博碩士論文 88443009 詳細資訊




以作者查詢圖書館館藏 以作者查詢臺灣博碩士 以作者查詢全國書目 勘誤回報 、線上人數:10 、訪客IP:3.22.181.81
姓名 任文瑗(Wen-Yuan Jen)  查詢紙本館藏   畢業系所 資訊管理學系
論文名稱 我國大學生資訊隱私偏差行為意圖之研究
(A Study of Information Deviant Behavioral Intention.)
相關論文
★ 製藥業的成本會計評估研究─ 一個ABC成本制度的應用★ 一個保險業的資料採擷應用--業務員的薪酬制度分析
★ 買方採用自有電子市集之個案研究─以台塑企業為例★ 農漁產品電子化交易中分類分級管理之研究
★ 應用類神經網路建構壽險核保決策支援之研究★ 企業導入ERP之關鍵成功因素-個案研究
★ 體外診斷醫療器材滿足CE及GMP驗證要求之個案研★ 企業資訊系統委外研究-以個案銀行為例
★ DRAM月平均價格變動分析★ 定期航運產業運價及運送時間對經營績效影響之研究-以某外商海運公司在台灣經營為例
★ 以交通儲值卡作為電子支付工具的營運模式及可行性分析★ 軟體公司能力成熟度評估
★ 加速台灣海關的通關便捷化-提升行動化服務的解決方案★ 以均勻度係數為預測晶圓良率指標之可行性分析-以國內某DRAM廠為例
★ 某公司資訊部門變革失敗之探討★ 資訊部門導入ITIL 管理機制之現況分析─ 以企業導入ITIL 服務支援為例
檔案 [Endnote RIS 格式]    [Bibtex 格式]    [相關文章]   [文章引用]   [完整記錄]   [館藏目錄]   至系統瀏覽論文 ( 永不開放)
摘要(中) 本研究根據社會心理學理論與犯罪學理論,主旨在於探討國內大專學生對資訊隱私偏差行為的意圖與親疏關係對該行為意圖的影響。透過競爭模型方式,試圖以二個研究模型探索資訊隱私偏差行為意圖如何受到成本評估、利益評估、對資訊隱私偏差行為的態度、主觀規範與資訊隱私自我效能等因素的影響。此外,探索華人社會親疏關是否對資訊隱私偏差行為意圖之因素產生影響效果。
本研究屬實徵性研究,研究方法與設計以隨機抽樣方式對我國大學生進行問卷調查。測量問卷根據二種侵權行為(個人資料商業、洩漏他人資料)與二種親疏關係(關係親密、關係疏離),共設計四種不同的情境故事。受訪對象分佈北、中、南大學院校,問卷總共發送出762 份問卷,有效樣本回收率達 83 %。
經資料分析,資訊隱私偏差行為意圖的研究結果顯示:研究模型一的卡方自由度比值較低、疊代次數較少、契合度指標值表現較佳等,證實模型一是契合度較佳的研究模型。模型一的假說檢定說明,利益的評估越高,資訊隱私自我效能越弱;成本的評估越高,個人對資訊隱私偏差行為的態度越負向;主觀規範越強,對資訊隱私偏差行為的態度越負向;對資訊隱私偏差行為的態度越負向,資訊隱私偏差行為意圖越弱;資訊隱私自我效能越強,資訊隱私偏差行為意圖越弱;資訊隱私自我效能越強,資訊隱私偏差行為意圖越弱。其次,實徵資料顯示對資訊隱私偏差行為的態度、資訊隱私自我效能、成本評估、利益評估等因素,受到親疏關係的影響而有顯著的差異。根據上述實徵資料的分析結果,本研究提出實務上的意涵以及對後續研究方向的建議。
摘要(英) This study is based the theory of planned behavior and rational choice theory. This study tends to explore college students’ information deviant behavioral intention and the impact caused by different relationships. Based on competing model, the study picks up the better model, which presents the impact factor among cost evaluation, benefit evaluation, the attitudes of information deviant behavior, subjective norm and information self-efficacy factors. For understanding the information deviant behavioral intention caused by various social relationship, this study explores the impacts as well.
