://digitalcommons.brockport.edu/edc_theses/115
Belsey, B. (2004). Always on, always aware. Cyberbullying< http://www. cyberbullying. ca> at, 17.
Belsey, B. (2006). Bullying. org: A learning journey. Bulletin–Newfoundland and Labrador Teachers Association, 49(4), 20.
Barlińska, J., Szuster, A., & Winiewski, M. (2015). The role of short-and long-term cognitive empathy activation in preventing cyberbystander reinforcing cyberbullying behavior. Cyberpsychology, Behavior, and Social Networking, 18(4), 241-244.
Campbell, M., Butler, D., & Kift, S. (2008). A school′s duty to provide a safe learning environment: Does this include cyberbullying. Austl. & NZJL & Educ., 13, 21.
Chen, J.-K., & Wei, H.-S. (2010). The impact of school violence on self-esteem and depression among Taiwanese junior high school students. Social Indicators Research, 100(3), 479-498.
Davis, F. D. (1986). A technology acceptance model for empirically testing new end-user information system: Theory and results. Ph.D. dissertation, MIT Sloan School of Management, Cambridge, MA.
Davis, F. D. (1989). Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS quarterly, 319-340.
Dodds, W. B., Monroe, K. B., & Grewal, D. (1991). Effects of price, brand, and store information on buyers′ product evaluations. Journal of marketing research, 307-319.
DeSmet, A., Aelterman, N., Bastiaensens, S., Van Cleemput, K., Poels, K., Vandebosch, H., ... & De Bourdeaudhuij, I. (2015). Secondary school educators′
perceptions and practices in handling cyberbullying among adolescents: A cluster analysis. Computers & Education, 88, 192-201.
Gefen, D., & Straub, D. W. (1997). Gender differences in the perception and use of e-mail: An extension to the technology acceptance model. MIS quarterly, 21(3), 389-400.
Hinduja, S., & Patchin, J. W. (2008a). Bullying beyond the schoolyard: Preventing
and responding to cyberbulling. Thousand Oaks, CA: Corwin Press.
Huang, Y. Y., & Chou, C. (2010). An analysis of multiple factors of cyberbullying among junior high school students in Taiwan. Computers in Human Behavior, 26(6), 1581-1590.
Hinduja, S., & Patchin, J. W. (2010). Bullying, cyberbullying, and suicide. Archives
of suicide research, 14(3), 206-221.
Huang, Y. Y., & Chou, C. (2013). Revisiting cyberbullying: Perspectives from Taiwanese teachers. Computers & Education, 63, 227-239.
Huang, Y. -y., & Chang, C.-M., Chen, Y.-L., Wei, H.-C., & Chou, C. (2015). An analysis of adverse beliefs about cyberbullying among Taiwanese adolescents. Violence and Victims.
Igbaria, M., Parasuraman, S., & Baroudi, J. J. (1996). A motivational model of microcomputer usage. Journal of management information systems, 13(1), 127-143.
Kwon, T. H. & Zmud, R. W. (1987). Unifying the fragmented models of information systems implementation. In Boland, R. J. & Hirschheim, R. A. (Eds.), Critical Issues in Information Systems Research. (pp. 227-251.). New York: John Wiley & Sons
Kowalski, R. M., Giumetti, G. W., Schroeder, A. N., & Lattaner, M. R. (2014). Bullying the digital age: A critical review and meta-analysis of cyberbullying research among youth. Psychological Bulletin, 140(4), 1073-1137.
Lewis, W., Agarwal, R., & Sambamurthy, V. (2003). Sources of influence on beliefs about information technology use: An empirical study of knowledge workers. MIS quarterly, 657-678.
Li, Q. (2006). Cyberbullying in schools: A research of gender differences. School psychology international,27(2), 157-170.
Limber, S. P., Kowalski, R. M., & Agatston, P. W. (2008). Cyber bullying: A
prevention curriculum for grades 3-5. MN: Hazelden.
