參考文獻 |
1. 陳順宇(1998)。多變量分析。台北:華泰。
2. 林惠琦(2004)。仿冒品購買意圖之研究-以台灣、香港、新加坡地區為例。國立東華大學國際企業研究所碩士論文。
3. 高申春(2001)。人性輝煌之路-班杜拉的社會學習理論。台北:貓頭鷹出版社。
4. Albers-Miller, N.D. (1999). “Consumer misbehavior: why people buy illicit goods” Journal of Consumer Marketing, 3, 273-287.
5. Ajzen, I. and Fishbein M. (1980) “Understanding Attitudes and Predicting Social Behavior” Englewood Cliffs, NJ: Prentice-Hall.
6. Ajzen, I. (1985). “From Intentions to Actions: A Theory of Planned Behavior in Action Control from Cognition to Behavior”, 11-39.
7. Ajzen, I. (1991). “The Theory of Planned Behavior” Organizational Behavior and Human Decision Processes, 50, 179-211.
8. Ajzen. I. (2002). “Constructing a TpB Questionnaire: Conceptual and Methodological Considerations”, 1-13.
9. Anderson, J. (2004) “The China syndrome” Brand and Product Protection, March, 16 -17.
10. Ang, S. H., Cheng, P. S., Lim, E. A. C. and Tambyah, S. K. (2001). “Spot the difference: consumer responses towards counterfeits” Journal of Consumer Marketing, 3, 219-235.
11. Arellano, R. (1994). “Informal-underground retailers in less-developed countries: An exploratory research from a marketing point of view” Journal of Macromarketing, 14, 21-35.
12. Bandura, A. (1977). “Self-efficacy: toward a unifying theory of behavioral change” Psychological Review, 84, 191-215.
13. Bandura, A. (1982). “Self-efficacy mechanism in human agency” American Psychologist, 37(2), 122-147.
14. Bandura, A. (1986). “Social foundations of thought and action: a social cognitive theory” Englewood Cliffs, NJ: Prentice-Hall
15. Bandura, A. and Jourden, F. J. (1991). “Self-Regulatory Mechanisms Governing the Impact of Social Comparison on Complex Decision Making” Journal of Personality and Social Psychology, 60(6), 941-951.
16. Behar, R. (2000). “Beijing’s phony war on fakes” Fortune (Europe), 142(10), 98 -110.
17. Bellenger, D., and Korgaonkar, P. K. (1980). “Profiling the recreational shopper” Journal of Retailing, 56, 77-92.
18. Bentler, P. M., and Bonett, D. G. (1980). “Significant tests and goodness of fit in the analysis of covariance structures” Psychological Bulletin, 88, 588-606.
19. Blatt, J. J. (1993). “Battling counterfeit products on the US side of the Pacific Rim” The International Computer Lawyer, 1(13), 5-16.
20. Bloch, P.H. Bush, R.F. and Campbell, L. (1993). “Consumer ‘accomplices’ in product counterfeiting: a demand-side investigation” Journal of Consumer Marketing, 4, 27-36.
21. Bock, G.W. and Kim, Y.G. (2002). “Determinants of the Individual’s Knowledge Sharing Behavior: The Theory of Reasoned Action Perspective” Proceedings of 6th Pacific Asia Conference on Information System (PACIS).
22. Browne, M. W., and Cudeck, R. (1989). “Single sample cross-validation indices for covariance structures” Multivariate Behavioral Research, 24, 445.
23. Bush, R., Bloch, P. and Dawson, S. (1989). “Remedies for product counterfeiting” Business Horizon, 32(1), 59-65.
24. Celso A., Cristiana T. and Carlos A. V. R. (2007). “Consumer attitudes toward counterfeits: a review and extension” Journal of Consumer Marketing, 36-47.
25. Chakraborty, G., Allred, A. and Bristol, T. (1996). “‘ Exploring consumers’ evaluations of counterfeits: The roles of country of origin and ethnocentrism” Advances in Consumer Research, 23, 379-384.
26. Cheng, H. K., Sims, R. R. and Teegen, H. (1997). “To purchase or to pirate software: an empirical study” Journal of Management Information System, 4, 49-60.
27. Compeau, D. R. and Higgins, C. A., 1995, “Computer self-efficacy: Development of a measure and initial test,” MIS Quarterly, 19, 189-211.
28. Cordell, V., Wongtada, N. and Kieschnick, R. L. Jr. (1996). “Counterfeit purchase intentions: Role of lawfulness attitudes and product traits as determinants” Journal of Business Research, 35, January, 41-53.
29. Cottman, L. (1992). “It’ s not the real thing”, Security Management, 36(12), 68-70.
30. Dodge, H.R, Edwards, E.A. and Fullerton, S. (1996). “Consumer transgressions in the marketplace: consumers’ perspectives” Psychology and Marketing, 8, 821-835.
31. Dowling, G.R. and Staelin, R. (1994). “A model of perceived risk and intended risk-handling activity” Journal of Consumer Research, 21(1), 119-34.
32. Eric H. Smith, (2007). “International Piracy: The Challenges of Protecting Intellectual Property in the 21st Century”
33. Gentry, J., Putrevu, S., Shultz, C. and Commuri, S. (2001). “How now Ralph Lauren? The separation of brand and product in a counterfeit culture” Advances in Consumer Research, 27, 258-265.