關鍵字(中) ★ 資訊隱私偏差行為
★ 資訊隱私權
★ 抑制理論
★ 理性選擇理論
★ 計畫行為理論
關鍵字(英) ★ information deviant behavior
★ information privacy
★ containment theory
★ Rational Choice Theory
★ Theory of Planned Behavior
論文目次 目 錄
第一章 緒論 1
第一節 研究動機 1
第二節 研究目的 5
第三節 研究範圍 5
第四節 研究流程 6
第二章 文獻探討 8
第一節 資訊隱私權 8
一、隱私權 8
二、資訊隱私權 10
三、隱私權與資訊隱私權的比較 15
四、小結 17
第二節 資訊隱私偏差行為意圖 19
一、偏差行為的定義 19
二、資訊隱私偏差行為的定義 19
三、資訊隱私偏差行為的特質 20
四、資訊隱私偏差行為意圖的構面 22
五、小結 24
第三節 影響行為意圖的因素 25
一、理論基礎:計畫行為理論 25
二、影響資訊隱私偏差行為意圖的因素 28
三、小結 33
第四節 犯罪學理論與利益成本的評估 34
一、犯罪學學派與類別 34
二、理性選擇理論與抑制理論 37
三、「利益的評估」與「成本的評估」之定義 39
四、小結 42
第五節 研究構念與研究架構的彙整 43
一、研究構念與理論基礎 44
二、研究構念之間的關係 45
第三章 研究方法 48
第一節 影響資訊隱私偏差行為意圖的研究模型 48
一、研究構念 48
二、模型一:研究假說與研究架構 49
三、模型二:研究假說與研究架構 57
四、變數定義、衡量與問卷設計 60
第二節 親疏關係對資訊隱私偏差行為意圖之研究構念的影響 65
一、問卷設計 66
二、研究假說與研究模型 66
第三節 研究對象 68
第四節 資料分析方法 69
一、情境故事 69
二、檢定假說的分析方法 69
第四章 資料分析與研究結果 71
第一節 樣本基本資料分析 71
一、研究樣本回收 71
二、同質性檢定 72
三、研究樣本特徵 73
四、變數的平均數與標準差 76
第二節 研究量表的檢測 77
一、建構效度 77
二、判別效度檢測 79
三、信度檢測 80
第三節 競爭模型與假說檢定 81
一、競爭模型 81
二、研究假說的實質關係 82
第四節 親疏關係對資訊隱私偏差行為因素的影響 87
一、檢定假說 87
二、研究假說的檢定結果 89
第五節 探索性分析 90
一、資訊隱私偏差行為之持續性意圖 90
二、親疏關係:影響資訊隱私偏差行為意圖的因素 93
三、人口統計變數對個別情境的影響 98
第五章 結論與建議 105
第一節 研究結論 105
一、假說檢定結果 105
二、探索性研究結果 108
第二節 學術貢獻與實務意涵 110
一、學術貢獻 110
二、實務意涵 111
第三節 研究限制 113
第四節 未來研究方向 114
參考文獻 115
研 究 問 卷 123
附錄 128
參考文獻 參考文獻
中文文獻
朱柏松(1989),「隱私權概念之衍變及其損害防止立法之動向」,法學叢刊,34卷2期,89-102頁。
余德正(1999),「不法使用網際網路之刑事責任」,東海大學法律學研究所碩士論文。
吳懿婷譯(2001),隱私的權利(The Right to Privacy),商周出版,206-207頁。
沙依仁(1993),人類行為與社會環境,台北:五南書局。
李茂興、徐偉傑譯(1998),社會學:全球性的觀點,台北:弘智書局。(Joan Ferrante 原著)
李震山(1997),「論資訊自決權」,現代國家與憲法一李鴻禧教授六秩華誕祝壽論文集,715頁。
林雅惠(2004),「資訊隱私權之重塑-以行動商務為例」,科技法律評論,一卷一期,93-122頁。
羅豐良(2001),「社會控制對兒童偏差行為影響之研究」,中國文化大學兒童福利研究所碩士論文。
邱皓政(2003),結構方程模式:LISREL的理論、技術與應用,台北:雙葉書廊。
邱惠雯(2002),「網際網路使用行為之限制─從隱私權保護觀之探討」,國立中正大學犯罪防治研究所碩士論文。
紀佳伶(1999),「電子化/網路化政府資訊內容隱私權之研究」,國立政治大學公共行政研究所碩士論文。
翁岳生等(1985),「資訊立法之研究」,行政院研究發展考核委員會編印。
張柏東、劉明岩(2005),「介聘電腦遭入侵案 關心女友調動 國小教師扮駭客」,聯合報,2005/6/4。
許孟祥、郭峰淵(2001),「電腦倫理效能對電腦偏差行為之影響:以盜版軟體為例」,管理學報,十八卷一期,23-47頁。
許孟祥、郭峰淵、林杏子、朱彩馨、游佳萍(2001),「個人資訊隱私:倫理效能之量表的發展與驗證」,中山管理評論,九卷三期,373-394頁。
費孝通(1948),鄉土中國,上海:觀察社(香港鳳凰出版社重印)
馮震宇、劉志豪(1998),「我國網路犯罪類型及案例探討」,月旦法雜誌,41期,84頁。
楊國樞(1992),「中國人的社會取向:社會互動的觀點」,中國人的心理與行為1992-理念與方法篇,台北:桂冠圖書公司。
廖緯民(1996),「論資訊時代的隱私權保護--以資訊隱私權為中心」,資訊法務透析,22頁。
郭石城,「廿萬筆考生資料外流 買賣資料者五萬元交保 蘇犯案時未成年 移少年法庭」,中國時報,2005/04/26。
劉靜怡(2001),「網路上資訊隱私權保障問題之研究」,二十一世紀,63期,17-27頁。
蕭美惠譯(1999),透明社會—個人隱私vs 資訊自由,先覺出版社出版,16頁。(David Brin著)
蕭愛貞(1999),「網際網路犯罪之責任內涵-兼論網路服務業者之責任」,輔仁大學法律學研究所碩士論文。