Malhotra, Y., & Galletta, D. (1999). Extending the technology acceptance model to account for social influence: theoretical bases and empirical validation. In Proceedings of the Hawaii International Conference on System Sciences (Vol. 32, pp. 5–5).
Money, W., & Turner, A. (2004). Application of the Technology Acceptance Model to a Knowledge Management System. Hawaii International Conference on System Sciences, 8, 80237b.
Navarro, R., & Serna, C. (2016). Spanish youth perceptions about cyberbullying:
Qualitative research into understanding cyberbullying and the role that parents play in its solution. In Cyberbullying Across the Globe (pp. 193-218). Springer International Publishing.
Olweus, D. (2003). A profile of bullying at school. Educational leadership, 60(6),
12-17.
Patchin, J. W., & Hinduja, S. (2006). Bullies move beyond the schoolyard: A preliminary look at cyberbullying. Youth violence and juvenile justice, 4(2), 148-169.
Rigby, K. (2003). Consequences of bullying in schools. The Canadian journal of psychiatry, 48(9), 583-590.
Roca, J. C., Chiu, C. M., & Martínez, F. J. (2006). Understanding e-learning
continuance intention: An extension of the Technology Acceptance Model. International Journal of human-computer studies, 64(8), 683-696.
Shariff, S., & Gouin, R. (2005). Cyber-dilemmas: gendered hierarchies, free
expression and cyber-safety in schools. Retrieved from
http://www.oii.ox.ac.uk/research/cybersafety/extensions/pdfs/papers/shaheen_
shariff.pdf
Schillewaert, N., Ahearne, M. J., Frambach, R. T., & Moenaert, R. K. (2005). The adoption of information technology in the sales force. Industrial Marketing Management, 34(4), 323-336.
Slonje, R., & Smith, P. K. (2008). Cyberbullying: Another main type of bullying?.
Scandinavian journal of psychology, 49(2), 147-154.
Teo, T. S., Lim, V. K., & Lai, R. Y. (1999). Intrinsic and extrinsic motivation in
Internet usage. Omega, 27(1), 25-37.
Thong, J. Y., Hong, W., & Tam, K. Y. (2002). Understanding user acceptance of
digital libraries: what are the roles of interface characteristics, organizational context, and individual differences?. International journal of human-computer studies, 57(3), 215-242.
Tokunaga, R. S. (2010). Following you home from school: A critical review and
synthesis of research on cyberbullying victimization. Computers in human behavior, 26(3), 277-287.
Venkatesh, V., & Morris, M. G. (2000). Why don′t men ever stop to ask for
directions? Gender, social influence, and their role in technology acceptance and usage behavior. MIS quarterly, 115-139.
Venkatesh, V., Morris, M. G., & Ackerman, P. L. (2000). A longitudinal field
investigation of gender differences in individual technology adoption decision-making processes. Organizational behavior and human decision processes, 83(1), 33-60.
Venkatesh, V. (2000). Determinants of perceived ease of use: Integrating control,
intrinsic motivation, and emotion into the technology acceptance model. Information systems research, 11(4), 342-365.
Willard, N. (2003). Off-campus, harmful online student speech. Journal of School
Violence, 2(1), 65-93.
Willard, N. (2005). Educator’s guide to cyberbullying addressing the harm caused by
online social cruelty. Retrieved July, 19, 2005.
Willard, N. (2006). Flame Retardant: Cyberbullies Torment Their Victims 24/7:
Here′s How to Stop the Abuse. School Library Journal, 52(4), 54.
Wang, J., Iannotti, R. J., & Nansel, T. R. (2009). School bullying among adolescents
in the United States: Physical, verbal, relational, and cyber. Journal of Adolescent health, 45(4), 368-375.
Ybarra, M. L., & Mitchell, K. J. (2004). Online aggressor/targets, aggressors, and
targets: A comparison of associated youth characteristics. Journal of child Psychology and Psychiatry, 45(7), 1308-1316.
|