34. Gentry, J., Putrevu, S., and Shultz, C. (2006). “The Effects of Counterfeiting on Consumer Search” Journal of Consumer Behaviour 5 (September), 1-12.
35. Granbois, D. H., and Summers, J. O. (1975). “Primary and secondary validity of consumer purchase probabilities” Journal of Consumer Research, 1, 31-38.
36. Greenberg, C. J., Sherman, E. and Schiffman, L.G. (1983). “The measurement of fashion image as a determinant of store patronage”, in Darden, W.R. and Lusch, R.F. (Eds), Patronage Behavior & Retail Management, North Holland, New York, NY, 151-63.
37. Grossman, G. and Shapiro, C. (1988a). “Counterfeit trade. The American Economic Review.”
38. Grossman, G. and Shapiro, C. (1988b) “Foreign counterfeiting of status goods” Quarterly Journal of Economics, 103(1), 79-100.
39. Hair, J. F., Anderson, R. E., Tatham, R. L., and Black, W. C. (2006). Multivariate data analysis, sixth edition (six ed.). Englewood Cliffs, NJ: Prentice-Hall.
40. Husted, B.W. (2000). “The impact of national culture on software piracy” Journal of Business Ethics, 3, 197-211.
41. Lynne, G. D., C. Franklin C., Alan H., and Mohammed R. (1995). “Conservation Technology Adoption Decisions and the Theory of Planned Behavior” Journal of Economic Research, 16, 581-598.
42. Marron, D.B. and Steel, D.G. (2000). “Which countries protect intellectual property? The case of software piracy” Economic Inquiry, 2, 159-174.
43. McDonald, G., and Roberts, C. (1994). “Product piracy: The problem that will not go away” Journal of Product and Brand Management, 3, 55-65.
44. Moores, T. and Dhillon, G. (2000). “Software piracy: a view from Hong Kong” Communications of the ACM, 12, 88-93.
45. Nash, T. (1989), “Only imitation? The rising cost of counterfeiting” Director, May, 64-9.
46. Pajares F. (1996). “Self-efficacy beliefs in academic settings” Review of educational research, 66, 548-578.
47. Phau, I., Prendergast, G. and Chuen, L. H. (2001). “Profiling brand-piracy-prone consumers: An exploratory study in Hong Kong’s CA industry” Journal of Fashion Marketing and Management, 5(1), 45-55.
48. Presndegast, G., Chuen, L. H. and Phau, I. (2002). “Understanding consumer demand for non-deceptive pirate brands” Marketing intelligence and Planning, 20(7), 405-416.
49. Shaoyi, L., Yuan, P. S., Huaiqing, W. and Ada, C., 1999. “The adoption of virtual banking: an empirical study” International Journal of Information Management, 19, 63-74.
50. STATEMENT OF THE INTERNATIONAL INTELLECTUAL PROPERTY ALLIANCE ON USTR’S “SPECIAL 301” OUT-OF-CYCLE REVIEW DECISIONS ON TAIWAN AND POLAND, http://iipa.com
51. Stone, G. P. (1954). “City shoppers and urban identification: Observations on the social psychology of city life” American Journal of Sociology, 60, 36-45.
52. Sweeney, J., Greenberg, S. and Bilter, M. (1994). “Heading them off at the pass - Can counterfeit goods of foreign origin be stopped at the counterfeiter’s border” The Trademark Reporter, 48, 477-494.
53. Swinyard, W. R., Heikki, R., and Kau, A. K. (1990). “The morality of software piracy: Across cultural analysis” Journal of business Ethics, 9, 655-664.
54. Tan, B. (2002). “Understanding consumer ethical decision making with respect to purchase of pirated software” Journal of Consumer Marketing, 2, 96-111.
55. Taylor, S. and Todd, P. A., (1995). “Understanding information technology usage: A test of competing models,” Information systems research, Vol.6, No.2, 144-177.
56. Tom, G., Garibaldi, B., Zeng, Y. and Pilcher, J. (1998). “Consumer demand for counterfeit goods” Psychology and Marketing, 15(5), 405-421.
57. Traphagan, M. and Griffith, A. (1998). “Software piracy and global competitiveness: report on global software piracy” International Review of Law Computers and Technology, 3, 431-451.
58. Wang, F., Zhang, H., Zang, H., and Ouyang, M. (2005). “Purchasing pirated software: an initial examination” Journal of Consumer Marketing, 6, 340-351.
59. Wee, C. H., Tan, S. J. and Cheok, K. H. (1995). “Non-price determinants of intention to purchase counterfeit goods” International Marketing Review, 6, 19-46.
60. Wilke, R. and Zaichkowsky, J. L. (1999). “Brand imitation and its effects on innovation competition, and brand equity” Business Horizons, 42(7), 9-19.
61. Wood, R. and Bandura, A., (1989). “Impact of Conceptions of Ability on Self-Regulatory Mechanisms and Complex Decision Making” Journal of Personality and Social Psychology, 56(3), 407-415.
62. Yvette, R., and Lindsay, T. (1999). “Structural equation modeling with lisrel: Application in tourism” Tourism Management, 20(1), 71-88. |