簡榮宗(1998),網路上資訊隱私權保護問題之研究,東吳大學法律研究所碩士論文。
英文文獻
Adams, J.S.(1965), “Inequity in Social Exchange,” Advances in Experimental Social Psychology, 2, 267-299.
Aday, D.P.(1990), Social Control at the Margin, NY: A Division of Wadsworth, Inc.
Agranoff, M.H.(1991), “Controlling the Threat to Personal Privacy: Corporate Policies Must Be Created,” Journal of Information Systems Management, 8, 48-52.
Ajzen, I.(2002), “Perceived Behavioral Control, Self-Efficacy, Locus of Control, and the Theory of Planned Behavior,” Journal of Applied Social Psychology, 32, 665-683.
Ajzen, I.(1991), “The Theory of Planned Behavior,” Organizational Behavior and Human Decision Process, 50, 179-211.
Ajzen, I.(1989), “Attitude Structure and Behavior,” in Attitude Structure and Function, A.R. Pratkanis, S.J. Breckler, and A.G. Greenwald (Ed.), NJ: Lawrence Erlbaum Associates.
Ajzen, I., and Madden, T.J. (1986), “Prediction of Goal-Directed Behavior: Attitudes, Intentions and Perceived Behavioral Control,” Journal of Experimental Social Psychology, 42, 426-435.
Ajzen, I.(1985), “From Intentions to Actions: A Theory of Planned Behavior.” in Action-Control: from Cognition to Behavior, Heidelberg: Springer.
Ajzen, I. and Fishbein, M.(1980), Understanding Attitudes and Predicting Social Behavior, NJ: Prentice-Hall.
Ajzen, I. and Fishbein, M., (1977), “Attitude-Behavior Relations: A Theoretical Analysis and Review of Empirical Research,” Psychological Bulletin, 84(5), 888-918.
Akers, R.L.(1994), Criminological Theories: Introduction and Evaluation, LA: Roxbury.
Akers, R.L.(1985), Deviant Behavior: A Social Learning Approach, 3rd(Ed), CA: Wadsworth.
Akers, R.L.(1973), Deviant Behavior: A Social Learning Approach, CA: Wadsworth.
Anderson, J.C., and Gerbing, D.W.(1988), “Structural Equation Modeling in Practice: A Review and Recommended Two-Step Approach,” Psychological Bulletin, 103, 453-60.
Association of British Insurers(2000), “Future Crime Trends in the United Kingdom,” General Insurance Research Report No.7, ,
(Accessed April 10, 2005).
Bagozzi, R.P., and Yi, Y. (1988), “On the Evaluation of Structural Equation Models,” Academy of Marketing Science, 16(1), 74-94.
Bandura, A.(1997), Self-Efficacy: the Exercise of Control, NY: W. H. Freeman.
Bandura, A. and Jourden, F.G.(1991), “Self-Regulatory Mechanisms Governing the Impact of Social Comparison on Complex Decision Making,” Journal of Personality and Social Psychology, 60(6), 941-951.
Bandura, A.(1986), Social Foundations of Thought and Action: A Social Cognitive Theory, NY: Prentice-Hall.
Bandura, A.(1982), “Self-Efficacy Mechanism in Human Agency,” American Psychologist, 37(2), 122-147.
Bandura, A.(1977), Social Learning Theory, NJ: Prentice-Hall.
Bachman, R., Paternoster, R. and Ward, S.(1982), “The Rationality of Sexual Offending: Testing A Deterrence/Rational Choice Conception of Sexual Assault,” Law and Society Review, 26, 343-372.
Banerjee, D., T.P. Cronan, and T.W. Jones(1998), “Modeling IT Ethics: A Study Of Situational Ethics,” MIS Quarterly, 22(1), 31–60.
Baumgartner, H., and Homburg, C.(1996), “Applications of Structural Equation Modeling in Marketing and Consumer Research: A Review,” International Journal of Research in Marketing, 13, 139-61.
Becker, H. S. (1963), Outsiders: Study in the Sociology of Deviance, NY: Free Press.
Benda, B.B. and Corwyn, R.F.(1996), “Testing a Theoretical Model of Adolescent Sexual Behavior Among Rural Families in Poverty,” Child and Adolescent Social Work Journal, 13, 469-494.
Bock, G.W., R.W. Zmud, Y.G. Kim, and J.N. Lee(2005), “Behavioral Intention Formation in Knowledge Sharing: Examining the Roles of Extrinsic Motivators, Social-Psychological Forces, and Organizational Climate,” MIS Quarterly, 29(1), 87-111.
Bommer, M., C. Gratto, J. Gravander, and M. Tuttle(1987), “A Behavioral Model of Ethical and Unethical Decision Making,” Journal of Business Ethics, 6(4), 265–281.
Browne, M. W. and Cudeck, R. (1993) “Alternative Ways of Assessing Model Fit,” in Testing Structural Equation Models, Kenneth Bollen and J. Scott Long, (Eds.), Sage Publications, Newbury Park, CA, 136-192.
Chang, M.K.(1998), “Predicting Unethical Behavior: A Comparison of the Theory of Reasoned Action and the Theory of Planned Behavior,” Journal of Business Ethics, 7(16), 1825-1834.
Chin, W.W.(1998), “Issues and Opinion on Structural Equation Modeling,” MIS Quarterly, 22(1), 7-16.
Christensen, A. and Eining, M.(1991), “Factors Influencing Software Piracy: Implications for Accountants,” Journal of Information Systems, 5(1), 67-80.
Clarke, R.(1999), “International Privacy Concerns Confirm the Case for Intervention,” Communications of the ACM, 42, 60-67.
Clarke, R. and Cornish, D.(2000), “Rational Choice,” in R. Paternoster and R. Bachman (Ed), Explaining Crime and Criminals: Essays in Contemporary Criminological Theory, LA: Roxbury Publishing Company.
Cloward, R.A., and Ohlin, L.E.(1960). Delinquency and opportunity, NY: The Free Press.
Cohen, L.E. and Kleugel, J.R.(1978), “Determinants of Juvenile Court Dispositions,” American Sociological Review, 43, 162-177.
Cohen, S., and Scull, A.(1983), “Social Control in History and Sociology,” Social control and the state, Martin Robertson and Company Ltd.
Compeau, D.R. and Higgins, C.A.(1995), “Computer Self-Efficacy: Development of A Measure and Initial Test,” MIS Quarterly, 19(2), 189-211.
Cornish, D.B. and Clarke, R.V.(1986), The Reasoning Criminal: Rational Choice Perspectives on Offending, NY: Springer-Verlag.
Cornish, D. and Clarke. R.(1987), “Understanding Crime Displacement: An application of Rational Choice Theory,” Criminology, 25, 933-947.
Cortese, A. (1990), Ethnic Ethics: The Restructuring of Moral Theory, NY: State University of New York Press.
Cullen, F.T. and Agnew, R.(2002), Criminological Theory: Past to Present, 2nd(Ed), LA: Roxbury Publishing Company.
DeConick, J.B. and Lewis, W.F. (1997), “The Influence of Deontological and Teleological Considerations and Ethical Climate on Sales Managers’ Intentions to Reward or Punish Sales Force Behavior,” Journal of Business Ethical, 16, 497-506.
Dejoie, R., G. Fowler, and D. Paradice(1991), Ethical Issues in Information Systems, MA: Boyd and Fraser publishing company.
Durkeim, E.(1893), The Division of Labor in Society, NY: Free Press. (Reprinted and translated, 1933)
Empey, L.T.(1983), American Delinquency: Its meaning and construction, IL: Dorsey.
Eining, M.M. and Christensen, A.L.(1991), “A Psycho-Social Model of Software Piracy: The Development and Test of A Model,” in: R. Dejoie, G. Fowler, D. Paradice (Eds.), Ethical Issues in Information Systems, MA: Boyd and Fraser.
Fishbein, M. and Ajzen, I.(1975), Beliefs, Attitude, Intentions and Behavior: An Introduction to theory and Research, MA: Addition-Wesley.
Flannery, B. L. and May, D. R. (2000), “Environmental Ethical Decision Making in the U.S. Metal-Finishing Industry,” Academy of Management Journal, 43(4), 642-663.
Gattiker, U. E. and Kelley, H. (1999), “Morality and Computers: Attitudes and Differences in Moral Judgments,” Information Systems Research, 10(3), 233-254.
Goodman, M.(2001), “Making Computer Crime Count,” FBI Law Enforcement Bulletin, 70(8), 10-17.
Gordon, S. and Ma, Q.(2003), “Convergence of Virus Writers and Hackers: Fact or Fantasy?” Symantec Security Response, http://www.symantec.com, (Accessed March 28, 2005).
Gormley, K. (1992), One Hundred Years of Privacy, Wisconsin Law Review, 1335-1408.
Gottfredson, M.R. and Hirschi, T.(1990). A general theory of crime, CA: Stanford University Press.
Gowthorpe, C., J. Blake, and J. Dowds(2002), “Testing the Bases of Ethical Decision-Making: A Study of the New Zealand Auditing Profession,” Business Ethics: A European Review, 11(2), 143-156.
Grasmick, H.G. and Bursik, R.J.(1990), “Conscience, Significant Others, and Rational Choice: Extending the Deterrence Model,” Law and Society Review, 24, 835-861.
Greenberg, J.(1989), “Cognitive Re-Evaluation of Outcomes in Response to Underpayment Inequity,” Academy of Management Journal, 32, 174-184.
Hansen, T., J.M. Jensen, and H.S. Solgaard(2004), “Predicting Online Grocery Buying Intention: A Comparison of the Theory of Reasoned Action and the Theory of Planned Behavior,” International Journal of Information Management, 24(6), 539-550.
Hair, J.F., Anderson, R.E., Thatham, R.L., and Black, W.C. (1998), Multivariate Data Analysis, Fifth Edition, NJ: Prentice-Hall.
Hatcher M., J. McDannell, and S. Ostfeld(1999), “Computer Crimes,” The American Criminal Law Review, 36(3), 397-444.
Hill, T., N.D. Smith, and M.F. Mann(1987), “Role of Efficacy Expectations in Predicting the Decision to Use Advanced Technologies: The Case of Computers,” Journal of Management, (16), 337-313.
Ho, M. K. (1987). Family Therapy with Ethnic Minorities. CA: Sage.
Hsu, M.H. and Kuo, F.Y.(2003a), “An Investigation of Volitional Control in Information Ethics,” Behavior and Information Technology, 22(1), 53-63.
Hsu, M.H. and Kuo, F.Y.(2003b), “The Effect of Organization-Based Self-Esteem and Deindividuation on Protecting Personal Information Privacy,” Journal of Business Ethics, 42(4), 305-321.
Hsu, F.L.K.(1971), “Psychological Homeostasis and Jen: Conceptual Tools for Advancing Psychological Anthropology,” American Anthropologist, 73, 23-44.
Hirschi, T.(1969), American Delinquency: Its Meaning and Construction, IL: Dorsey.
Hunt, S. D. and Vitell, S. J., (1986), “A General Theory of Marketing Ethics,” Journal of Macromarketing, 6(1), 5-16.
Hunt, S.D. and Vasquez-Parraga, A.Z. (1993), “Organization Consequences, Marketing Ethics, and Sales Forces Supervision,” Journal of Marketing Research, 30, 78-90.
Huseman, R.C., Hatfied, J.D., and Miles, E.D.(1987), “A New Perspective on Equity Theory: the Equity Sensitivity Construct,” Academy of Management Review, 20, 222-234.
Hwang, K.K. (1987), “Face and Favor: the Chinese Power Game,” American Journal of Sociology, 92, 944-974.
Inness, J.C.(1992), Privacy, Intimacy, and Isolation, Oxford University Press.
Jeffery, C.C.(1972), “The Historical Development of Criminology,” in H. Mannheim,(Ed.), Pioneers in Criminology, NJ: Patterson Smith, 458-498.
Jeffery, C.C.(1956), “The Structure of American Criminological Thinking,” Journal of Criminal Law, Criminology, and Police Science, 46, 658-672.
Jöreskog, K.G. and Sörbom, D. (1989), LISREL 7: A Guide to the Program and Applications. Chicago: SPSS Inc.
Kohlberg, L. (1984), Essays on Moral Development, II: The Psychology of Moral Development, San Francisco: Harper & Row. 
Kreie, J. and Cronan, T.P.(1998), “Judging What Is Ethical or Unethical: There Are Differences Between Men and Women,” Communications of the ACM, 41 (9), 70–76.
Laudon, K.C. and Laudon, J.P.(2000), Management Information Systems: New Approaches to Organization and Technology, NJ: Prentice-Hall.
Lemert, E.(1951), Social pathology, NY: McGraw-Hill.
Leonard, L.N.K., T.P. Cronanb, and J. Kreiec(2004), “What Influences IT Ethical Behavior Intentions-Planned Behavior, Reasoned Action, Perceived Importance, or Individual Characteristics?” Information and Management, 42, 143–158.
Liska, A.E.(1992), “Social Control,” in Borgatta, E.F. and Borgatta, M.L. (Eds.), Encyclopedia of Sociology. NY: Macmillan Publishing Company.
Little, C.B.(1995), Deviance and control, IL: F.E. Peacock.
Loch, K.D. and Conger, S.(1996), “Evaluating Ethical Decision Making and Computer Use,” Communications of the ACM., 39(7), 74-83.
Lwin, M.O. and Williams, J.D.(2003), “A Model Integrating the Multidimensional Developmental Theory of Privacy and Theory of Planned Behavior to Examine Fabrication of Information Online,”.Marketing Letters, 14(4), 257-272.
Manstead, A.S.R. and Eekelen, S.A.M. van(1998), “Distinguishing Between Perceived Behavioral Control and Self-Efficacy in the Domain of Academic Achievement Intentions and Behaviors,” Journal of Applied Social Psychology, 28(15), 1375-1392.
Marsh, H. W.(1994), “Confirmatory Factor Analysis Models of Factorial Invariance: A Multifaceted Approach,” Structural Equation Modelling, 1(1), 5-34.
Martocchio, J.J.(1994), “Effect of Conceptions of Ability on Anxiety, Self-Efficacy, and Learning in Training,” Journal of Applied Psychology, 79(6), 819-825.
Matza, D.(1964), Delinquency and Drift, NY: John Wiley.
Moores, T. T. and Dhaliwal, J.(2004), “A Reversed Context Analysis of Software Piracy Issues in Singapore,” Information and Management, 41(8), 1037-1042.
Newman, G.R.(2004), “Check and Card Fraud,” Problem-Oriented Guides for Police Problem-Specific Guides Series No. 21, U.S. Department of Justice.
, (Accessed April 08, 2005).
Nisbet, R. A. (1966). The Sociological Tradition. NY: Basic Books.
Nunes, J.C., C.K. Hsee, and E.U. Weber(2004), “Why Are People So Prone to Steal Software? The Effect of Cost Structure on Consumer Purchase and Payment Intentions,” Journal of Public Policy and Marketing, 23(1), 43-53.
Paternoster, R. and Nagin, D.S.(1993), “Enduring Individual Difference and Rational Choice Theories of Crime,” Law and Society Review, 27(3), 476-495.
Peace, A.G., D.F. Galletta, and J.Y.L. Thong(2003), “Software Piracy in the Workplace: A Model and Empirical Test,” Journal of Management Information Systems, 20(1), 153-178.
Piliavin, I., R. Gartner, C. Thornton, and R. Matsueda(1986), “Crime, Deterrence and Rational Choice,” American Sociological Review, 51, 101-119.
Reckless, W.C.(1955), The Crime Problem. NY: Appleton Century Crofts.
Reidenbach, R.E. and Robin, D.P.(1988), “Some Initial Steps Toward Improving the Measurement of Ethic,” Journal of Business Ethics, 7(11), 871-881.
Reiss, A.J. Jr.(1951). “Delinquency as the Failure of Personal and Social Controls,” American Sociological Review, 16, 196-207.
Robbins, S.P.(1996), Organizational Behavior: Concepts Controversies and Applications, NJ: Prentice-Hall.
Ross, E.A.(1901), Social Control, NY: The Macmillan.
Schultz, E.E. (2002), “A Framework for Understanding and Predicting Insider Attacks,” Computers & Security, 21(6), 526-531.
Schwendinger, H. and Schwendinger, J. S. (1985), Adolescent Subcultures and Delinquency, NY: Praeger.
Sethi, V. and Carraher, S. (1993), “Developing Measures for Assessing the Organizational Impact of Information Technology: A Comment on Mahmood and Soon’s Paper,” Decision Science, 24(4), 867-877.
Shepherd, G.J. and O’ Keefe, D.J. (1984), “Separability of Attitudinal and Normative Influences on Behavioral Intentions in the Fishbein-Ajzen Model,” The Journal of Social Psychology, 122, 287-288.
Shimp, T.A. and Kavas, A. (1984), “The Theory of Reasoned Action Applied to Coupon Usage,” Journal of Consumer Research, 11, 795-809.
Siegel, L.J.(1992), Criminology, West Publishing.
Simpson, P.M., Banerjee, D. S. and Claude, L. Jr. (1994), “Softlifting: A Model of Motivating Factors,” Journal of Business Ethics, 13(6), 431-438.
Smedinghoff, T. J. (1996), Online Law: The SPA's Legal Guide to Doing Business on the Internet, MA: Addison-Wesley.
Starr (1998), Special Counsel Kenneth Starr's Report, White House Rebuttal to Starr's Report, , (Accessed April 14, 2005).
Sutherland, E.H.(1929). Principles of Criminology, PA: Lippincott.
Sue, D.W. and Sue, D.(1990). Counseling the Culturally Different: Theory and Practice, NY: Wiley.
Swartz, N.(2002), “Cybercrime Soars,” The Information Management Journal, 36(3), 6.
Tittle, C. R.(1969), “Crime Rates and Legal Sanctions,” Social Problem, 16, 409-423.
Vallerand, R.D., Deshaies, P., Cuerrier, J., Pelletier, J.G., and Mongeau, C. (1992), “Ajzen and Fishbein’s Theory of Reasoned Action as Applied to Moral Behavior: A Confirmatory analysis,” Journal of Personality and Social Psychology, 62, 98-109.
Wang, C.C.(2005), “Factors that Influence the Piracy of DVD/VCD Motion Pictures,” Journal of American Academy of Business, 6(1), 231-237.
Warren, S. D. and Brandeis, L. D. (1890), “The Right to Privacy,” Harvard Law Review, 5, 193. (轉引自林雅惠, 2004)
Westin, A.F.(1967), Privacy and Freedom, NY: Atheneum.
William, L.(1960), “Privacy: A Legal Analysis,” California. Law Review, 48, 389-407.
Williams, F.P. III, and McShanee, M.D.(1988), Criminological Theory. NJ: Prentice-Hall.
Willison, R.(2000), “Considering the Offender: Addressing the Procedural Stages of Computer Crime in an Organizational Context,” Working Paper Series. Department of Informatics of Copenhagen Business School, ,
(Accessed April 10, 2005).
Willison, R.(2001), “The Unaddressed Problem of Criminal Motivation in IS Security: Expanding the Preventive Scope Through the Concept of Readying,” Working Paper Series. London: London School of Economics. , (Accessed April 10, 2005). 
Wood, R. and Bandura, A.(1989), “Task, Domain, and General Efficacy: A Reexamination of the Self-Efficacy Scale,” Psychological Reports, 72, 423-432.
指導教授 范錚強、許通安
(Cheng-Kiang Farn、Tong-An Hsu)
審核日期 2005-7-20
推文 facebook   plurk   twitter   funp   google   live   udn   HD   myshare   reddit   netvibes   friend   youpush   delicious   baidu   
網路書籤 Google bookmarks   del.icio.us   hemidemi   myshare   

若有論文相關問題,請聯絡國立中央大學圖書館推廣服務組 TEL:(03)422-7151轉57407,或E-mail聯絡  - 隱私權政策聲明